Static | ZeroBOX

PE Compile Time

2023-07-05 18:28:01

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x00028574 0x00028600 6.2213628173
.rsrc 0x0002c000 0x00000546 0x00000600 3.99351467733
.reloc 0x0002e000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0002c0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0002c35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
KDBM(&
\/oI
1SPS*
com.apple.Safari
Unable to resolve HTTP prox
*/?%JO\!m}#
,^7-rzvY7erdB
*0ogkDff
2.4}}k|jjO.^G
_{errd3$-.9"
kz{z{{z{yd$ (.
kb{errq=9kp
kp{e{zk
k8<$/%"
ck{e~d*''"1$
fXLnxgjm
T20<q3>=0><626*.
#rgrwccr
xnshsN
-@STjF
wAIEFYZKIq
b}hQ[Pn
yDs{2@}
mnsuonb
TUY@_s
4D3G479E3072,4CC9,GB55,0571,5147@0G3
gbglce`xc
'[c}TKFNSIBCBUd
+DO?N;K?KNJLKPME8IPHL8IPK<M;P?OEH>?JJ
D7(%-0*! !6
d73+ *-
uV@iMA@BB4L@BC3FX73M4XG44AXLCCGXF33CMM6F
piCNF[AJKJ]l
KJKAJ[Wj
\X@KAFx$
ssssssssssssnssssnssssnssssnssssssss
w7-&.&/
1,7" *7-&+76
|^pgqump@AW
Fzas25/*6h(/'.%?#-
5#%(#4# #4
4#236+)
"l5<; &!}n
1n{nk3
?2:'=676!
'5< <!0:
,n-.pXOIXC^|pXJC_C^OEap
@QDi!4!
2%37/2
4.%#.%
l5<96?"
>5*FGLQY[J_]
^8jgdj
1gH^ROROU^_rgWRZvR_^IXUrg^IZLO]Th
#'BFGQLTPPBsSWNp
Z@K\\[M
&2;<!!0
@GGQFPPuZFA@Qf
DMHGNSqUS@UR
Pdcd#~hadkb
jjo`irsg
_NHRIS__]`
'7,;(,;-
gzJ(ckgdN
`[ubtphuE[ldhkA[
E?P 1=1kv6+*+",6
$-('.3123$24--
ydndsn$mcldeiVxo~knz_VdsN
\$WH44
idgjib
.)sirhddf
@<*7/++9(
35yorgrwccr
ovblckjfYLPB(KUSk`uJY`wdrqcjV
a?7;4(?)/
|wbwr;~bcw
3XQT[ROMOXNH
af]S\TUYftjlT_Juf
L]FDL[
n+dyd/oqWesnO
ozt{sr~3oxnh!
U~k~{Cllz||^?kzqmzkqV?zk~ivmOC
gp{mx|zphp7?3< 7!'px|
'xdrp#5'$d{!(/")%(#f55'
hz4(><oykh(7mdcneido*yykZ6
}zBMI[xor^
ytihnttbT[5'WDTinP[k~ulnuW'insufJ[BUFPSAHT
[S_pJMQv
@;;h%-!
;,;<3+
XZ@453.;956Z#?1Z?.;,3(*!
MNOHIJ
J!X^C\
W\AZOIGXO`
_KjN:)6-
1_/+9#
iX\N|zie[
bSDBIIHd
LDNRv{TBSNUHQFa{
SIBNKd{wsaSUFJt
iAEWNBF
xJw{w-wpjoswE_f{vofG#qfgmbnnl@#SWE_*5;{+#pfojE#nbqdlqS_
-!-w-*05)-
+<=78446
poa!qy*<50y48+>6+
fRIZE^hAIX_U
INTQMI{aXEHQXy
OXYS\PPR~
P\OZROmaXORInQ\HIOTka
g(?,(?
)`f{D/
dt!ov@mzimzl#
|;`hdkZw`vpZw`sw`v9
9bjfiXubtrXubqubt(;
UU|&0-511#2
0'40'1~
PF[CGGUDkFQGAkFQBFQG
G9lyZ8}pL
'zJH@E(rhsieeGZ
R@HNi.
7yIz^^L}
$2322E6F04544E<<F7`5557504BBG137=XokkhpqKXwahmbkvTXiapw}wfqW$cjmcewwaI$wsk`jmSXjkmwvaRpjavvqGXPJ$wsk`jmSXpbkwkvgmIXavespbkWX
IIHII>M=KONOO>GG=L
NNNLNKO99<JHLF#
,\O,3,
(*Mlzg
{{iX(X\\@
QYRDYAEEWf
vDAIEm
A~_ZR^v
~\JWOKKYh
Kz`kckbKkm|{a}k\~
:YCH@HAhTYDYCHId]
oV@]EAASBQ\KA
S?^WPV^MLVUPXT
*/'+>)
>) )4#
#4'12 )
)e\^XKVMje
XBYCOOmp
vqmJ1RMR
_k~`vkswweT
Tj]XP|
PCTA~
tw,?(="N
},$2&6'%5#">eEdDbB013?G<=:Y8g74F) !./,-*+(c`ano
vwtursp
]]O~~a~
NNN\mmipn
thryup_<Qy
}35BBF6FEFO2CZNOC6Z@14CZ31C1Z@C4BGNE@
zDo4,4s{wXdsr
]JWLkd]JWLkd\JQZTQYud
(9vqkpjffD
K1':"&&4
10!%,'6;
~skSTja~skQ\XoaXYRs
JRjaxo|ji{rn
0n2d~j
C/[3'1,400"
gEYVXe
sex`ddvG
k`muWKDJw
)p\KX\K}rm`xZFIGzrK\OYZHA}
}\dvzEwa|d``rC
aveav@OP]Eg{tzGOvardgu|@
LGQLTPPBsOLQWML`
^>):>)
)>-;8*#
slb"r)?63
7;(=5(
TGCCQ@
[MDAnEIZOGZx
oVEAASB
4bquugv
*$#$c.#;,?9!8
@veaasb
;CNVartlU
f ' g*'?(;=%<
7\bow@SUMt
^S@DDVG
AizwoXKMUl
>:ktz:j1'.+
/#0%-0
L@.4*6$va`ekhjsk@N
vwrM!?#1ctup~}
4nisv4i}tsnn
vvuhntuYtusn{ysnt
rno[4tusn{ysnt
rno{4}tsvvuhntuy4~p
{$&*g"%(=%(9
x38-8=))8
RUOTNBB@}DMQSTQ
SP\PKPMO
i$ESNVRR@Q
-~qy||ybD#
.2z`{ammO
?;|<3;>>; &
AwxpuupkM
CVCF}PGQW}JALG@IPMU~JALG@IPMu~nsq[o~
z'0'%#,#
b0'&#-.,5-
b6',0'6,
4#5(044&
5" &)&
#&(+)0(
"5&03!(
3%8 $$6
k".mK;aJM8Jwp{
Fpf{wg}P
34:4/2
/sczw`Is{wxdsec
-mxmH,bekc@P
;2781,
Ns'R/:/
[j#%ou8$*
<arc~{fd9dyxyp~d
p80<3/8.
98)-$/>38
/5k}`x||n_
\][FSQ[^BBs
2u|rqdC0qbu`_Lubqgdv
C0qbu`_
RESu|RESWORbXEDNAy|XEDNAy
\DX\^CYr
":&" ='
GPFBZGw
VAWqxWQHtAIKVLgxKM@QPwAHTEi
?%0!)+
-!3ULYLi
_H^xqBJD@l
vawskvFpjaG
DSEcjDSEAYDtBXSu
d`F]VWZq
U~+~nio
?'&;0
DJ%' :;>
%nckfqnQ
i|iL(zm{]Taldi~a^
J#grgB&tcuSZiotroEZvsitAghojgrgE
E)gX$1$
RESu|NARu|AIDEmZOcU
nyoksn^<s}~yuP
|:/:{)>(
)>(,4)
{(/5>6>7
^I_yp^I_[C^n
UOMZE^|
/eJFJJFj
9.8<$9
3cwpV%ULT
Y1h}hM){lz\Uo{|Z)Y@X
"M@PWQ
N(DSZYNUz
>Koxqre~QKv{{~mxZK
a^BLIHjFBt
z{YuqGHuxx}n{YH
CT}I^YBx
-:3'07,
&:<1 !&-60%m
GFLELd
euRzomkmgRobbgtaCR
V$+f3#$"
GFFdLEHy!
%;VW_YJ|][q
tFGOIZlMKatGLGEGkt
G+cMZLHPM}cT\PSyc
Ue7p`ga
i|ilxxi
75555555*
ueay~e
1@'.)2434%4#/i
cy6\>4
QvC1&*%*7-&'*7 &)!,j
nQ\TISXYXO^
```-fff
Yt"!%qxc
e+(,xqj
IGGsry[qx
IZE^hAIX_U
fS^o J("i
J$xi8%99/)%8
.~-#(xz.#
"#6x**/6}~x+6*()}}+,)!
]]qCCqffqJJqccqWWWW
/! 9%c
6/.7+l7;&7
c[89 <z
.]]qCCqffqJJqccqWWWW
LIHZBAL
JCDYD_z
gkox~YofcL*ozs~*le*ygkox~y*xo|e*~y
`*no}effk*yc*yocx~dOo|egoX
<rl8u>me}we+$-1e66 )e6,e "$7*1
<17 5*7
! ?,)$,7
e -1e#*e ?,
\][A@Wd&
RvNJ2MH9I9;;3;&<282&I:;:&H2N9&>;>OOH>Op
]+f-vl3#:7
ZEVlZR^q
:n#h;3*3}r{g3``v
3`z3v~r]t}zag@3v{g3u|3viz@0
w#o%v~#n%~1*~2?+/;~*10~-7~;3?
~;6*~81~;$7
w}65}mw
MEIfOFAZ\{
ck5a-g4<a,g<sh<p}imy<hsr<ou<yq}R{runhO<yth<zs<yfuO8
7q%h#px`x690,x++=4x+1x=*7,
!,*=(7*
<="1491*=
x=0,x>7x="1
Rw&4{/
b)*bzr/b)rh7(;
v4.0.30319
#Strings
/Ug
' 8 j w
!2"Y"{"
__StaticArrayInitTypeSize=10
__StaticArrayInitTypeSize=11
HMACSHA1
Nullable`1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
get_Item1
HMACSHA512
__StaticArrayInitTypeSize=12
__StaticArrayInitTypeSize=32
Advapi32
kernel32
Microsoft.Win32
user32
ReadUInt32
ToUInt32
ReadInt32
ToInt32
KeyValuePair`2
Dictionary`2
get_Item2
Tuple`3
get_Item3
__StaticArrayInitTypeSize=24
__StaticArrayInitTypeSize=144
ToUInt64
ReadInt64
ToInt64
__StaticArrayInitTypeSize=84
288990d1-96da-4330-9be5-0eec1bc03785
__StaticArrayInitTypeSize=16
ReadUInt16
ToUInt16
ReadInt16
ToInt16
HMACSHA256
__StaticArrayInitTypeSize=6
get_UTF8
<Module>
get_FormatID
get_ASCII
System.IO
get_IV
set_IV
value__
ProtectedData
PropertyData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
WndProc
FromFileTimeUtc
get_Id
GetWindowThreadProcessId
GetProcessId
GetProcessById
OpenRead
SHA1Managed
RijndaelManaged
Interlocked
set_Enabled
add_Elapsed
get_IsInvalid
get_Guid
GetField
TrimEnd
ReadToEnd
Append
get_Second
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
Clipboard
Replace
IdentityReference
set_Mode
FileMode
PaddingMode
CryptoStreamMode
CompressionMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
VaultFree
FromImage
SendMessage
MailMessage
AddRange
CompareExchange
CredentialCache
EndInvoke
BeginInvoke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CreateHandle
GetTypeFromHandle
handle
Rectangle
ToSingle
DeleteFile
MoveFile
get_MainModule
ProcessModule
get_Name
set_Name
get_FileName
set_FileName
GetModuleFileName
GetTempFileName
GetFileName
get_ModuleName
get_OSFullName
get_FullName
get_UserName
get_ComputerName
get_ProcessName
get_ProductName
GetProcessesByName
GetDirectoryName
System.Net.Mime
FromFileTime
ToFileTime
DateTime
GetLastWriteTime
SetLastWriteTime
SetCreationTime
GetLastAccessTime
SetLastAccessTime
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
DataProtectionScope
set_MediaType
ValueType
SecurityProtocolType
GetType
ContentType
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
Create
MulticastDelegate
GetKeyboardState
GetKeyState
Delete
get_CanWrite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
get_Minute
ReadByte
ToByte
get_Value
get_HasValue
GetValue
GetPropertyValue
set_KeepAlive
Remove
288990d1-96da-4330-9be5-0eec1bc03785.exe
get_Size
get_HashSize
set_BlockSize
get_KeySize
Serialize
Deserialize
Initialize
SuppressFinalize
Resize
SizeOf
get_ItemOf
LastIndexOf
get_Jpeg
System.Threading
set_Padding
UTF8Encoding
GetEncoding
System.Drawing.Imaging
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
GetPrivateProfileString
ToString
GetString
Substring
System.Drawing
get_Msg
ComputeHash
get_ExecutablePath
GetTempPath
GetFolderPath
get_Width
get_Length
SetLength
GetWindowTextLength
EndsWith
StartsWith
get_Month
PtrToStringUni
AsyncCallback
TransformFinalBlock
TransformBlock
get_CanSeek
AllocHGlobal
FreeHGlobal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
Rijndael
System.Collections.ObjectModel
System.ComponentModel
System.Net.Mail
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
bcrypt.dll
System.Xml
set_IsBodyHtml
set_SecurityProtocol
Control
set_EnableSsl
FileStream
get_BaseStream
GetResponseStream
DeflateStream
CryptoStream
MemoryStream
get_LParam
get_WParam
get_Param
get_Item
set_Item
VaultGetItem
OperatingSystem
SymmetricAlgorithm
KeyedHashAlgorithm
Random
ICryptoTransform
ToBoolean
IsLittleEndian
CopyFromScreen
get_PrimaryScreen
ChangeClipboardChain
SeekOrigin
get_OSVersion
get_Version
System.IO.Compression
Application
get_Location
GetVolumeInformation
SystemInformation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
AttachmentCollection
KeyCollection
get_Position
set_Position
get_ContentDisposition
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
InvalidOperationException
ArgumentException
get_StatusDescription
System.Runtime.ConstrainedExecution
StringComparison
Intern
CompareTo
CopyTo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
FileSystemInfo
FileVersionInfo
GetVersionInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
Bitmap
System.Linq
get_Year
ToChar
DirectorySeparatorChar
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
Encoder
Buffer
ServicePointManager
ManagementObjectSearcher
SecurityIdentifier
ElapsedEventHandler
ToUpper
CurrentUser
EncoderParameter
BitConverter
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
get_Major
get_Minor
GetLastWin32Error
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
ReadIntPtr
get_Hour
Graphics
System.Diagnostics
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
Matches
GetDirectories
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
ReadAllLines
Rfc2898DeriveBytes
ReadAllBytes
GetBytes
get_Values
ElapsedEventArgs
ICredentials
set_Credentials
get_DefaultCredentials
set_UseDefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
ManagementClass
FileAccess
get_Success
GetCurrentProcess
MailAddress
VaultEnumerateVaults
get_Attachments
set_Arguments
get_Exists
arrays
get_Keys
get_ModifierKeys
Concat
AppendFormat
ImageFormat
Subtract
ManagementBaseObject
ManagementObject
set_Subject
Collect
set_AllowAutoRedirect
Unprotect
System.Net
get_Height
op_Explicit
WaitForExit
VaultCloseVault
VaultOpenVault
get_Default
GetValueOrDefault
IAsyncResult
set_UserAgent
SmtpClient
System.Management
XmlElement
Attachment
Environment
XmlDocument
get_Parent
GetParent
get_Current
get_Count
get_TickCount
set_IterationCount
BCryptDecrypt
BCryptEncrypt
TrimStart
Convert
set_Port
HttpWebRequest
XmlNodeList
ToList
set_Host
ICredentialsByHost
set_Timeout
GetKeyboardLayout
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
RegOpenKeyEx
get_Day
ToByteArray
InitializeArray
ToArray
ToCharArray
Consistency
set_Body
get_Key
set_Key
OpenSubKey
RegCloseKey
MapVirtualKey
ContainsKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
System.Security.Cryptography
GetExecutingAssembly
Multiply
BlockCopy
System.Runtime.Serialization.Formatters.Binary
get_TotalPhysicalMemory
CreateDirectory
Registry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
IsNullOrEmpty
BCryptGetProperty
BCryptSetProperty
<PrivateImplementationDetails>{0D5062A8-FD58-45A1-A608-E1843F04747B}
$40325314-517f-463a-8288-5444582655ef
WrapNonExceptionThrows
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
pp p!p"p#p$p%p&p'p(p)p*p+p,p-p.p/p0p1p2p3p4p5p6p7p8p9p:p;p<p=p>p?p@pApDpEpFpGpHpKpe9q9
BACAIHJHUTVTWT[Zbadcecfcgchciclkrqsq}|~|
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
288990d1-96da-4330-9be5-0eec1bc03785.exe
LegalCopyright
OriginalFilename
288990d1-96da-4330-9be5-0eec1bc03785.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.Common.CD4A8B54
Lionic Trojan.Win32.Stealer.12!c
Elastic Windows.Trojan.AgentTesla
DrWeb BackDoor.SpyBotNET.62
MicroWorld-eScan Trojan.GenericKDZ.102134
ClamAV Win.Packed.Generic-10003641-0
FireEye Generic.mg.e94f7fd09efeb9e9
CAT-QuickHeal Clean
ALYac Trojan.GenericKDZ.102134
Malwarebytes Generic.Malware.AI.DDS
VIPRE Trojan.GenericKDZ.102134
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005a7a471 )
BitDefender Trojan.GenericKDZ.102134
K7GW Trojan ( 005a7a471 )
Cybereason malicious.d23dc8
BitDefenderTheta Gen:NN.ZemsilF.36350.km0@a88N1me
VirIT Trojan.Win32.MSIL_Heur.B
Cyren W32/MSIL_Kryptik.IZQ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba TrojanPSW:MSIL/AgentTesla.cbb4b99d
NANO-Antivirus Clean
ViRobot Clean
Rising Spyware.AgentTesla!8.10E35 (CLOUD)
Sophos Troj/Steal-DJM
F-Secure Trojan.TR/Spy.Gen8
Baidu Clean
Zillya Trojan.AgentTesla.Win32.6640
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXDGEZ
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
Trapmine malicious.moderate.ml.score
CMC Clean
Emsisoft Trojan.GenericKDZ.102134 (B)
Ikarus Trojan.MSIL.Spy
GData MSIL.Trojan.PSE.10FWF4K
Jiangmin Trojan.PSW.MSIL.eoth
Webroot W32.Trojan.MSILZilla
Avira TR/Spy.Gen8
MAX malware (ai score=80)
Antiy-AVL GrayWare/MSIL.Kryptik.AA
Gridinsoft Clean
Xcitium Clean
Arcabit Trojan.Generic.D18EF6
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
Microsoft Trojan:MSIL/AgentTesla.EH!MTB
Google Detected
AhnLab-V3 Infostealer/Win.AgentTesla.C5356829
Acronis suspicious
McAfee Artemis!E94F7FD09EFE
TACHYON Clean
DeepInstinct MALICIOUS
VBA32 Trojan.MSIL.AgentTesla.PInv.Heur
Cylance unsafe
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXDGEZ
Tencent Malware.Win32.Gencirc.13e5c77a
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.74396735.susgen
Fortinet MSIL/AgentTesla.F!tr.spy
AVG Win32:PWSX-gen [Trj]
Avast Win32:PWSX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.