Static | ZeroBOX

PE Compile Time

2019-04-13 09:01:53

PE Imphash

4747c70adc127d28c18f0f7237b1add9

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00010716 0x00010800 6.49207667513
.rdata 0x00012000 0x00003d62 0x00003e00 5.31177539084
.data 0x00016000 0x00001d40 0x00000600 5.1175135216
.rsrc 0x00018000 0x00002c70 0x00002e00 3.95858272978
.reloc 0x0001b000 0x00000db4 0x00000e00 6.66727839656
.bss 0x0001c000 0x00001000 0x00000200 3.08048809012

Resources

Name Offset Size Language Sub-language File type
WM_DSP 0x00018070 0x00002c00 LANG_ENGLISH SUBLANG_ARABIC_QATAR PE32 executable (GUI) Intel 80386, for MS Windows

Imports

Library KERNEL32.dll:
0x412088 GetStartupInfoA
0x41208c HeapFree
0x412090 VirtualFree
0x412094 VirtualAlloc
0x412098 HeapReAlloc
0x41209c VirtualQuery
0x4120a0 TerminateThread
0x4120a4 CreateThread
0x4120a8 WriteFile
0x4120ac CreateFileW
0x4120b0 LoadLibraryW
0x4120b4 GetLocalTime
0x4120b8 GetCurrentThreadId
0x4120bc GetCurrentProcessId
0x4120c0 ReadFile
0x4120c4 FindFirstFileA
0x4120c8 GetBinaryTypeW
0x4120cc FindNextFileA
0x4120d0 GetFullPathNameA
0x4120d4 GetTempPathW
0x4120dc CreateFileA
0x4120e0 GlobalAlloc
0x4120ec LocalFree
0x4120f0 GetFileSize
0x4120f4 FreeLibrary
0x4120f8 WaitForSingleObject
0x4120fc GetCurrentProcess
0x412104 CreatePipe
0x412108 PeekNamedPipe
0x41210c DuplicateHandle
0x412110 SetEvent
0x412114 CreateProcessW
0x412118 CreateEventA
0x41211c LoadLibraryA
0x412120 LoadResource
0x412124 FindResourceW
0x412128 GetComputerNameW
0x41212c LoadLibraryExW
0x412130 FindFirstFileW
0x412134 FindNextFileW
0x412138 GetCommandLineA
0x412140 DeleteFileW
0x412144 CopyFileW
0x412148 GetDriveTypeW
0x41215c CreateMutexA
0x412160 ReleaseMutex
0x412164 TerminateProcess
0x412168 OpenProcess
0x412170 Process32NextW
0x412174 Process32FirstW
0x412178 VirtualProtectEx
0x41217c GetProcessHeap
0x412180 SizeofResource
0x412184 VirtualProtect
0x41218c GetSystemDirectoryW
0x412194 LockResource
0x41219c IsWow64Process
0x4121a0 Process32First
0x4121a4 WriteProcessMemory
0x4121a8 Process32Next
0x4121b0 VirtualAllocEx
0x4121b4 CreateRemoteThread
0x4121b8 WinExec
0x4121bc GetTempPathA
0x4121c0 HeapAlloc
0x4121c4 Sleep
0x4121c8 lstrcmpW
0x4121cc GetTickCount
0x4121d0 lstrcpyW
0x4121d4 WideCharToMultiByte
0x4121d8 GetModuleHandleA
0x4121dc ExitProcess
0x4121e0 SetFilePointer
0x4121e4 lstrcpyA
0x4121e8 MultiByteToWideChar
0x4121ec lstrcatA
0x4121f0 lstrcmpA
0x4121f4 lstrlenA
0x4121fc lstrlenW
0x412200 CloseHandle
0x412204 GetProcAddress
0x412208 lstrcatW
0x41220c GetLastError
0x412210 SetLastError
0x412214 GetModuleFileNameA
0x412218 CreateDirectoryW
0x41221c GetModuleFileNameW
0x412220 CreateProcessA
Library USER32.dll:
0x412284 MessageBoxA
0x412288 GetKeyState
0x41228c GetMessageA
0x412290 DispatchMessageA
0x412294 CreateWindowExW
0x412298 CallNextHookEx
0x41229c GetAsyncKeyState
0x4122a0 SetWindowsHookExA
0x4122a4 RegisterClassW
0x4122a8 GetRawInputData
0x4122ac MapVirtualKeyA
0x4122b0 GetForegroundWindow
0x4122b4 DefWindowProcA
0x4122bc GetLastInputInfo
0x4122c0 ToUnicode
0x4122c4 GetKeyNameTextW
0x4122c8 PostQuitMessage
0x4122cc GetWindowTextW
0x4122d0 TranslateMessage
0x4122d4 wsprintfA
0x4122d8 wsprintfW
Library ADVAPI32.dll:
0x41200c OpenProcessToken
0x412010 FreeSid
0x412014 LookupAccountSidW
0x412018 GetTokenInformation
0x41201c CloseServiceHandle
0x412020 OpenSCManagerW
0x412024 RegCreateKeyExW
0x412028 RegDeleteKeyW
0x412030 RegDeleteKeyA
0x412038 RegDeleteValueW
0x41203c RegQueryValueExW
0x412040 RegOpenKeyExW
0x412044 RegOpenKeyExA
0x412048 RegEnumKeyExW
0x41204c RegQueryValueExA
0x412050 RegQueryInfoKeyW
0x412054 RegCloseKey
0x412058 OpenServiceW
0x412060 QueryServiceConfigW
0x412068 StartServiceW
0x41206c RegSetValueExW
0x412070 RegCreateKeyExA
0x412074 RegSetValueExA
Library SHELL32.dll:
0x412244 ShellExecuteExW
0x412250 SHGetFolderPathW
0x412254 ShellExecuteW
0x412258 None
0x41225c ShellExecuteExA
Library urlmon.dll:
0x412354 URLDownloadToFileW
Library WS2_32.dll:
0x4122fc setsockopt
0x412300 freeaddrinfo
0x412304 htons
0x412308 recv
0x41230c connect
0x412310 socket
0x412314 send
0x412318 WSAStartup
0x41231c shutdown
0x412320 closesocket
0x412324 WSACleanup
0x412328 ioctlsocket
0x41232c ntohs
0x412330 gethostbyname
0x412334 inet_addr
0x412338 getaddrinfo
Library ole32.dll:
0x412340 CoCreateInstance
0x412344 CoUninitialize
0x412348 CoInitialize
0x41234c CoTaskMemFree
Library SHLWAPI.dll:
0x412264 StrStrW
0x412268 PathRemoveFileSpecA
0x41226c StrStrA
0x412270 PathCombineA
0x412274 PathFindFileNameW
0x412278 PathFindExtensionW
0x41227c PathFileExistsW
Library NETAPI32.dll:
0x41222c NetUserAdd
Library OLEAUT32.dll:
0x412234 VariantInit
Library CRYPT32.dll:
0x412080 CryptUnprotectData
Library PSAPI.DLL:
Library WININET.dll:
0x4122e4 InternetOpenUrlW
0x4122e8 InternetOpenW
0x4122ec InternetCloseHandle
0x4122f0 InternetReadFile

!This program cannot be run in DOS mode.
sRichQ
`.rdata
@.data
@.reloc
9^4tah
93tfVVVV
?vOj@_+
SVWj@R
PWWWWQ
PWh|n@
P;~,s&W
WSh+u@
WWWWWW
PVShh0A
SSSSSS
PVVVVV
PVh@aA
*WWWWWWWj
G$;C,u;
Sh }A
t+h$}A
VVVh06A
u3Sh }A
PSSSSSSh
f93trS
tG;HtsB
f99t,+
QQSVWQ
TSVjD3
RSSSSSSQ
w(9s t
9_Pt=Sh
VVVhTFA
PWVWWWSh
QQSVWj
QQVPQQ
WRhlGA
9\$\t
9\$8t;
127.0.0.2
abcdefghijklmnopqrstuvwxyzABCDEFGHIJK...
warzone160
USER32.DLL
MessageBoxA
Assert
An assertion condition failed
PureCall
A pure virtual function was called. This is a fatal error, and indicates a serious error in the implementation of the application
GetRawInputData
ToUnicode
MapVirtualKeyA
SELECT * FROM logins
NSS_Init
PK11_GetInternalKeySlot
PK11_Authenticate
PK11SDR_Decrypt
NSSBase64_DecodeBuffer
PK11_CheckUserPassword
NSS_Shutdown
PK11_FreeSlot
PR_GetError
vaultcli.dll
VaultOpenVault
VaultCloseVault
VaultEnumerateItems
VaultGetItem
VaultFree
encryptedUsername
hostname
encryptedPassword
sqlite3_open
sqlite3_close
sqlite3_prepare_v2
sqlite3_column_text
sqlite3_step
sqlite3_exec
sqlite3_open_v2
sqlite3_column_blob
sqlite3_column_type
sqlite3_column_bytes
sqlite3_close_v2
sqlite3_finalize
Storage
Accounts\Account.rec0
software\Aerofox\FoxmailPreview
Executable
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList
%u.%u.%u.%u
AVE_MARIA
UEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
ntdll.dll
RtlGetVersion
LdrLoadDll
RtlCreateUnicodeStringFromAsciiz
LdrGetProcedureAddress
RtlInitAnsiString
IsWow64Process
kernel32
VirtualQuery
cmd.exe /C ping 1.2.3.4 -n 2 -w 1000 > Nul & Del /f /q
Software\Classes\Folder\shell\open\command
DelegateExecute
Settings not found !
0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
\System32\cmd.exe
explorer.exe
powershell Add-MpPreference -ExclusionPath
find.exe
find.db
-w %ws -d C -f %s
Software\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPer1_0Server
MaxConnectionsPerServer
?lst@@YAXHJ@Z
.text$di
.text$mn
.text$yd
.idata$5
.rdata
.rdata$zzzdbg
.idata$2
.idata$3
.idata$4
.idata$6
.CRT$XCA
.CRT$XCU
.CRT$XCZ
.rsrc$01
.rsrc$02
CreateDirectoryW
GetModuleFileNameA
SetLastError
GetLastError
lstrcatW
CloseHandle
lstrlenW
ExpandEnvironmentStringsW
lstrlenA
lstrcmpA
lstrcatA
MultiByteToWideChar
lstrcpyA
WideCharToMultiByte
lstrcpyW
GetTickCount
lstrcmpW
HeapAlloc
GetProcessHeap
LoadLibraryA
GetProcAddress
ExitProcess
GetModuleHandleA
GetCommandLineA
GetStartupInfoA
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
VirtualQuery
TerminateThread
CreateThread
WriteFile
CreateFileW
LoadLibraryW
GetLocalTime
GetCurrentThreadId
GetCurrentProcessId
ReadFile
FindFirstFileA
GetBinaryTypeW
FindNextFileA
GetFullPathNameA
GetTempPathW
GetPrivateProfileStringW
CreateFileA
GlobalAlloc
GetCurrentDirectoryW
SetCurrentDirectoryW
LocalFree
GetFileSize
FreeLibrary
WaitForSingleObject
GetCurrentProcess
WaitForMultipleObjects
CreatePipe
PeekNamedPipe
DuplicateHandle
SetEvent
CreateProcessW
CreateEventA
GetModuleFileNameW
LoadResource
FindResourceW
GetComputerNameW
LoadLibraryExW
FindFirstFileW
FindNextFileW
SetFilePointer
GetLogicalDriveStringsW
DeleteFileW
CopyFileW
GetDriveTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateMutexA
ReleaseMutex
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
VirtualProtectEx
CreateProcessA
SizeofResource
VirtualProtect
Wow64DisableWow64FsRedirection
GetSystemDirectoryW
Wow64RevertWow64FsRedirection
LockResource
GetWindowsDirectoryW
IsWow64Process
Process32First
WriteProcessMemory
Process32Next
GetWindowsDirectoryA
VirtualAllocEx
CreateRemoteThread
WinExec
GetTempPathA
KERNEL32.dll
wsprintfW
wsprintfA
GetLastInputInfo
GetWindowTextW
PostQuitMessage
GetKeyNameTextW
ToUnicode
TranslateMessage
RegisterRawInputDevices
DefWindowProcA
GetForegroundWindow
MapVirtualKeyA
GetRawInputData
RegisterClassW
SetWindowsHookExA
GetAsyncKeyState
CallNextHookEx
CreateWindowExW
DispatchMessageA
GetMessageA
GetKeyState
MessageBoxA
USER32.dll
RegQueryValueExW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyExW
RegQueryValueExA
RegQueryInfoKeyW
RegCloseKey
OpenServiceW
ChangeServiceConfigW
QueryServiceConfigW
EnumServicesStatusExW
StartServiceW
RegSetValueExW
RegCreateKeyExA
OpenSCManagerW
CloseServiceHandle
GetTokenInformation
LookupAccountSidW
FreeSid
OpenProcessToken
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteValueW
RegSetValueExA
RegCreateKeyExW
RegDeleteKeyW
InitializeSecurityDescriptor
RegDeleteKeyA
SetSecurityDescriptorDacl
ADVAPI32.dll
ShellExecuteW
SHGetFolderPathW
SHCreateDirectoryExW
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteExA
SHELL32.dll
URLDownloadToFileW
urlmon.dll
getaddrinfo
freeaddrinfo
WS2_32.dll
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
ole32.dll
PathFindExtensionW
PathFindFileNameW
PathCombineA
StrStrA
PathRemoveFileSpecA
StrStrW
PathFileExistsW
SHLWAPI.dll
NetLocalGroupAddMembers
NetUserAdd
NETAPI32.dll
OLEAUT32.dll
CryptStringToBinaryA
CryptUnprotectData
CRYPT32.dll
GetModuleFileNameExW
PSAPI.DLL
InternetCheckConnectionW
InternetQueryDataAvailable
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
InternetReadFile
WININET.dll
PPPPPPPS
PPPPPPPS
PPPPPPPS
!This program cannot be run in DOS mode.
`.rdata
@.data
u*hh;@
VWh@"@
RtlGetCurrentPeb
RtlEnterCriticalSection
RtlLeaveCriticalSection
RtlInitUnicodeString
RtlFillMemory
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
<?xml version="1.0" encoding="utf-8"?>
<unattend xmlns="urn:schemas-microsoft-com:unattend">
<servicing>
<package action="install">
<assemblyIdentity name="Package_1_for_KB929761" version="6.0.1.1" language="neutral" processorArchitecture="x86" publicKeyToken="31bf3856ad364e35"/>
<source location="%configsetroot%\Windows6.0-KB929761-x86.CAB" />
</package>
</servicing>
</unattend>
.text$mn
.idata$5
.00cfg
.rdata
.rdata$zzzdbg
.idata$2
.idata$3
.idata$4
.idata$6
.rsrc$01
.rsrc$02
SizeofResource
WriteFile
GetModuleFileNameW
GetTempPathW
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
lstrcatW
LockResource
CloseHandle
LoadLibraryW
LoadResource
FindResourceW
GetWindowsDirectoryW
GetProcAddress
ExitProcess
KERNEL32.dll
MessageBoxW
USER32.dll
SHCreateItemFromParsingName
ShellExecuteExW
SHELL32.dll
CoInitialize
CoUninitialize
CoCreateInstance
CoGetObject
ole32.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
!This program cannot be run in DOS mode.
/Rich3
`.rdata
@.data
.reloc
.text$mn
.idata$5
.00cfg
.rdata
.rdata$zzzdbg
.idata$2
.idata$3
.idata$4
.idata$6
GetStartupInfoW
ExpandEnvironmentStringsW
TerminateProcess
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
CloseHandle
ExitProcess
CreateProcessW
lstrcmpW
KERNEL32.dll
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
ADVAPI32.dll
PathFindFileNameW
SHLWAPI.dll
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
1)1E1U1[1n1
2(212<2C2c2i2o2u2{2
3.373F3
X0`0d0,181
0o1u1|1
2"2(2/262=2D2N2n2
;&;1;<;G;R;];h;
<!<@<Y<
6/7R7Y7r7
9&9J9P9
<*<8<J<
4"4=4t4
5#6b6v6
7K7[7|7
718C8^8e8
8)9;9B9N9U9o9v9
:=;D;R;[;
3)404$5Y5
=7=T=q=
=G>N>d>k>
>H?^?w?
193P3v3
3)5X7_7f7n7s7z7
8,838A8G8Q8
: :,:2:7:>:L:Q:]:
0E1"2*2H2
4/4A4F4L4T4a4
6.6L6S6
7&707:7D7a7k7u7
8 83888=8D8Q8V8[8
8#90959:9G9L9Q9^9c9m9
:':@:Y:f:l:{:
;5;@;E;T;`;t;
<D<a<r<
<)=C=[=e=
>>*>D>O>T>`>f>q>}>
0(1O1b1y1
3+313;3P3Z3u3
4!41494?4E4P4X4_4e4m4x4~4
5 505A5F5L5Q5W5a5g5l5z5
889C9W9a9j9u9
2A2H2c2
3&333j3
8>8W8d8
>2>e>M?
1+24292R2k2
3"3e3~3
34/4B4U4h4{4
5X6d6t6
77;7W7s7
8^9c9|9
:+:L:e:
=5>J>s>
030l1w1|1
2#2+22292@2G2N2
5)5b5l5
6-6T6]6r6
7+7H7R7k7x7
8$818>8
0_142E2
4&4,474=4H4N4Y4_4j4p4{4
5'5F5_5
5-626d6
77$7E7b7g7m7y7
8 8&8,868;8R8h8
= =$=+=6=d=j=
>">,>N>f>l>r>y>}>
1<1U1g1
1"222:2r2
4-5C5e5}5
868g8r8
8!9,9U9~9
===M={=
7#888P8[8l8
; <;</=W=
0R1_1l1
22*2B2M2l2
3-3;3B3I3
4!4,464@4G4
5#5N5X5g5r5w5
757S7[7v7
8A8X8_8p8
8;9F9W9^9
:G:R:p:
;";O;\;v;
>3>>>D>S>Y>c>i>m>
2232B2_2|2]3y3
5&5Z7u7~7
:%:c:h:
;@;S;^;t;
;3<C<W<
>1?6?D?S?
0070p0u0
2'212;2
363@3O3U3d3
4 4*484=4B4G4L4
5(5<5V5]5m5t5
5d6p6w6}6
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
6 6$6(6,6064686
0 0$0(0x5
5998#u
\Microsoft Vision\
User32.dll
ExplorerIdentifier
%02d-%02d-%02d_%02d.%02d.%02d
Unknow
{Unknown}
[ENTER]
[BKSP]
[CTRL]
[CAPS]
[INSERT]
\Google\Chrome\User Data\Default\Login Data
Software\Microsoft\Windows\CurrentVersion\App Paths\
http://www.google.com
http://5.206.225.104/dll/softokn3.dll
http://5.206.225.104/dll/msvcp140.dll
http://5.206.225.104/dll/mozglue.dll
http://5.206.225.104/dll/vcruntime140.dll
http://5.206.225.104/dll/freebl3.dll
http://5.206.225.104/dll/nss3.dll
softokn3.dll
msvcp140.dll
mozglue.dll
vcruntime140.dll
freebl3.dll
nss3.dll
msvcr120.dll
msvcp120.dll
Internet Explorer
Profile
firefox.exe
\firefox.exe
\Mozilla\Firefox\
profiles.ini
\logins.json
thunderbird.exe
\Thunderbird\
Could not decrypt
Account Name
POP3 Server
POP3 User
SMTP Server
POP3 Password
SMTP Password
HTTP Password
IMAP Password
Software\Microsoft\Office\15.0Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
TermService
%ProgramFiles%
%ProgramW6432%
\Microsoft DN1
\rdpwrap.ini
\sqlmap.dll
SeDebugPrivilege
SYSTEM\CurrentControlSet\Services\TermService\Parameters
ServiceDll
SYSTEM\CurrentControlSet\Services\TermService
ImagePath
svchost.exe
svchost.exe -k
CertPropSvc
SessionEnv
ServicesActive
SYSTEM\CurrentControlSet\Control\Terminal Server
SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns
SYSTEM\CurrentControlSet\ControlTerminal Server\AddIns\Clip Redirector
SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\Dynamic VC
fDenyTSConnections
EnableConcurrentSessions
AllowMultipleTSSessions
RDPClip
@\cmd.exe
SOFTWARE\Microsoft\Cryptography
MachineGuid
ntdll.dll
Ave_Maria Stealer OpenSource github Link: https://github.com/syohex/java-simple-mine-sweeper
C:\Users\Vitali Kremez\Documents\MidgetPorn\workspace\MsgBox.exe
Software\Microsoft\Windows\CurrentVersion\Explorer\
InitWindows
Software\Microsoft\Windows\CurrentVersion\Run\
SOFTWARE\_rptls
Install
\System32\cmd.exe
WM_DSP
e\sdclt.exe
Mozilla/32.0 (compatible)
@Description
FriendlyName
Source
Grabber
WM_FIND
Asend.db
WM_DSP
ntdll.dll
Elevation:Administrator!new:{3ad05575-8857-4850-9277-11b85bdb8e09}
explorer.exe
\explorer.exe
WM_DISP
dismcore.dll
ellocnak.xml
\pkgmgr.exe
/n:%temp%\ellocnak.xml
Hey I'm Admin
WM_DISP
SOFTWARE\_rptls
Install
%systemroot%\system32\
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Clean
MicroWorld-eScan Dropped:Generic.Malware.SLlg.7394ADB1
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.nh
McAfee PWS-FDNF!57C76226A25C
Malwarebytes Generic.Malware.AI.DDS
Zillya Trojan.Agentb.Win32.22302
Sangfor Trojan.Win32.Save.a
K7AntiVirus Trojan ( 005941d41 )
Alibaba Clean
K7GW Trojan ( 005941d41 )
Cybereason malicious.a99497
Baidu Clean
VirIT Trojan.Win32.Dnldr27.DQML
Symantec Backdoor.Avecma
Elastic Windows.Trojan.AveMaria
ESET-NOD32 a variant of Win32/Warzone.A
APEX Malicious
Paloalto Clean
ClamAV Win.Malware.Agentb-6970628-1
Kaspersky Trojan.Win32.Agentb.jiad
BitDefender Dropped:Generic.Malware.SLlg.7394ADB1
NANO-Antivirus Trojan.Win32.AntiAV.fljpfv
SUPERAntiSpyware Clean
Avast Win32:Malware-gen
Tencent Malware.Win32.Gencirc.10be42bf
TACHYON Trojan-PWS/W32.WarzoneRat.101888
Sophos Troj/Mocrt-A
F-Secure Trojan.TR/Redcap.ghjpt
DrWeb Trojan.PWS.Maria.3
VIPRE Dropped:Generic.Malware.SLlg.7394ADB1
TrendMicro TrojanSpy.Win32.MOCRT.SM
Trapmine suspicious.low.ml.score
FireEye Generic.mg.57c76226a25c44ea
Emsisoft Dropped:Generic.Malware.SLlg.7394ADB1 (B)
Ikarus Trojan.Win32.AntiAV
Jiangmin Trojan.Agentb.eab
Webroot W32.Trojan.Gen
Google Detected
Avira TR/Redcap.ghjpt
Varist W32/Antiav.INDT-0919
Antiy-AVL Trojan/Win32.Agentb
Kingsoft malware.kb.a.1000
Microsoft Backdoor:Win32/Remcos!MTB
Gridinsoft Trojan.Win32.Agent.vb!s1
Xcitium TrojWare.Win32.AntiAV.VA@81mmki
Arcabit Generic.Malware.SLlg.7394ADB1
ViRobot Clean
ZoneAlarm Trojan.Win32.Agentb.jiad
GData Win32.Backdoor.AveMaria.A
Cynet Malicious (score: 100)
AhnLab-V3 Trojan/Win32.AveMaria.R263895
Acronis suspicious
BitDefenderTheta AI:Packer.6198C1D61F
ALYac Dropped:Generic.Malware.SLlg.7394ADB1
MAX malware (ai score=88)
VBA32 TrojanSpy.AveMaria
Cylance unsafe
Panda Trj/Genetic.gen
Zoner Trojan.Win32.74962
TrendMicro-HouseCall TrojanSpy.Win32.MOCRT.SM
Rising Stealer.AveMaria!1.BA1C (CLASSIC)
Yandex Trojan.GenAsa!++8lN4UW0KE
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.121218.susgen
Fortinet W32/Warzone.A!tr
AVG Win32:Malware-gen
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
No IRMA results available.