Static | ZeroBOX

PE Compile Time

2022-10-23 17:11:23

PE Imphash

16611b6b96a67ea5066ae4525e5da85c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0005384c 0x00053a00 6.61860560627
.data 0x00055000 0x00388524 0x00001a00 2.7046191692
.vufew 0x003de000 0x00000400 0x00000400 0.0
.xew 0x003df000 0x000005dc 0x00000600 0.0
.rsrc 0x003e0000 0x000070d8 0x00007200 3.70976526736

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_CURSOR 0x003e5b20 0x000008a8 LANG_NEUTRAL SUBLANG_NEUTRAL dBase III DBT, version number 0, next free block index 40, 1st item "\251\317"
RT_ICON 0x003e2a38 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT dBase III DBT, version number 0, next free block index 40
RT_ICON 0x003e2a38 0x00000988 LANG_SINDHI SUBLANG_SYS_DEFAULT dBase III DBT, version number 0, next free block index 40
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_STRING 0x003e6f80 0x00000152 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_CURSOR 0x003e5af0 0x00000030 LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_GROUP_ICON 0x003e33c0 0x00000022 LANG_SINDHI SUBLANG_SYS_DEFAULT data
RT_VERSION 0x003e63e0 0x00000200 LANG_NEUTRAL SUBLANG_NEUTRAL data

Imports

Library KERNEL32.dll:
0x401010 FindVolumeClose
0x401014 WriteConsoleInputW
0x40101c GetCPInfo
0x401020 FindResourceExW
0x401030 WaitNamedPipeA
0x40103c GetModuleHandleExW
0x401040 OpenSemaphoreA
0x401044 SetTapeParameters
0x401048 GetModuleHandleW
0x401054 EnumTimeFormatsA
0x401058 GetCommandLineA
0x40105c GetDriveTypeA
0x401060 GetVolumePathNameW
0x401068 LoadLibraryW
0x40106c FatalAppExitW
0x401070 ReadConsoleInputA
0x401078 CreateEventA
0x40107c SetConsoleCP
0x401080 GetFileAttributesA
0x401088 SetConsoleMode
0x40108c ReadFile
0x401098 RaiseException
0x40109c GetShortPathNameA
0x4010a0 FindFirstFileA
0x4010a4 GetLastError
0x4010a8 SetLastError
0x4010ac PeekConsoleInputW
0x4010b0 SetVolumeLabelW
0x4010b4 HeapUnlock
0x4010b8 MoveFileW
0x4010bc CopyFileA
0x4010c4 SetComputerNameA
0x4010c8 VerLanguageNameW
0x4010cc GetTempFileNameA
0x4010d0 FindClose
0x4010d4 LocalAlloc
0x4010d8 CreateHardLinkW
0x4010dc AddAtomW
0x4010e0 RemoveDirectoryW
0x4010e4 GetCommMask
0x4010e8 FoldStringW
0x4010ec FindNextFileW
0x4010f0 GetConsoleTitleW
0x4010f4 VirtualProtect
0x4010fc GetShortPathNameW
0x40110c CommConfigDialogW
0x401110 DeleteFileA
0x401114 WriteConsoleW
0x401118 FlushFileBuffers
0x40111c SetStdHandle
0x401120 ExitProcess
0x401124 GetComputerNameA
0x401128 GetStartupInfoW
0x401130 MoveFileA
0x401134 WideCharToMultiByte
0x401138 HeapAlloc
0x40113c GetProcAddress
0x401140 DecodePointer
0x401144 HeapReAlloc
0x401148 GetCommandLineW
0x40114c HeapSetInformation
0x40115c SetHandleCount
0x401160 GetStdHandle
0x401168 GetFileType
0x401178 IsDebuggerPresent
0x40117c EncodePointer
0x401180 TerminateProcess
0x401184 GetCurrentProcess
0x401190 GetACP
0x401194 GetOEMCP
0x401198 IsValidCodePage
0x40119c TlsAlloc
0x4011a0 TlsGetValue
0x4011a4 TlsSetValue
0x4011a8 TlsFree
0x4011ac GetCurrentThreadId
0x4011b0 WriteFile
0x4011b4 GetModuleFileNameW
0x4011b8 HeapCreate
0x4011bc HeapFree
0x4011c0 CloseHandle
0x4011cc GetTickCount
0x4011d0 GetCurrentProcessId
0x4011d8 Sleep
0x4011dc SetFilePointer
0x4011e0 GetConsoleCP
0x4011e4 GetConsoleMode
0x4011e8 RtlUnwind
0x4011ec LCMapStringW
0x4011f0 MultiByteToWideChar
0x4011f4 GetStringTypeW
0x4011f8 HeapSize
0x4011fc CreateFileW
Library USER32.dll:
0x40120c CharUpperW
0x401210 CharUpperBuffA
Library GDI32.dll:
0x401008 GetTextFaceA
Library ADVAPI32.dll:
Library SHELL32.dll:
0x401204 DragAcceptFiles

!This program cannot be run in DOS mode.
`.data
.vufew
CorExitProcess
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
(null)
`h````
xpxxxx
?ZEM-'^
?{yK+;
?765@Z
?e')lW
UUUUUU
333333
?333333
?UUUUUU
?$rxxx
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
`h`hhh
xppwpp
_nextafter
_hypot
1#QNAN
1#SNAN
lufuwopojenayijifecuweyosanadel
gucayurefisobapuvaruf
0.1 %f
fohipavekesiw
wipehugelemigexuhafakojimexuf
jXh@9E
j@j ^V
Fh=PTE
to=X]E
uh$ @
^SSSSS
j hP:E
tWItHIt9It
QQSVWh
URPQQh
t"SS9] u
tRHtCHt4Ht%HtFHHt
PPPPPPPP
PPPPPPPP
;t$,v-
UQPXY]Y[
<+t"<-t
+t HHt
P}[D%I
<3',kK~vX
M8OpIn
6NOe@/
}BPy32
m|[1F4aB
TE:SU]
klpO7zC
Bia/u"
B%a)hM
LM"vOQ
VX~8|q
Y~0%hz
ET1ix[
f[D|#E
,vUZu|D
8PB$:@}IX
}R8-#;
V0u]Bu
F)i(U[
_bclJ&
<\|?*W
,?,g[TrrK
o$(py'<
.2K[k<
E;`=;M
AJ)Wit(<
c7\NO)(
ng?HCC
GgqyV=A
ZY|b^2
py,~((
@N1'6Q
F.]io
u 1#c'
mof>nYL
s+FLP4
>n7&#FPj
2\Qi5e
!'Q~/b
OmX5pG
c0j~&R
bq{MS(
E/K;^u
h<pUwt
:sdQ=Y{%
U@<kZqDk
X7@-&"
lxLT.JF
|r$A&Wr&
~|s\4XE
#@T>Yqv+
f%IY[%B
+8B<(m
wF%\%K
+>o:bV
x%&ka
p?``,d-gv-~z
"+QnBW]M6
-NWnTo7
TW]{\p
l486u6
tdup59
+Rvfc3\
OD)y2*L
ZYg+?|Zu$
GnqH'W4
)Y=A+v
m5wt)*{
"Fkc]=y
FW/C)b(
_Uji:+
p8C}q=
(Ij##M
qt7q$
W~~1 5|QT
#/"2qp
B)!``4>rC:p
&J73/(
Qa=E0[
hn^B<l
DR}qZB
,T2XP\]
-{R#Hv
D-"1ER
r~f"x)
;M&n}0
|H*<Wj
jgLg}n
t,7eS=
<Z`lz`
~dkUAVm
aNHS5Jk
[zh`x
]Zuv==
0}j(#o
.?jOKo
GT=4_Z
vs}0lq&~
UgPGIJ
Fbzl&R[8{
g})F"H{
q|1ci
.^P8S*
kk^&X1E
DV95+>
!*0w$w/
)fUz8,
2^zxgn6KJA
v0V+2R
n/lPf]
C,U7xq
3.~9L*
"9|>6y
Kzq&&!
YU|U4h
OUQ7?h
|iDX_3?
aF^&)0
r9-pL`/
ONnh]/
T%q4e7
@F'/"!
r:gkQR
T609;r
E-=xTP
AT;y2
}4Pss
SL%|73U
1J*ag:
?Uf?5U
F|cuL8
4&fI$F
jk\n-U
C?yEKD
G|ae3=~
%u@!NF
GF_d~'
6Gk 1gl
W$vx$\
qcUz#J
NTkpZ
mZ6K\X
Ga$N,A
00_Gg85R
k:W.78;
y|Cvs\
69m^wv
W!XK\z
ATegRnuL
BmJ_u9
KqnPu;
UMvsd#
<AGSU.`
7m+,9~
lS7xJ)
aJ]}5`
]Jaq)t
'~iz0O@]
w[/**}$
K4~}-aw
cB$e}D
K*S,HM
3"P}7Q
N|xBn%
6?@Raw
$I[f\Qg
/D5FM?6
at"_s'o
,&+OF>"
DfB=BJ
P,FO/.s
?W=wO>
j^8!\V
/>~jnC
5ga)r6
[LZ;tmG~
[G9he9
8f V*F
Ww[ \@
O'`~8r
="'h3V
S`$gG)
t] /;O7
eil@Kt{
xPHa>}U
=J2hw_
U`kh`,
8*VS|B
PyTG29A
K&rc[b
_*;n]wQ
Vh0TFa!
]@jJ0Qp
%^GcR*
E~?'Z\
Y\%fK4@^
{,DY#<!C
iF W~Q
oz?th:
">If>l
;vw~7.1
7A( 'P<
EQ)G2-'
.-S8.[
9eBsW!
HIXcUxE3
WCzVIY,
[Op}'V
BZUFoL8
Vh@DED
]Wz[q91
z~#As]
Fra7F6SR|77
x[,xK
=3||GXa;
6vsR]43Y
K/IKCC7w
){/2?.
S:HQy
n.6Rll:
/u+uT_
ru*5jO
<778u8;
Yt/j""
-l[P:N[
8N!!\VEM
0>4UTE'/
@jE}ZXH
tL#~^8J
[^3.jE
)U>q$j
_C'2B
:vPI]z+i
|O?)W4
^s.okN
:B6:rg
Ebb^7{
zR"Fc
q:uO/H
EV&?#l
(K)l\L
9IdDjVK%VG}
PIgYm1wg
,nK7uN
wq\~RAt
W@CcdM
~#Bct<l
;)c~So_
X}E#y.
Y0_X<I[:
A6TT+8
h]fs.>L|
nR>3r\
X5y3#<
9I1 4
G>H;@=
/9_Ye%
jA. |_
}=J[=h
]9<&IQ
!\0"Bc
yt1`}"
p5LF,O
->wXf>
CH(})w
2)kR"oQ
X;=^EJ(
Ide s}
}X\"A<
"5 N6~
#x=t5O~.u
TSy~{@
]}(j/k
/{J+#i
~"Alo-
fE~"!PT}
N/*pd+
OHW8X{Z
8><'=
O XUf|
4ogaS9
5HJjY}
LoW|H-t
L(;{@F
76+%ZY
'~YP5w
ds~>`'t
,G'9nB
nMuRxm
$O00[x3
Kr o@4i
ud#9M2
d<G?@I)+
P>Ch~r
i<_"K
]H03Y=q=
XQ_)q2
0j@q$[>
a5\<59
/O[6hqc
|(.uR4
mD]ym>
b<M=$!
HgZOqp
2"Z1<{a
R@b12d`{
;60[]WZ
U (i0FP
P<Zs`w
u0kao-Q
qz<<B&
fBuZaR
hsBebx:=
vHR$9u
$9Bnw6zt
q3}`tS
3pTfAm
j)[j%h
s\Kp{1
YH!1JIt
!aPy5#n
<CeSqI4
!5~}3*
t5(jyd
G+%kU]
WKSd*G
S\XA\A71GZ
6,tM=yk
Wv!/N-
x APPX
#cBl8)
JiWIp%(
a<U}g^.
zOL+&d
D$()D$
D$8)D$
T$ RPP
GetSystemDefaultLangID
ExitProcess
GetComputerNameA
GetPrivateProfileSectionNamesW
FindVolumeClose
WriteConsoleInputW
GetConsoleAliasesLengthW
GetCPInfo
FindResourceExW
BuildCommDCBAndTimeoutsA
MapUserPhysicalPages
DeleteVolumeMountPointA
WaitNamedPipeA
SetDefaultCommConfigW
GetEnvironmentStringsW
GetModuleHandleExW
OpenSemaphoreA
SetTapeParameters
GetModuleHandleW
ConvertFiberToThread
GetConsoleAliasExesW
EnumTimeFormatsA
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
LoadLibraryW
FatalAppExitW
ReadConsoleInputA
GetSystemPowerStatus
CreateEventA
SetConsoleCP
GetFileAttributesA
EnumSystemCodePagesA
SetConsoleMode
ReadFile
GetCompressedFileSizeA
GetStartupInfoW
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
HeapUnlock
MoveFileW
CopyFileA
EnumSystemCodePagesW
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
GetCommMask
FoldStringW
FindNextFileW
GetConsoleTitleW
VirtualProtect
QueryPerformanceFrequency
GetShortPathNameW
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
CommConfigDialogW
DeleteFileA
KERNEL32.dll
CharUpperW
CharUpperBuffA
USER32.dll
GetTextFaceA
GDI32.dll
AbortSystemShutdownA
ADVAPI32.dll
DragAcceptFiles
SHELL32.dll
MoveFileA
WideCharToMultiByte
HeapAlloc
GetProcAddress
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
HeapCreate
HeapFree
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
SetStdHandle
FlushFileBuffers
WriteConsoleW
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
{~|~~~
}z}~~||~
}~z~|{
{{}~~~
|~{{~~
~~}}}|||~
{}{}}{~
}~~z~z
zz|}}}
{||~~}~
|}}y{{
~~~|~{
|~z|}}
||}{|~~
|{{~{y|
~z|~~z
}|z|}}
~|~{~{|
~}~~z{{{~
|}}}z}~{
{{|~{~{
}z|~{|}
{}}||}
~~}~z|
mscoree.dll
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
nKERNEL32.DLL
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
@Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
((((( H
h(((( H
H
WUSER32.DLL
CONOUT$
repezilat
cpomajapilapimunuwipemalovukaf
dumuwopobelisevop
ruwohitif
pehezudovag
zusofuvavojucaf
goxotucok
nadahuhacaruzejagazirazucigoxoj
silivexuxuresifovevikegiyewa
fanakifigadawoficunus
@jjjjj
@jjjjj
/ P6pL
,/KPip
/-P?pR
VS_VERSION_INFO
StringFileInfo
037485B3
InternalName
ElasticAttreban.exe
LegalTrademark1
DoesGet
OriginalFilename
Huklusa.exe
ProductName
Jadezku
ProductVersion
1.0.2.1
VarFileInfo
Translation
YPizosesoy sikipoka kecoyuraworeber bid comilo rokadofu lecihuba kicirokuyi nesuhepizahomi
Fowevuciyudufi
Futax luriruvut
Fus lageju femived%Yividonum hamawojaxaxo vumaxerube xit
0Copuwodelad yati ranofocaso tilupod yexohekezene>Yamu pitayayobusuvu vuhenukibagim tisubiwujigu vegemesozocebeyHWarafukob yamibusisukej ruxohefezab heyupivuvene cunajurozav roxunominut!Wababesuj ledur gefetow nunolisah/Tonuhun jukofemetig hokumolura guliyuyuhiw zopuWMonoxo geyerenezekodeh fewakiruruyazu bahugor zimefofotago bufepawa dukepuvasano jocamo
NCarubewomekawi xeruvobehoxu dewepobagavi tucavevetov tuhaxibinesif xocimaf rit
&Vopujuluze vipocopolucaki bonuhovunaxe2Paso nihec yonaciw vitugipox wuzavehoyujiy kihitet
,Jiz bej nihew laxutuge lolofe zigafavip cuvi
4Wutijamituzut hajanuyusivigoc fatodohumi tusuxazacek
Jawefib
Tuderolimi lidovac hazenebu
Dokodudacarux sewibiha<Gunu gozasiri rewegawojifusu veyapag dexiverafefize muxe did
@Xibok canuriru yamewuyoye rorumahopijol jozuyitecekuka jejibalem
Jegor payawadigofexi=Kikupi kinowifelibejod vaboric wejagavopadepuj vij bibekamare
Git[Xomifepuxafikos sapujetici ronet havodob bifo fedokizegewaf guy yuhopaza luz netosolocoxato
Rewuxilarucecej
'Kisuj fudigal wexayevola luxa hibadozuf
Wilimikegu pepacevohopep
Givexus damitosubohade xadezu=Domolihanagepad forebaviy niji fogunujihej lefuladenor jajiji
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Clean
MicroWorld-eScan Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
Skyhigh BehavesLike.Win32.Corrupt.fh
McAfee Clean
Malwarebytes Clean
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005a15901 )
BitDefender Clean
K7GW Trojan ( 005a15901 )
CrowdStrike win/malicious_confidence_100% (D)
Baidu Clean
VirIT Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 Clean
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky Clean
Alibaba Clean
NANO-Antivirus Clean
ViRobot Clean
Rising Trojan.Generic@AI.100 (RDML:WYZ7eLfyVv2f1dHeeRAhaA)
TACHYON Clean
Sophos Troj/Krypt-ACJ
F-Secure Clean
DrWeb Clean
VIPRE Clean
TrendMicro Clean
Trapmine malicious.high.ml.score
FireEye Generic.mg.a8f8c8c13cfd0aa9
Emsisoft Clean
Ikarus Trojan.Win32.Crypt
GData Clean
Jiangmin Clean
Webroot Clean
Google Detected
Avira Clean
Antiy-AVL Clean
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.STOP.bot!n
Xcitium Clean
Arcabit Clean
SUPERAntiSpyware Clean
ZoneAlarm Clean
Microsoft Trojan:Win32/Sabsik.FL.B!ml
Varist Clean
AhnLab-V3 Malware/Win.Generic.C5515868
Acronis suspicious
BitDefenderTheta Clean
ALYac Clean
MAX Clean
DeepInstinct MALICIOUS
VBA32 Clean
Cylance unsafe
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Tencent Trojan.Win32.Obfuscated.gen
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
Fortinet Clean
AVG TrojanX-gen [Trj]
Cybereason malicious.a4e2e2
Avast TrojanX-gen [Trj]
No IRMA results available.