Static | ZeroBOX

PE Compile Time

2023-07-03 03:45:41

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00028554 0x00028600 6.23517352927
.rsrc 0x0002c000 0x00000546 0x00000600 4.00759210512
.reloc 0x0002e000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0002c0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0002c35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
KDBM(&
\/oI
1SPS*
com.apple.Safari
Unable to resolve HTTP prox
y?sc=\
oEzeOU:?,Q
BBTCUUp
x@OjXB
11x//x
b;;;;m&&m
KTB]PWN
w36 ?25
TIHNKKNEUBCUHKUHPgTCBI
|5#<16
^Bm!1o
i0|l2'
2gsEMOLu
3*29$86
9+(!4(&
aELJ]KVqC
c/FPXTwVNu@
dr]J[AJt
L4m&;7p
p^%is'
i`ba@*@L$
tyqlv}|}j[8|jwokkyH8z}O8kow|vqO$
`e`kdbg
bxsrsdU6tsA$
fkc~donoxI*o~kiclc~xoI*dckgeN*y}endc]$
N|qyd~utubS0tut~udhU0cg
XXXXXXXXXXXXEXXXXEXXXXEXXXXEXXXXXXXX
VLGOGNg[VKVLGFkR
0-*$,/
Ltit?}xed}aMec~aadB1
~xeprx}aaP1t}aaPMt}aaPMbt}xW1
~||~RM*
!~5rjyyj7
!xqvmkl0#
NH_LTUY
(7:2/5>?>)
/=4(4)82
;,*; =
;) < =,&
%( =',-,;*
D>[@!(-"+6
]|~xkvmJ}|mi`kzw\E
Im"5&"5
::,;--
3CBV_XEETb
_gpfbzgW5{z~ytS
kUzle`of{yUgfbehoU
.,.X'Y+Y*Y<(5
(D^-8`ilcjwUqwdqv
WBWRSEAYDTj
51360%k|vmwjG*~|szhG}kyjphkkyhGj}lkyu
tecybxttvK
\resworB\kcolF\
h'}???
#,1;1&;q86910<
-:+>;/
_x ($+7 60
.VWR_^\TPUmCTEPUAdm_Hu
G^P8+&%(+
QU]Q^BUCE
a1`: ;!--/
+m{f~zzhy
n}h}xll}
B:Y>./:l16,7-!!#
uta7jmwlvzzxE
q~vw{DQM_5VHNv}hWD}jyol~wK
'3=2:;7
1&5# 2;
V^R]AV@F
E[}OYDe
v&6/"5l
d&."-1&0
d~&."-
$-*77&0ll!
u_I)\CM
{qzly}{qiq7!<$ 2#qy}
YYOIIK^ODXO^DCO^K\CXZ
>fsfcwwf
<=(~#"5&"5#$>535"
U=>troP<
9ubtR;
OFALGKFM
T]ZW\P]V
6AWF[anbftw`}qnW@Sebftnw`seft}a
FW}zfA
%uvlqswdnhmgndxzv
h =<: 6
?*!8:!
s=:'!2
QmeiFzm{]
Pxnskoo}L
dIJKLMN
;FNP6~ewzP
1:Qbax
CNBJTzas~TN
"gU}D$y&$vCVyvgcwyTu)%Pk'"Ph
A:'<)/!>)
o*<!9==/
>]H]XLL]+
6GTKPfOGVQ[q.
Ygkg=g`z
cgUOavw}r~~|P3CGUO:%+k;3`v
zU3~rat|aCOva|g@
rfgazEOB
QVLIUQcy@]PI@a
W@AKDHHJf
HDWBJWuy@WJQvIDPQWLsy
gccq@+
m*eraerD,
\Z@BVA@An
ql{jj{YNJX
WQLS|QFUQFP
>trop_revres/<
3,v`}eaasbM`wagM`wd`wa.
@y2la4!
RHSIEEgz
s{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{k{@
PBJLk.
b>*#$99(
(?,:9+"
Ppwh*va`hkB
O|XXJ{
vAEEF^_evYOFCLEXzvAEEF^_ev
vOICLLev^LEYEXICgvOXK]^LEyz
! !!V%U#'&''V//U$s&&&$&#'QQT" $.K|xx{cbXKdr{~qxeGKzrcdndubD7py~pvddrZ7d`xsy~@Kyx~derAcyreebTKCY7d`xsy~@Kcqxdxet~ZKrev`cqxDX
m=5#>&""0
UZLQIMM_n
w8=59
cuhpttfW'4WHW
s $<7=:
kf\jhndln_
TB_GCCQ@S^IC
"$7*1
(-%)<+
mr|<ld7!(-
d)%6#+6
(%106-
2*9>c9#8"..
7j|ay}}o^=^A^
^T[MfVS[w
[H_JufVS[w
[H_Juf
JYN[DN
(MH@lNBNq
L2'27##2
zzhYYFY
{{iXX\E[
AIEjVA@MRKVt
<*1:419
ga+`wjqVY`wjqVYawlgildHY
-3%8 $$6
32#'.%49
}phR_[l$
5r$9*ID\fkoX
rPGTPGQALT~altNCGp~gpcuvdmq
tya[VRe
D*.& 6+377%
"5&03!(
,J\AY]]O~
m'ux`B^Q_b
[L_[Lzujg
]AN@}uL[H^]OFz
eUX@dsq
5252u85-:)/7.
:9-9{85-.
CNVartlU
616q<1)>-+3*
q4D/2?'
3H9>9~3>&1"$<%
12&2p3>&%
4@GFKSdwqiP
1/yjnn|m
/#0%-0
3D|0WD@@RC
BOW`sumT
L_[[IX
x.\]Xg
I^_ZTWULT
?"ok[MPHLL^O
uw{6styltyh
Wo|{uv{B
CD^E_SSQlU\@BE@
xbycoomPi`|~y|"P
e_E^DHHj
~qy||ybD
I\ILwZM[]w@KFMJCZG_t@KFMJCZG
tdy{Qet
Nav`}eaasBN`wus|s_vs}~|e}VNw`seft}A
Y)sX_*Xy2
Y)sX_*Xy06
e;-0<,6
\IWPzKLBLWJ
$BRKFQxBJFIUBTR
Fm`C#3*'0
"4)155'6
J0 94#
1':"&&4%
PcsjgpYbtiquugv
R60z`-1?
VN[NkN[JB
C,s{jw
Q@UB]FdGGZ
:"/=c"/,!")
c/'!,'i 6+377%4
+3>,r3>=038
-A-/Y)X*X+X=)4~)E_,9lpeT
DY^PX[9
8{pfswq{c{p<487+<*
=<-) +:7<%=+6.**8
=<-) +:7<%<487-*61q{
/TIN@HKx]HJ
gV^R]G@\[
Vxp|soxnHyximdo~sx
wjhjj/
CUHPTTFw-*
2"8lmkvcaknrrC
#q4.pf{cgguD*fv(
0x`wae}`P2jwv|sK
<ya}y{f|W
IevcD
tatQ5gpf@IgtaF"IgtaF"
HQzoz_;i~hNGsxitO
1~g~_1}~~R
`rgrW3av`FO`f
Cv~|a{PO|zwfg@v
EIgrckiM
:vawskvFpjaG
S=&-,!
Nu`uP4fqgAHya`}vf[
M7qaf`
1xcvcF"pgqW^iklvwrQ^iklvwrQ
_KJBDWa
JAJHJf
*98TO_X^
Sprbec
P?(>:"?
L[Mkb[SQLV}b[SQLV}
-Q1]LYLi
_H^xq_H^ZB_o
^YCH@HAh
qdqT0bucELbucg
bR0isqfyb@0sy`U
{QZJMK
L#VASAMrIQMIKVLgxWAHQ@KIxCJMPPAWx
VMJTMAHwxGJm
VMVJAb
oVvcvS7erdBKqebD7G^F
h5(?65"9
l,0>;:
3gxQfzlEfnlaOQ~hdjbabcenhY-HYLJYHCQ
HICJCk
{uGFLELd
\>-n233
0a`hn}KjlF
BNJxyqwdRsu_Jyry{yUJ
#J25625333
^KM)}lelb{lK
MXTKV_
\MPuhj
,euqinu
pv{p`dpf
&R 757&<;{
zstoinixi~r4
Hm,35z
E-_HDKDYCHIDYNHGOB
[s~vkqz{zm|
-.*~wl
^vjyp{Rj}{t|Q
]\Wu_VQVQYP{
HLPCJAhCEpLPQe
iHEFhK^KnSOa
GW@LCLQK@Al
oIHAOLCh}d
<:2=3=in<n22':<hk'k;3>'8;;;'l=9;n<;2
j}zumVtyqj}K$
EBAEEB
GA@A_F
kPP|NN|kk|GG|nn|ZZZZ
Q45,0v
`k2{{WeeW@@WllWEEWqqqq
6%2(m'%#/+
BON\DGJ
LEB_BY|
/+'#42
f#6?2f )f5+'#425f4#0)f253,f"#1)**'f5/f5#/42(
%q<w$,4>,bmdx,
e,ikm~cx_ux~i|c~\hive`me~i_,idx,jc,ive_:
X'j!z`?*#
k m&}g8(1<
g%q<w$,5,bmdx,
e,iamBkbe~x_,idx,jc,ive_0
8C$$p<v%-p=v-by-alx|h-ybc-~d-h`lCjcd
y^-hey-kb-hwd^.
GOClELKPVq
v4.0.30319
#Strings
/Ug
' 8 j w
!2"Y"{"
__StaticArrayInitTypeSize=10
__StaticArrayInitTypeSize=11
HMACSHA1
Nullable`1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
get_Item1
HMACSHA512
__StaticArrayInitTypeSize=12
__StaticArrayInitTypeSize=32
Advapi32
kernel32
Microsoft.Win32
user32
ReadUInt32
ToUInt32
ReadInt32
ToInt32
KeyValuePair`2
Dictionary`2
get_Item2
Tuple`3
get_Item3
__StaticArrayInitTypeSize=24
__StaticArrayInitTypeSize=144
ToUInt64
ReadInt64
ToInt64
__StaticArrayInitTypeSize=84
__StaticArrayInitTypeSize=16
ReadUInt16
ToUInt16
ReadInt16
ToInt16
HMACSHA256
__StaticArrayInitTypeSize=6
get_UTF8
<Module>
get_FormatID
get_ASCII
System.IO
get_IV
set_IV
value__
ProtectedData
PropertyData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
WndProc
FromFileTimeUtc
get_Id
GetWindowThreadProcessId
GetProcessId
GetProcessById
OpenRead
SHA1Managed
RijndaelManaged
Interlocked
set_Enabled
add_Elapsed
get_IsInvalid
get_Guid
GetField
TrimEnd
ReadToEnd
Append
get_Second
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
Clipboard
Replace
IdentityReference
set_Mode
FileMode
PaddingMode
CryptoStreamMode
CompressionMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
VaultFree
FromImage
SendMessage
MailMessage
AddRange
CompareExchange
CredentialCache
EndInvoke
BeginInvoke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CreateHandle
GetTypeFromHandle
handle
Rectangle
ToSingle
DeleteFile
MoveFile
get_MainModule
ProcessModule
get_Name
set_Name
get_FileName
set_FileName
GetModuleFileName
GetTempFileName
GetFileName
get_ModuleName
get_OSFullName
get_FullName
get_UserName
get_ComputerName
get_ProcessName
get_ProductName
GetProcessesByName
GetDirectoryName
System.Net.Mime
FromFileTime
ToFileTime
DateTime
GetLastWriteTime
SetLastWriteTime
SetCreationTime
GetLastAccessTime
SetLastAccessTime
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
DataProtectionScope
set_MediaType
ValueType
SecurityProtocolType
GetType
ContentType
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
Create
MulticastDelegate
GetKeyboardState
GetKeyState
Delete
get_CanWrite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
get_Minute
ReadByte
ToByte
get_Value
get_HasValue
GetValue
GetPropertyValue
set_KeepAlive
Remove
c32e98c6-4205-4798-904b-ffd769a7f33f.exe
get_Size
get_HashSize
set_BlockSize
get_KeySize
Serialize
Deserialize
Initialize
SuppressFinalize
Resize
c32e98c6-4205-4798-904b-ffd769a7f33f
SizeOf
get_ItemOf
LastIndexOf
get_Jpeg
System.Threading
set_Padding
UTF8Encoding
GetEncoding
System.Drawing.Imaging
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
GetPrivateProfileString
ToString
GetString
Substring
System.Drawing
get_Msg
ComputeHash
get_ExecutablePath
GetTempPath
GetFolderPath
get_Width
get_Length
SetLength
GetWindowTextLength
EndsWith
StartsWith
get_Month
PtrToStringUni
AsyncCallback
TransformFinalBlock
TransformBlock
get_CanSeek
AllocHGlobal
FreeHGlobal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
Rijndael
System.Collections.ObjectModel
System.ComponentModel
System.Net.Mail
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
bcrypt.dll
System.Xml
set_IsBodyHtml
set_SecurityProtocol
Control
set_EnableSsl
FileStream
get_BaseStream
GetResponseStream
DeflateStream
CryptoStream
MemoryStream
get_LParam
get_WParam
get_Param
get_Item
set_Item
VaultGetItem
OperatingSystem
SymmetricAlgorithm
KeyedHashAlgorithm
Random
ICryptoTransform
ToBoolean
IsLittleEndian
CopyFromScreen
get_PrimaryScreen
ChangeClipboardChain
SeekOrigin
get_OSVersion
get_Version
System.IO.Compression
Application
get_Location
GetVolumeInformation
SystemInformation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
AttachmentCollection
KeyCollection
get_Position
set_Position
get_ContentDisposition
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
InvalidOperationException
ArgumentException
get_StatusDescription
System.Runtime.ConstrainedExecution
StringComparison
Intern
CompareTo
CopyTo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
FileSystemInfo
FileVersionInfo
GetVersionInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
Bitmap
System.Linq
get_Year
ToChar
DirectorySeparatorChar
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
Encoder
Buffer
ServicePointManager
ManagementObjectSearcher
SecurityIdentifier
ElapsedEventHandler
ToUpper
CurrentUser
EncoderParameter
BitConverter
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
get_Major
get_Minor
GetLastWin32Error
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
ReadIntPtr
get_Hour
Graphics
System.Diagnostics
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
Matches
GetDirectories
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
ReadAllLines
Rfc2898DeriveBytes
ReadAllBytes
GetBytes
get_Values
ElapsedEventArgs
ICredentials
set_Credentials
get_DefaultCredentials
set_UseDefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
ManagementClass
FileAccess
get_Success
GetCurrentProcess
MailAddress
VaultEnumerateVaults
get_Attachments
set_Arguments
get_Exists
arrays
get_Keys
get_ModifierKeys
Concat
AppendFormat
ImageFormat
Subtract
ManagementBaseObject
ManagementObject
set_Subject
Collect
set_AllowAutoRedirect
Unprotect
System.Net
get_Height
op_Explicit
WaitForExit
VaultCloseVault
VaultOpenVault
get_Default
GetValueOrDefault
IAsyncResult
set_UserAgent
SmtpClient
System.Management
XmlElement
Attachment
Environment
XmlDocument
get_Parent
GetParent
get_Current
get_Count
get_TickCount
set_IterationCount
BCryptDecrypt
BCryptEncrypt
TrimStart
Convert
set_Port
HttpWebRequest
XmlNodeList
ToList
set_Host
ICredentialsByHost
set_Timeout
GetKeyboardLayout
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
RegOpenKeyEx
get_Day
ToByteArray
InitializeArray
ToArray
ToCharArray
Consistency
set_Body
get_Key
set_Key
OpenSubKey
RegCloseKey
MapVirtualKey
ContainsKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
System.Security.Cryptography
GetExecutingAssembly
Multiply
BlockCopy
System.Runtime.Serialization.Formatters.Binary
get_TotalPhysicalMemory
CreateDirectory
Registry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
IsNullOrEmpty
BCryptGetProperty
BCryptSetProperty
<PrivateImplementationDetails>{AFE3D902-83BE-4080-AFF2-017421D1E2F2}
$d6a2833b-04cd-4bc1-a67f-3c81bc0d974e
WrapNonExceptionThrows
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
pp p!p"p#p$p%p&p'p(p)p*p+p,p-p.p/p0p1p2p3p4p5p6p7p8p9p:p;p<p=p>p?p@pApDpEpFpGpHpKpe9q9
BACAIHJHUTVTWT[Zbadcecfcgchciclkrqsq}|~|
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
c32e98c6-4205-4798-904b-ffd769a7f33f.exe
LegalCopyright
OriginalFilename
c32e98c6-4205-4798-904b-ffd769a7f33f.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav Clean
Lionic Clean
Elastic Windows.Trojan.AgentTesla
MicroWorld-eScan Trojan.GenericKDZ.101933
ClamAV Win.Packed.Generic-10003641-0
FireEye Generic.mg.1c995704e0c0c3de
CAT-QuickHeal Clean
ALYac Trojan.GenericKDZ.101933
Malwarebytes Generic.Malware.AI.DDS
VIPRE Trojan.GenericKDZ.101933
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005a7a471 )
BitDefender Trojan.GenericKDZ.101933
K7GW Trojan ( 005a7a471 )
Cybereason malicious.2ea3fb
BitDefenderTheta Gen:NN.ZemsilF.36348.km0@aaQI4s
VirIT Trojan.Win32.MSIL_Heur.B
Cyren W32/MSIL_Kryptik.IZQ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba TrojanPSW:MSIL/AgentTesla.5447b4a1
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Agent.167936.BBZ
Rising Spyware.AgentTesla!8.10E35 (CLOUD)
Sophos Troj/Steal-DJM
Baidu Clean
F-Secure Trojan.TR/Spy.Gen8
DrWeb BackDoor.SpyBotNET.62
Zillya Trojan.AgentTesla.Win32.6635
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXDGGZ
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
Trapmine malicious.moderate.ml.score
CMC Clean
Emsisoft Trojan.GenericKDZ.101933 (B)
SentinelOne Static AI - Malicious PE
GData MSIL.Trojan.PSE.10FWF4K
Jiangmin Clean
Webroot Clean
Avira TR/Spy.Gen8
MAX malware (ai score=82)
Antiy-AVL GrayWare/MSIL.Kryptik.AA
Gridinsoft Trojan.Win32.AgentTesla.bot
Xcitium Malware@#1by4bhgx7bzr4
Arcabit Trojan.Generic.D18E2D
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Trojan:MSIL/AgentTesla.EH!MTB
Google Detected
AhnLab-V3 Infostealer/Win.AgentTesla.C5356829
Acronis suspicious
McAfee Artemis!1C995704E0C0
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Trojan.MSIL.AgentTesla.PInv.Heur
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXDGGZ
Tencent Trojan-PSW.MSIL.Stealer.kc
Yandex Clean
Ikarus Trojan.MSIL.Spy
MaxSecure Trojan.Malware.74396735.susgen
Fortinet MSIL/AgentTesla.F!tr.spy
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.