Static | ZeroBOX

PE Compile Time

2023-02-21 02:28:05

PE Imphash

5241d7444d4d8584697b8889b03f1a00

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000537ea 0x00053800 6.62279706826
.data 0x00055000 0x00388524 0x00001a00 2.70622062553
.duno 0x003de000 0x00000400 0x00000400 0.0
.vah 0x003df000 0x000005dc 0x00000600 0.0
.rsrc 0x003e0000 0x000070d8 0x00007200 3.71111147568

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_ICON 0x003e2a38 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT dBase III DBT, version number 0, next free block index 40
RT_ICON 0x003e2a38 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT dBase III DBT, version number 0, next free block index 40
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x003e33c0 0x00000022 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_VERSION 0x003e63e0 0x00000200 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401010 GetLocaleInfoA
0x401014 GetCPInfo
0x401018 FindResourceExW
0x40101c FindResourceW
0x401028 WaitNamedPipeA
0x401034 GetModuleHandleExW
0x401038 SetTapeParameters
0x40103c GetModuleHandleW
0x40104c EnumTimeFormatsA
0x401050 GetCommandLineA
0x401054 GetDriveTypeA
0x40105c LoadLibraryW
0x401060 ReadConsoleInputA
0x401064 CreateEventA
0x401068 SetConsoleCP
0x40106c GetFileAttributesA
0x401070 SetSystemPowerState
0x401074 ReadFile
0x40107c GetStartupInfoW
0x401080 RaiseException
0x401084 GetShortPathNameA
0x401088 GetConsoleAliasesW
0x40108c FindFirstFileA
0x401094 SetLastError
0x401098 PeekConsoleInputW
0x40109c SetVolumeLabelW
0x4010a0 MoveFileW
0x4010a4 CopyFileA
0x4010b0 SetComputerNameA
0x4010b4 VerLanguageNameW
0x4010b8 GetTempFileNameA
0x4010bc FindClose
0x4010c0 LocalAlloc
0x4010c4 CreateHardLinkW
0x4010c8 AddAtomW
0x4010cc RemoveDirectoryW
0x4010d0 HeapLock
0x4010d4 GetCommMask
0x4010d8 FoldStringW
0x4010dc FindNextFileA
0x4010e0 SetConsoleTitleW
0x4010e4 FindNextFileW
0x4010e8 VirtualProtect
0x4010f0 FatalAppExitA
0x4010f4 OpenSemaphoreW
0x401104 EnumSystemLocalesW
0x401108 CommConfigDialogW
0x40110c DeleteFileA
0x401110 CreateFileW
0x401114 WriteConsoleW
0x401118 FlushFileBuffers
0x40111c GetComputerNameA
0x401120 WriteConsoleInputW
0x401124 GetLastError
0x40112c SetStdHandle
0x401130 MoveFileA
0x401134 WideCharToMultiByte
0x401138 HeapAlloc
0x40113c GetProcAddress
0x401140 ExitProcess
0x401144 DecodePointer
0x401148 HeapReAlloc
0x40114c GetCommandLineW
0x401150 HeapSetInformation
0x401160 SetHandleCount
0x401164 GetStdHandle
0x40116c GetFileType
0x40117c IsDebuggerPresent
0x401180 EncodePointer
0x401184 TerminateProcess
0x401188 GetCurrentProcess
0x401194 GetACP
0x401198 GetOEMCP
0x40119c IsValidCodePage
0x4011a0 TlsAlloc
0x4011a4 TlsGetValue
0x4011a8 TlsSetValue
0x4011ac TlsFree
0x4011b0 GetCurrentThreadId
0x4011b4 WriteFile
0x4011b8 GetModuleFileNameW
0x4011bc HeapCreate
0x4011c0 HeapFree
0x4011c4 CloseHandle
0x4011d0 GetTickCount
0x4011d4 GetCurrentProcessId
0x4011dc Sleep
0x4011e0 SetFilePointer
0x4011e4 GetConsoleCP
0x4011e8 GetConsoleMode
0x4011ec RtlUnwind
0x4011f0 LCMapStringW
0x4011f4 MultiByteToWideChar
0x4011f8 GetStringTypeW
0x4011fc HeapSize
Library USER32.dll:
0x40120c CharUpperBuffA
0x401210 CharUpperW
Library GDI32.dll:
0x401008 GetTextFaceA
Library ADVAPI32.dll:
Library SHELL32.dll:
0x401204 DragAcceptFiles

!This program cannot be run in DOS mode.
`.data
CorExitProcess
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
?ZEM-'^
?{yK+;
?765@Z
?e')lW
UUUUUU
333333
?333333
?UUUUUU
?$rxxx
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
`h`hhh
xppwpp
_nextafter
_hypot
1#QNAN
1#SNAN
lufuwopojenayijifecuweyosanadel
gucayurefisobapuvaruf
0.1 %f
gobesufad
fohipavekesiw
wipehugelemigexuhafakojimexuf
j@j ^V
Fh=PTE
to=X]E
uh$ @
^SSSSS
tWItHIt9It
QQSVWh
URPQQh`
t"SS9] u
tRHtCHt4Ht%HtFHHt
PPPPPPPP
PPPPPPPP
;t$,v-
UQPXY]Y[
<+t"<-t
+t HHt
~?N"RU
!hf2j^
JU4a7*
NOB4*$%aJ
[nO,}t
g06yt)
`ISj?$]kx-
hx168T
Aw}SIy&j
3[I(?f
ozKEY1
U7+QP
=~X%xP
*>wQkr
TW.'31
Jm`$g.
Ebk91'
{V1FqM
SO7A$F
`bh%J$h
2kD^Q`P
o#UwJ&
Q#<&]F
;5"it'
C&lK.V
}+-y@b
cLh+pa
|&]15_
^uBCFV
sW5Kr8
W>et>n
2Ca82w
_,y(U~
eAYvB#
> ||||C
p#Y[fe
$(&$\w
SZZ=yo
xJ:tj)
KBJ,#M
M8 cyR%
Y%@m-\s
nKj8Lr
2oB?sz
W5M_G';
RSf_Wu
dqsCqjS
D>}r'C[
AF*?Zt8
w}wTyQ
dh711w
veIp6@w
tv$_&,
HeRjQ2
Ym9i/"
GX\#Y*
<]Lq\6F
Q}Vo'BF
c["Ws~
PViLe!
pgYC)0t
!VvPeox
)C[Kvj
">S8}U
Z@H"Dt
rtu\Xl
7]xOujA/
'rJ%ca6
c7=3(0
~S}Tk&
]]E6:r
l/w@w(x
4^1B"D
L|:~z;^a1
RwN'Zq
m/Fu q
gG@4|O
@OA-?|
vX72-I
S"Qh3F@
"]!g]o
rN+zV?
AS2V=0s\
c]9U{#
j/p|)h5
&;J(2<
rD%R$fbSBE
ddyF\E
R/m^t,o
k@0Ind
$%SOe*I8
8QvU+#
=8&Q!#.
R]eR76
j7C/,L
9v|}(S
F+OH&47
"6f=04
@Y8H\r
;(#cR#
8nz.XY
hyoIiSLGeZq
|T8}Q^
Rb>b34
OsH'e2T
T'h"P
$5jhOa
T_upDw
?0@CW_E
V_R8a,
Ff^bo5
`aITY9I]
,=34rOp
JE"-7IO
bMHa,:'
gc-k/%
jlo7oR
njo'8)
aCi"^oC
CWc(+{
fx?@8S
q,XjV'B
.5Co@
>]JXWD
6ASyM
884Zm:
.n4?)&
$&EHZ_Z
Jy3?O5o
mpwN?_
K}l+l@9
u3OK:bx
qM?q5{
O QlIn
lp6;tr
I?BckR
/ovGY0Z
mn)0P3k
"(cHy}
hc{G#I)
"A0r{u
%9p&8W
0|7F]l
nRJ`%8|
{P{<ChW
ndqzos{*
Y8h1#D+@N
Z SXyl
GEGwdx
1JD^9f
DI^TNH
!%*I_o
uLwR8~
(Oy*3M4
vn.fYmz
D@)|,+&
>DiN9
[Zzmo
NEUf^U%
Fa~3{k?8
maX\Bt
_5wSSg
K?t]D(
l*\bEi
MUjLG=:
>vIiZk,
PPKe35
4J2+gt
bz/+9s/l
v?I+R;
2o)iA}
!N`-^C
,BmzUZ
ksu*mnd
Di`a<:t
?}-f$L?v
]fH0g|?
rxJ~yB5
'N7*Z<
EWre ]X
xoZlG{
j@p7s<
aHJ"TW
J5fHLM[
JP#4cv
,mA&`c
jie0v5'
s@T8SY
K>2WC
dkB5j}
I)"'r'
,8VM{,?
A!=K(
cZcR^N`*F
/Qy&PT
i6VX@L
]\udIP
&ckbzgO
_R6w<@
H\. 5J
Ntv#7C)
-xZe `
>r/i4`
H~"F2$
)$bn/
.[Bf3Q
n_D=g
O:^`)Z
]1$*B5
mVSa%p
rB^<kN
E{9F#4
VpR:gM>
OefXYs*[
Z=R,;t
B1-Q$x
PeO2u~&
'L4A zq
W`?Hx>
MC=cdn
w7}LsY
eUh[:pf
]f+&/#v
|XRjX,
!>[-W[
MbJ/k{5;
!p?P+,
uh&#](
zBxP5p
ch1kX%>
IWy:xS0[^j
Y\9of'
y9w-\/
cl+V&^
9p3|`=<a
gW8Y4J$].|yc
Qt]G+.
GtS_PI
Nw^8g9
WZI @V
2VcD?qb
7k^6*)n;
,'{cHNK
e* yr0
H1/j9/
?)EwONB
%$GK6
2,Gk4/k
XZ69./8
Ca3fR'
pA][fv
+jccAY
XQ;Z7iA;
RM"O{K
sG$9C<
G|lGb.
hg]yu>
E5p*|R1
Id]3b
awsfl6
@}'F/f
cC7nmq&
.x~,f O
.ue5t\/"
'o{^U/-
W!Fwn4
VH\*7oo6!^
o/b =w
|<eLmL
#9Sn"S
_P%K9
Kxf8C#
Gs{L65
+@-fau
g5J8.QGb
t(@(-
%w]k(6
3e0-ij7
,Yrh3%
^=kseK;)
S03f?pV
llR^"=
!3zoX`(m
Gv[4d[{
5VIXGPFWn4
LRL2_V
9,*2==
a5}}181"f2
:10[>&! h]
]T9ZPs
*+FV{i
c{X'dfD
#xmn28m
@N0oHO
JYC26D
c)zw>@
l=jBUb
OSaRt=j
fO],SVf
D~]hcKR
8U[O,rR2
t(KxOP
[N"M1Z
k(4hQZ
Y\o}"_E
wNa^qB
j"PFXSAM
sh[31V
nQuqRg
i$]~tw
Bd8tIJ
(U)p5}
0Y)RR=E
_F@Q"V>
."$r;c="
3>0LY~
;hgTJ6
-A.2]f
oBtK6ho
sR^M &'ma
U"mRk:
`eLZNq
+u`f/Q
EG1.YEW5
i?f/2n
gH];/0
\mSjUe
VvIP`,f:e+^80
Xh-d&\
44@abZ
Rq178s
$E~FVCK
BEM(-$
zD5YiY
D$()D$
D$8)D$
L$<QRR
GetSystemDefaultLangID
GetComputerNameA
WriteConsoleInputW
GetConsoleAliasesLengthW
GetLocaleInfoA
GetCPInfo
FindResourceExW
FindResourceW
BuildCommDCBAndTimeoutsA
DeleteVolumeMountPointA
WaitNamedPipeA
SetDefaultCommConfigW
GetEnvironmentStringsW
GetModuleHandleExW
SetTapeParameters
GetModuleHandleW
FindNextVolumeMountPointA
ConvertFiberToThread
GetConsoleAliasExesW
EnumTimeFormatsA
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
LoadLibraryW
ReadConsoleInputA
CreateEventA
SetConsoleCP
GetFileAttributesA
SetSystemPowerState
ReadFile
GetCompressedFileSizeA
GetStartupInfoW
RaiseException
GetShortPathNameA
GetConsoleAliasesW
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
MoveFileW
CopyFileA
EnumSystemCodePagesW
FreeUserPhysicalPages
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
HeapLock
GetCommMask
FoldStringW
FindNextFileA
SetConsoleTitleW
FindNextFileW
VirtualProtect
QueryPerformanceFrequency
FatalAppExitA
OpenSemaphoreW
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CommConfigDialogW
DeleteFileA
KERNEL32.dll
CharUpperW
CharUpperBuffA
USER32.dll
GetTextFaceA
GDI32.dll
AbortSystemShutdownA
ADVAPI32.dll
DragAcceptFiles
SHELL32.dll
MoveFileA
WideCharToMultiByte
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
HeapCreate
HeapFree
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
SetStdHandle
FlushFileBuffers
WriteConsoleW
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
|}zz~|
||~~|{
y}~z}|}z
{{z}{~~
}~|~{{
~|}||}
~}|{~}
~}}|y~
|{~|||
{|}|{~
{~}~}|
||{~}|
{~||}}
{y}z}~}
}z{}|}}|
~|||~|
}~{~||
}|y~}{{
{~z{}~|}}}}|
zz~}~}
mscoree.dll
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
nKERNEL32.DLL
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
((((( H
h(((( H
H
WUSER32.DLL
CONOUT$
repezilat
cpomajapilapimunuwipemalovukaf
dumuwopobelisevop
pehezudovag
zusofuvavojucaf
goxotucok
nadahuhacaruzejagazirazucigoxoj
silivexuxuresifovevikegiyewa
@jjjjj
@jjjjj
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
037485B3
InternalName
ElasticAttreban.exe
LegalTrademark1
DoesGet
OriginalFilename
Huklusa.exe
ProductName
Jadezku
ProductVersion
1.0.2.9
VarFileInfo
Translation
YPizosesoy sikipoka kecoyuraworeber bid comilo rokadofu lecihuba kicirokuyi nesuhepizahomi
Fowevuciyudufi
Futax luriruvut
Fus lageju femived%Yividonum hamawojaxaxo vumaxerube xit
0Copuwodelad yati ranofocaso tilupod yexohekezene>Yamu pitayayobusuvu vuhenukibagim tisubiwujigu vegemesozocebeyHWarafukob yamibusisukej ruxohefezab heyupivuvene cunajurozav roxunominut!Wababesuj ledur gefetow nunolisah/Tonuhun jukofemetig hokumolura guliyuyuhiw zopuWMonoxo geyerenezekodeh fewakiruruyazu bahugor zimefofotago bufepawa dukepuvasano jocamo
NCarubewomekawi xeruvobehoxu dewepobagavi tucavevetov tuhaxibinesif xocimaf rit
&Vopujuluze vipocopolucaki bonuhovunaxe2Paso nihec yonaciw vitugipox wuzavehoyujiy kihitet
,Jiz bej nihew laxutuge lolofe zigafavip cuvi
4Wutijamituzut hajanuyusivigoc fatodohumi tusuxazacek
Jawefib
Tuderolimi lidovac hazenebu
Dokodudacarux sewibiha<Gunu gozasiri rewegawojifusu veyapag dexiverafefize muxe did
@Xibok canuriru yamewuyoye rorumahopijol jozuyitecekuka jejibalem
Jegor payawadigofexi=Kikupi kinowifelibejod vaboric wejagavopadepuj vij bibekamare
Git[Xomifepuxafikos sapujetici ronet havodob bifo fedokizegewaf guy yuhopaza luz netosolocoxato
Rewuxilarucecej
'Kisuj fudigal wexayevola luxa hibadozuf
Wilimikegu pepacevohopep
Givexus damitosubohade xadezu=Domolihanagepad forebaviy niji fogunujihej lefuladenor jajiji
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
Elastic malicious (high confidence)
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
Skyhigh BehavesLike.Win32.Generic.fh
McAfee Clean
Malwarebytes Clean
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005a15901 )
BitDefender Clean
K7GW Trojan ( 005a15901 )
Cybereason malicious.4afa80
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky VHO:Trojan-PSW.Win32.Stealerc.gen
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.100 (RDML:XoGTbGsnPgKujX9SIreLaA)
TACHYON Clean
Sophos Troj/Krypt-ACJ
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
Trapmine malicious.high.ml.score
FireEye Generic.mg.fb822de297dc2530
Emsisoft Clean
Ikarus Trojan.Win32.Crypt
GData Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm VHO:Trojan-PSW.Win32.Stealerc.gen
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Varist Clean
AhnLab-V3 Malware/Win.Generic.C5515868
Acronis Clean
BitDefenderTheta Clean
ALYac Clean
MAX Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG TrojanX-gen [Trj]
Avast TrojanX-gen [Trj]
CrowdStrike win/malicious_confidence_100% (D)
No IRMA results available.