Static | ZeroBOX

PE Compile Time

2023-07-02 02:06:29

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x000284d4 0x00028600 6.23529207195
.rsrc 0x0002c000 0x00000546 0x00000600 3.99441714096
.reloc 0x0002e000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0002c0a0 0x000002bc LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x0002c35c 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
,b I@|
/T #S|
KDBM(&
\/oI
1SPS*
com.apple.Safari
Unable to resolve HTTP prox
D(|mz6&x
RETUPMOc
R300y..y
c::::l''l
ZR^qMZLj5
BJFiKKRath-
L"FPOBEN
%^@WWA
(N_^_^^_^\A
)NG^@WWT
9NU^@^_N: N
9FN^@[A
Kyop}z
Lcx')? -*
x,=,#.
, 6)$#
OKPMHMOKWdKVF]^AI
:>%8=8:>"
>#3(+4<
u`upddu
vWxmdI
%-3o"1P
5r>.pe
'/# ?<-/
qV{~rn`P
s@YAJWKEu
=/,%0,"
XvOENp
diL|~xIb
~$T#W$')U# '"<$SS)<WR%%< %'!<%!$'P W#
nhwzrou~
~iX;y~L$
*'/2(#"#4
f"4)155'
f(/'+)
f51)"(/
_laitnederC dednetxE swodniW$
nCkgobiY
E)38081
8>/(2.8
<{eQHRYQYPyNSH]_UHRYTHI}L
\resworBCU
BGZ[B^rZ\A^^[}
@AGZOMGB^^o
KB^^orKB^^or]KBGh
@ACCAmr*
;|{adx&fai`kqmcT{mkfmzmnmzXTzm|}xegK(mdxxIT
PY^ECD
AHOTRU
f9,9<wd
+-:)10<r
6)$,1+ ! 7
1#*6*7&,
qcLS^VKQZ[ZM|cKYPLPM\Vrc
m|~VAGVMPr~VDMQMPAKo~
puS^VKQZ[ZM\
+V:8>-0+
;:+/&-<1
+3*>9:
X_TIACRGE
\"^Cn.(/
LZG_[[IxX\E{
"48%8%?45
854#2?
4#0&%7>
"9j|ay}}o^~a^
mzimzLokrL
AY`klIakdhhjFYdwjap@YhhjfidpTY`wdrqcjV
DISXOOH^
[nnxoyy\sohixO
H{,.X'Y+Y*Y<(5
(D^-8`ilcjwUqwdqv
l>`emA
-O^_[M@Op
[LF]GZw
NLCJXwM[IZ@X[[IXwZM\[IE
utEFBD
EFBD@EFBD
=*<8 =
<||{flfql&oanfgkTzm|ilx]TfqL
R7ogkdxoy
2rsqy}x@nyh}xlI@reX
{j0*1+''%
GOCLPGQW
nxe}yykz
x*?*/;;*
SELIFORP|ISp|
ATADPPA
/v4 .!)($
"5&03!(
>0?76:w+<*,!
!TATQiFFPVVt
AP[GPA[|
PATC\Ge
m9(#?(9#
m(9,;$?
eWZZ_lSZ_p
vI\ILXXI
KJ]NJ]KLV][]JdYTTQb]TQ~d
Uk~knzzk
+"d|}h>cbufbucd~usubLq||yJu|yVL
[Nd.(5
l!=+)zl~}="xqv{p|qz?ll~O#
Y58$20cugd$;ahobiehc&uugV:
ORSUOOYo`
oRUk`PENWUNl
RUHN]q`yn}khzso
G?sex`ddvG
j>rB7H
HJP$%#>+)%&J3/!J/>+<#8:1
^wyjzG@~
q}ukE^LAkq
{f}hn`
hG)Y]O
VARVAw
{OYD\XXJ{
>yly|hhy+
u7|sfsvbbs
2=15'>26=
,|p|&|{adx|NTx|nkT;
_z484n43),04
`2%$.!--/
ivx8h`3%,)
`-!2'/2
,!542)
ECY[OXYXw
c,q!mzimzl#
ZCuXO\XOY
Ids`dse*
WNxUBQUBT
BDYFiDS@DSE
=*9=*<s
T\P_nCTBDnCTGCTB
bz~~l}R
;c^6cvU7r
k&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&6&@
qrs|}~
xyz{defg`abclmnohijQRS\]^_XYZ[DEFG@ABCLMNOHIJ23<=>?89:;&
TA`:&=
s4#04#
Xa{`zvvT
%%3$22
Zz"08>
EC&`srss
v!tttvtqu
.**)10
6 ),#*7
.**)10
1#*6*7&,
7$21#*
{"#""U&V $%$$U,,V'p%%%'% $RRW!#'-H
{{x`a[Hgqx}r{fDH
{{x`a[H$:"%Hqw}rr[H`r{g{fw}YHqfuc`r{G
}kvnjjxI9IXTP
5E511-
9Y\TXp
GQLTPPBs
Zgfqz`fuDHwzmGqb}`wUH`r{g{fw}YHqfuc`r{G
GSV^Rz
*GUYFUB`\YQ]H_vlH_V_BUqlUBQGDV_clbuceod~ubbesoiu{x
4`DMC@UTBDYd/
YX(@5084
5084!6
poa!qy*<50y48+>6+
58,-+0
7$#~$>%?33
V5II_H^^{VS[w
zr^3ravc\
T'1%5$&6 !=fFgGaA320<D?>9Z;d47E*#"-,/.)(+`cbml
utwvqps
zI\ILXXI
iY``rCC\C
/ttfWWSJT
}0*!-(
HOUNTXXZgOU^RWx
D}e}:2>1-:,
zbz=59
*=<1.7*
]@S0=%
sETB_GCCQ`
id|FKOx
6XNSKOO]l
epxnskoo}L
eraerDKTYAc
p~CKrev`cqxD
yK\OK\jezwoMQ^Pme\KXNM_Vj
DROWSSApLORTNOc
cnvTHGIt
RWZBfqs}@
q1a:,%
$(;.&;
Vdwssap
]88M@Xo|zb[
vRpTYAvec{B
M.#5<9
=1"7?"
UUrur5xumziownGXUMziowNG
#BOW`sumT
&*9,$9
(' '`- 8/<:";
q1a:,%
$(;.&;
KX\\N_
Bhvjx*=<9746/7
ZNG@]]Lz[LEEF[]GFjGF@]HJ@]GLA]\h
GF@]HJ@]GLA]\H
NG@EEF[]GFJ
YWxonyhWxynx~WnydhWxleb
nxTedffdhWLE+`gj
gj[W%F%]%JWnyj|
ckghmeoh
zxt9|{vc{vg
}h}xll}
b;:/y$#9"8446
2;'%"'y
5'uvzvmvki%
3z(+'+0+64kx
+#xp|s2!
_ITLHHZK
5hountxxzGwzytw|Ghi~hnGuzrwwriOG
"$#9"844
S\TQQTOI
^QY\\YBd
hQ>+.d+>+.
")$/(!8%=
")$/(!8%
itlhhzKxu^
itxhr_
ZLQ]MWZ
lru_nigiro
oUE\QFoU]Q^BUCE
;j9)0=*
8.3+//=,
(|SZTWBe
D|.m}di~Wlzg
9%.8-)/%=%~blXcbsw~udib%
umxmH,bekc@P
+Noi#9thf
p}{1+fzt
K{5#>&""0!
?-+a{6*$
ZYH]JUNlOOR
I5V^XU^
YORJNN\M
?U}|`y=`}zt|
nw?/LGQD@FLTLG
a|~||9
?MNU$##fO>#!##fOMH
1`0FB_XV^]nK^\
c~|~~;
~"8fpmuqqcR
}-7h`lc
/uo1':"&&4
&[R\_Jm
_L[Nqb[L_IJXQm
c.]J\X@]m
WJKANv
IlcvcF"pgqW^pgqump@zgflc[^zgflc[
pm\I\y
OXNhaPHTPROU~
ATEMOk
%fiy~x
fhPXVR~
_H^xqBJD@l
"8+</%
ZM[}tZM[_GZj\FMk
752(),
752(),
pepU1ctbDM
~vpcUM~u~|~R
4grgB&tcuSZiotroEZvsitAghojgrgE
-8/9=%8
j%+(/#
5H!6 $<!
s '=6>6?
Svzb2'2
!6 $<!
s '=6>6?
n%uebd
W'=?(7,
bT1oTB
^tcqcoPksokitnEZucjsbikZahorrcuZ3tohvocjUZehO&tothc@
ozoJ.|k}[Rh|{].^G_
o<*58?
}`zQ2wuvW
Imzspg|SItyy|ozXI
qPLBGFdHLz
$2)"2%$.5(
#W2#60#29+
]<\LKM
3`akbkC#E
cwXMoIOe
cVpXMOIOEpM@@EVCap
9.#52.
9%70370666
.'%%%%%%%*
*JBWZLSB
ra5 ,3.'a$5(
G"$)"26"4
5!FOHSURUDUBN
bus|ty?
wjp{z{l}
;AU]_BXS
D,3R999t???
O8^BQXSzBUS\Ty
>707081
z{pRxqvqv~w\
HEFhK^KnSOa
+WD[@v_WFAKa
:M "?+MGM9.(!(>
`Qz4+/
O0diROSSECORP$
4//9.88
~r up~%~vkq't'kr#vrkw~sqk s v"t'#
l./6*m6:'6
,D_^G[
\#:)|=<:'20:?##2
=?11't ;::57t951&
FHI[C@M
KBEXE^{
Nf01#;885t ;:t'=t3:= =&
sURHYD
XMUODSSTB
XSNUBDSHE
M@SUODb
IE!H',== ;>i,+i=&''(*i$(,;=
C\OuCAGTIRu
:w<g}"7>
,x]?5~}5-%x5~%?`
lV`hdK
5(y-a+xp-`+p?$p<1%!5p$?>p#9p5=1
p58$p6?p5*9
+g-~v+f-v9"v:7#'3v"98v%?v3,?
v3>"v09v3,?
8#8l!j91(1
pye1bbt}1bx1t|p_v
xceB1tye1w~1tkxB0
DPKS^JNZKPQLVZR^qXQVMKlZWKYPZEVl8
'{/c)zr/b)r<3:&r!!7>r!;r7 =&
+& 7"=
67(;>3; 7
r7:&r4=r7(;
e.-e}u(e.uo0/<
v4.0.30319
#Strings
2Xj
+ < n {
__StaticArrayInitTypeSize=10
__StaticArrayInitTypeSize=11
HMACSHA1
Nullable`1
IEnumerable`1
ICollection`1
IEnumerator`1
IList`1
get_Item1
HMACSHA512
__StaticArrayInitTypeSize=12
__StaticArrayInitTypeSize=32
Advapi32
kernel32
Microsoft.Win32
user32
ReadUInt32
ToUInt32
ReadInt32
ToInt32
KeyValuePair`2
Dictionary`2
get_Item2
Tuple`3
get_Item3
__StaticArrayInitTypeSize=24
__StaticArrayInitTypeSize=144
ToUInt64
ReadInt64
ToInt64
__StaticArrayInitTypeSize=84
__StaticArrayInitTypeSize=16
ReadUInt16
ToUInt16
ReadInt16
ToInt16
HMACSHA256
__StaticArrayInitTypeSize=6
0a4dedf1-f1a1-4dbf-9533-0afd15648257
get_UTF8
<Module>
get_FormatID
get_ASCII
System.IO
get_IV
set_IV
value__
ProtectedData
PropertyData
mscorlib
System.Collections.Generic
Microsoft.VisualBasic
WndProc
FromFileTimeUtc
get_Id
GetWindowThreadProcessId
GetProcessId
GetProcessById
OpenRead
SHA1Managed
RijndaelManaged
Interlocked
set_Enabled
add_Elapsed
get_IsInvalid
get_Guid
GetField
TrimEnd
ReadToEnd
Append
get_Second
get_Millisecond
GetUpperBound
GetLowerBound
set_Method
Clipboard
Replace
IdentityReference
set_Mode
FileMode
PaddingMode
CryptoStreamMode
CompressionMode
CipherMode
SelectSingleNode
XmlNode
get_Unicode
get_BigEndianUnicode
IsTextUnicode
VaultFree
FromImage
SendMessage
MailMessage
AddRange
CompareExchange
CredentialCache
EndInvoke
BeginInvoke
GetEnvironmentVariable
SetEnvironmentVariable
IEnumerable
IDisposable
ToDouble
get_Handle
RuntimeFieldHandle
SafeHandle
GetModuleHandle
RuntimeTypeHandle
ReleaseHandle
CreateHandle
GetTypeFromHandle
handle
Rectangle
ToSingle
DeleteFile
MoveFile
get_MainModule
ProcessModule
get_Name
set_Name
get_FileName
set_FileName
GetModuleFileName
GetTempFileName
GetFileName
get_ModuleName
get_OSFullName
get_FullName
get_UserName
get_ComputerName
get_ProcessName
get_ProductName
GetProcessesByName
GetDirectoryName
System.Net.Mime
FromFileTime
ToFileTime
DateTime
GetLastWriteTime
SetLastWriteTime
SetCreationTime
GetLastAccessTime
SetLastAccessTime
AppendLine
get_NewLine
Combine
LocalMachine
Escape
Unescape
DataProtectionScope
set_MediaType
ValueType
SecurityProtocolType
GetType
ContentType
FileShare
Compare
System.Core
PtrToStructure
get_InvariantCulture
Capture
HttpWebResponse
GetResponse
Dispose
Reverse
Create
MulticastDelegate
GetKeyboardState
GetKeyState
Delete
get_CanWrite
STAThreadAttribute
CompilerGeneratedAttribute
GuidAttribute
SecuritySafeCriticalAttribute
ExtensionAttribute
AssemblyFileVersionAttribute
FlagsAttribute
CompilationRelaxationsAttribute
ReliabilityContractAttribute
ParamArrayAttribute
RuntimeCompatibilityAttribute
SuppressUnmanagedCodeSecurityAttribute
set_UseShellExecute
get_Minute
ReadByte
ToByte
get_Value
get_HasValue
GetValue
GetPropertyValue
set_KeepAlive
Remove
0a4dedf1-f1a1-4dbf-9533-0afd15648257.exe
get_Size
get_HashSize
set_BlockSize
get_KeySize
Serialize
Deserialize
Initialize
SuppressFinalize
Resize
SizeOf
get_ItemOf
LastIndexOf
get_Jpeg
System.Threading
set_Padding
UTF8Encoding
GetEncoding
System.Drawing.Imaging
FromBase64String
ToBase64String
EscapeDataString
UnescapeDataString
GetPrivateProfileString
ToString
GetString
Substring
System.Drawing
get_Msg
ComputeHash
get_ExecutablePath
GetTempPath
GetFolderPath
get_Width
get_Length
SetLength
GetWindowTextLength
EndsWith
StartsWith
get_Month
PtrToStringUni
AsyncCallback
TransformFinalBlock
TransformBlock
get_CanSeek
AllocHGlobal
FreeHGlobal
Marshal
NetworkCredential
Decimal
System.Security.Principal
set_Interval
Rijndael
System.Collections.ObjectModel
System.ComponentModel
System.Net.Mail
Kernel32.dll
kernel32.dll
User32.dll
user32.dll
vaultcli.dll
psapi.dll
bcrypt.dll
System.Xml
set_IsBodyHtml
set_SecurityProtocol
Control
set_EnableSsl
FileStream
get_BaseStream
GetResponseStream
DeflateStream
CryptoStream
MemoryStream
get_LParam
get_WParam
get_Param
get_Item
set_Item
VaultGetItem
OperatingSystem
SymmetricAlgorithm
KeyedHashAlgorithm
Random
ICryptoTransform
ToBoolean
IsLittleEndian
CopyFromScreen
get_PrimaryScreen
ChangeClipboardChain
SeekOrigin
get_OSVersion
get_Version
System.IO.Compression
Application
get_Location
GetVolumeInformation
SystemInformation
System.Globalization
System.Web.Script.Serialization
System.Reflection
PropertyDataCollection
ValueCollection
MatchCollection
GroupCollection
ManagementObjectCollection
AttachmentCollection
KeyCollection
get_Position
set_Position
get_ContentDisposition
SearchOption
Win32Exception
CryptographicException
ArgumentOutOfRangeException
InvalidOperationException
ArgumentException
get_StatusDescription
System.Runtime.ConstrainedExecution
StringComparison
Intern
CompareTo
CopyTo
ImageCodecInfo
FieldInfo
FileInfo
CultureInfo
FileSystemInfo
FileVersionInfo
GetVersionInfo
MemberInfo
ComputerInfo
get_StartInfo
ProcessStartInfo
GetLastInputInfo
DirectoryInfo
Bitmap
System.Linq
get_Year
ToChar
DirectorySeparatorChar
StreamReader
TextReader
BinaryReader
SHA1CryptoServiceProvider
MD5CryptoServiceProvider
RNGCryptoServiceProvider
TripleDESCryptoServiceProvider
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
IFormatProvider
StringBuilder
SpecialFolder
Encoder
Buffer
ServicePointManager
ManagementObjectSearcher
SecurityIdentifier
ElapsedEventHandler
ToUpper
CurrentUser
EncoderParameter
BitConverter
BinaryFormatter
SetClipboardViewer
ToLower
JavaScriptSerializer
get_Major
get_Minor
GetLastWin32Error
IEnumerator
ManagementObjectEnumerator
GetEnumerator
RandomNumberGenerator
.cctor
Monitor
CreateDecryptor
CreateEncryptor
ReadIntPtr
get_Hour
Graphics
System.Diagnostics
get_Bounds
Microsoft.VisualBasic.Devices
System.Runtime.InteropServices
System.Runtime.CompilerServices
GetInstances
get_ChildNodes
Matches
GetDirectories
get_Properties
ExpandEnvironmentVariables
GetFiles
EnumProcessModules
NumberStyles
GetSubKeyNames
ReadAllLines
Rfc2898DeriveBytes
ReadAllBytes
GetBytes
get_Values
ElapsedEventArgs
ICredentials
set_Credentials
get_DefaultCredentials
set_UseDefaultCredentials
Equals
CreateParams
VaultEnumerateItems
System.Windows.Forms
Contains
System.Web.Extensions
System.Text.RegularExpressions
System.Collections
set_MaximumAutomaticRedirections
StringSplitOptions
RegexOptions
get_Groups
get_Chars
GetImageEncoders
System.Timers
RuntimeHelpers
EncoderParameters
ManagementClass
FileAccess
get_Success
GetCurrentProcess
MailAddress
VaultEnumerateVaults
get_Attachments
set_Arguments
get_Exists
arrays
get_Keys
get_ModifierKeys
Concat
AppendFormat
ImageFormat
Subtract
ManagementBaseObject
ManagementObject
set_Subject
Collect
set_AllowAutoRedirect
Unprotect
System.Net
get_Height
op_Explicit
WaitForExit
VaultCloseVault
VaultOpenVault
get_Default
GetValueOrDefault
IAsyncResult
set_UserAgent
SmtpClient
System.Management
XmlElement
Attachment
Environment
XmlDocument
get_Parent
GetParent
get_Current
get_Count
get_TickCount
set_IterationCount
BCryptDecrypt
BCryptEncrypt
TrimStart
Convert
set_Port
HttpWebRequest
XmlNodeList
ToList
set_Host
ICredentialsByHost
set_Timeout
GetKeyboardLayout
get_StandardOutput
set_RedirectStandardOutput
MoveNext
System.Text
ReadAllText
AppendAllText
get_InnerText
GetText
GetWindowText
get_Now
GetForegroundWindow
NativeWindow
set_CreateNoWindow
ToUnicodeEx
GetModuleFileNameEx
RegQueryValueEx
UnhookWindowsHookEx
SetWindowsHookEx
CallNextHookEx
RegOpenKeyEx
get_Day
ToByteArray
InitializeArray
ToArray
ToCharArray
Consistency
set_Body
get_Key
set_Key
OpenSubKey
RegCloseKey
MapVirtualKey
ContainsKey
BCryptImportKey
BCryptDestroyKey
RegistryKey
System.Security.Cryptography
GetExecutingAssembly
Multiply
BlockCopy
System.Runtime.Serialization.Formatters.Binary
get_TotalPhysicalMemory
CreateDirectory
Registry
get_Capacity
Quality
op_Equality
op_Inequality
System.Security
IsNullOrEmpty
BCryptGetProperty
BCryptSetProperty
<PrivateImplementationDetails>{96228863-9360-419C-9BEE-949B5792B53A}
$72edd6e7-5ab1-498b-8e1e-efa7db2e80e8
WrapNonExceptionThrows
1.0.0.0
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
pp p!p"p#p$p%p&p'p(p)p*p+p,p-p.p/p0p1p2p3p4p5p6p7p8p9p:p;p<p=p>p?p@pApDpEpFpGpHpKpe9q9
BACAIHJHUTVTWT[Zbadcecfcgchciclkrqsq}|~|
Accounts
logins
sha512
credential
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
FileDescription
FileVersion
1.0.0.0
InternalName
0a4dedf1-f1a1-4dbf-9533-0afd15648257.exe
LegalCopyright
OriginalFilename
0a4dedf1-f1a1-4dbf-9533-0afd15648257.exe
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.Common.F17B8D6F
Lionic Trojan.Win32.Stealer.12!c
Elastic Windows.Trojan.AgentTesla
DrWeb BackDoor.SpyBotNET.62
MicroWorld-eScan IL:Trojan.MSILZilla.24596
ClamAV Win.Packed.Generic-10003641-0
FireEye Generic.mg.5796315d4909f06a
CAT-QuickHeal Clean
McAfee Artemis!5796315D4909
Malwarebytes Generic.Malware.AI.DDS
VIPRE IL:Trojan.MSILZilla.24596
Sangfor Suspicious.Win32.Save.a
K7AntiVirus Trojan ( 005a7a471 )
BitDefender IL:Trojan.MSILZilla.24596
K7GW Trojan ( 005a7a471 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Gen:NN.ZemsilF.36738.km0@aW7ojpd
VirIT Clean
Cyren W32/MSIL_Kryptik.IZQ.gen!Eldorado
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Spy.AgentTesla.F
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.MSIL.Stealer.gen
Alibaba TrojanPSW:MSIL/AgentTesla.5b475b0c
NANO-Antivirus Clean
ViRobot Clean
Rising Spyware.AgentTesla!8.10E35 (CLOUD)
Sophos Troj/Steal-DJM
F-Secure Trojan.TR/Spy.Gen8
Baidu Clean
Zillya Clean
TrendMicro TrojanSpy.Win32.NEGASTEAL.YXDIFZ
McAfee-GW-Edition BehavesLike.Win32.Generic.ch
Trapmine malicious.moderate.ml.score
CMC Clean
Emsisoft IL:Trojan.MSILZilla.24596 (B)
Ikarus Trojan-Spy.MSIL.AgentTesla
Jiangmin Clean
Webroot Clean
Avira TR/Spy.Gen8
MAX malware (ai score=81)
Antiy-AVL GrayWare/MSIL.Kryptik.AA
Kingsoft malware.kb.c.995
Microsoft Trojan:MSIL/AgentTesla.RF!MTB
Gridinsoft Clean
Xcitium Clean
Arcabit IL:Trojan.MSILZilla.D6014
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Stealer.gen
GData MSIL.Trojan.PSE.10FWF4K
Google Detected
AhnLab-V3 Infostealer/Win.AgentTesla.C5356829
Acronis Clean
VBA32 Trojan.MSIL.AgentTesla.PInv.Heur
ALYac IL:Trojan.MSILZilla.24596
TACHYON Clean
DeepInstinct MALICIOUS
Cylance unsafe
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.NEGASTEAL.YXDIFZ
Tencent Trojan-PSW.MSIL.Stealer.kc
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet MSIL/AgentTesla.F!tr
AVG Win32:PWSX-gen [Trj]
Cybereason malicious.f6eb3a
Avast Win32:PWSX-gen [Trj]
No IRMA results available.