Static | ZeroBOX

PE Compile Time

2024-04-01 02:20:15

PDB Path

c:\9w7kjnhf\obj\Release\Laptop.pdb

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0005ad54 0x0005ae00 7.9945386057
.rsrc 0x0005e000 0x0000063a 0x00000800 3.57545409095
.reloc 0x00060000 0x0000000c 0x00000200 0.101910425663

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0005e0a0 0x000003b0 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0005e450 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
p{{.J{{{{{{@
o{{{{{{{{{{{{{{{{{{{{{{{{{{
UKU*K*L$7)
{.J{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{
{{**{{
{{KKLKLKLKLLKLLLKLKLKLKKLKLLKLKLKLK{
1{1{1o1{1{1{1{
|{{1o3{k{{1o1{
7|{{1{1o
|{{1;3{K{{
;CZ9+
zy=-O;
)G">2~
- GH$E
2\V].G
-'*A+'
5e<c*z
>~?'v#
cJrW4#
a'ocn^
N4x(x|
jwu7u%
(M]yWm
c2/9@J
cRCzcco
OWd(289
!R/"XK
Oa)Hpb
_aIn~/
^.>RZ5t
"i!5KoX
YxswF{
LB?r34
U(\=.J
7%g?[9p
F8B:\B
Ql41P<_="
FD_mb
6:A]_=J
Yv{Dw:*
[Fja(X
VC%=vda
RAh}y~d
Qt'W$&
CGzZzl
{A{{,
wLk?O:
V(k?h|
yyyR47
U3f91<
|Ge~1E
]mDr69
JVBu)Z
R 7VH(m
lEdZ?T
10k~]V
T&~.PgS
I ]`/uD(>
iAbYQA
6sQe_>
!)gr[F
*5/1n=
9`@gs9z
14O>6E/<
P,t{k~
T^Ys]q
iz0c%$
Eln\%_-
tj/5TZ
tx;swL
v}ko9=4
0h+"nh
dL1b"h
H22yYD~
,'1#{v
w?9CzR
r!9:2|y
sM5!9[eo
yOm)Ki
1>@UAL
ynTnCn/
?4YMrjop
H=M%Oph
'ZK4MI
Z5\PfO
N*C?hq
)u]S m
|[E%)b
AZ|6a+
O`BVj.
4`cLqnyw
@i#2c./2
lqAFdz0
OiA44!ri-
l5n1]:
MKyN#p;
*Qo!U&
9r\8)P
f ,0K
T,XoG=
m>xXn_
e:}BL9
=1\%Mr
bch^%z
JzS4y=@
Yk2Cvd
yH>@kj
?'3w1+
*ixK,7^
C\&2s8
``7'/b
OF$,Z##
unWX*H3
y)kB<p
kAsr`7
@?%fcl
V!K-h,
Hbq&mj
q%x3HzFz
{h,S52{
(2}aVm
X1zu9
BPM`mq;
DZB*e1o
"Q#Z%ll9*
w3,C_`#
x2B-pzV
iK[eu-.
D[cak-
QIy#08
T8\;J0
6Kn!T
"8<"6+>
28,Bd]
<kK#$,
U+s|NB
T$Vmbo
DKX{gx
VXeNOto
> 4+Og
wIypGv
M_10Qk
3(lF-+
]F@Oe>
mM,K%L9
BGRQFyT
eC7$P_
}\:Qw%
frA4`AI:3r
E|@!X
Y(rx1PE
gEIYjQx
ve,f;7hB
vYC{9@
Kgk3jPF
un}t3D
7~?i%Ko
x2vZH*]zn
JT)hHW
x36w=]
fR>=UY`
xOo|k\F:
.oj)(W
/SiCWz
m 0<U;
p*?4Co
kBuidS
D!b[NRJ
O[Rt:
D2CG/e,
JRAO$?
3N<D+Z
v|,97
U'BJk}
]ifD>K
B|P!.D$
Eag)WQO
^O]!!\
0yV1lp
sY;!iP
ojCjC+
1-Z2vY
6A%!]Z{
T+)i03
&qe0$b{
~=o+"X
}UOB]T
j};u;,
7lb8;
y!Lq+'
v&E}i8[V<@
2HWaA12
4g-%?1
m#w,qs
u8TM/=
EtMK*p
Jy1])8
dI[-s?
cW@eG,
a:EA;M3
+_&XQ{
MMu{LX
`yC!'n
Xw@6At
*'.kcIS.
FQz8T
30UO!g
!8k%\
QuwHyX
.6"{:>c
G#m2Rk
s\wFK<*H
5Kfm|S
@07;BO
[+VA#x
F6m(q@
5G,C`7
qgS=U_
=Hw<d#
xpk(nt
"4Jc(C!20
/C3BEX
QW%w]D
K7;_{2h
.vr1qkD
fes^'9
hz>Z-|
}gM-HuJ
9DRbi|
05/nedY
E]Z\w<
u0U:Fu4k
@Z7]>!n
f}leTw
_z#IZc
@#7+D&
hZCIX|
zle1ELEV
J6UcQF>
{+atJlN
`G6{&n
^<8Q.:
wi8HRaF%,
50"jN&
4/'oUZ
3Gl[-]W
!9ML]i
@Rq1%ha
wLB,B}
YOw;H_iS[
/J[X`-
{&,~-j
&|WNlL
$|2=4B
nTQ>f_D
u&*dLn
5"B0vE.
<qR|2_
>)ewLN
[RProO
Hb%G)%
P2J)X%
R:B#@o
?0Mrf3L
m5bQmRi
YhQ=/o6
/Z[nj+
sM^(>:
7;mQt;
uHjiyJ
nydHefr
9ROYVf
)bp5Kz
vr>]Ef
Vm{kq{~
HWHjFwm
g5to%%
q#^t0:X
Iu"aqZ{
G&CyB}
+a4yyE
*M%ei`r
z[V\?xL
MMZ.$mn\2
qzKoC8
u{Nth-
JCwD+2
H>*l,-X
Yy"es(
5\9qI]
WWU<ATd
]P{DdDi
$d*7N~
%J^OxV
'Y9|y&I1
&ERi<y
1.PS3l.
!yhXn*
&(Gv<d
N/_-Oa
Nhl'8
QHI>[BC
zSkI7ja
/#|c6
~ l%t_p
R]e}l/
GlP2?%
^'OH/b
qf/?_uD
*6wVN%
:|t9Ua
V|oeA'aO_
SL_VF7
Wb3U;Lyyg
e+M8<B
1j^7cN/
%<~(xh
;I8j{w
y/[G%)
eTpMvPD
}M>%'DD
`f4`J!Z=Z~
)"Xo[s`z
y.]= Ga
6KVOh9q
Ob7][9
&PLGa~
m^TB{O
D_9UwD
Dh$'Y~
U.vEP]
'Z@Xk?
+ZM -_
LZ]g093
b>p?X^wnR0*
gr)xU.
Wu$ksG
_wF*IL
}sX)>W
D7i^^@
Q)Y$9d
QE3%}
@AqdO&
4BL*'1?
MOimWr
)6|!dH
AedF:m
o:pMbe
\c\ih
p, r[!
tM6#4AF
N[`n/t!
n^wlGyu
M&NJI%
O97PPv
b6/;?J
d4%N<@]
;y:BQtVj
x`VRqI
P".miT,
DanOW4
pl,;)Hl
,uQ1r\
Q%r?Br
9}bNd'~
yl\2vm
D\k{)Kr'=
FK`OUh
U$IT>'
B\|pje
2<7;%7e
[G\f9' h
U2_+{F$
)HR>\07
y)yN(G
Pio(r.
%<}W+s]27
LK|%%#(
$<~ #(
f=`5.T
WIDI#)[
KFFu^
LYr%"e=H
S*ja=_
!(-%bV
Mj}#IbI
G0~@<(0
ZHbAwm
ThuX\,/
%c+W\AK
H{9+^{3
K5ax3r
F7{W>\
D1[[!2!mI^I
La|QKq~(F
`=\7#W
*=0nW4}y
Q?zswn
hH}|Q{
J$_Q&Y
6IoIbf
8f_^@q5l\
Q8|T"Z*v
:4$B XP
EW{@5.u#-
T946W[
^Eu4 7
z%|m`))
`d<-Z_BCXL
]HF[R+
7#9,N1
0\fz;wF{
sUfzM#CR
p#a2E&
_ x7e@;@
gnAV^^g
16,]^D$
G$}BQmW
1m#QRD
*sr"v^
'+Iz$S/-W.O
1gB+:b
#oI7:i
:t0,og:l
vrFdg14
4Wf*x"1F
3f"k`\Q
Nws\{kB
0Hse~a
j,$WZ
M-0QwN
g+OMF\
)3T26`{
6t]Ac4
} [Ed5
^6?Z`\
h^0F@w
)UA9X\
*O{n]
7Z]oHC
BnMK#)I
kh3+_2
hn%D^4J
QI]O\/S
r]@NBk
#HZc\y
)/(Oi5
VdN\`\
hMl@og
C(oD!e
o;zeJp
{^#lo`
en{C^d
eVBa4zL
|v+;Hr
@``YT:9
1wJ8'{
p/J`kEk
S/}~DB
HbIoPa
Wa+$r$3
$':k b
BHN7tb*
)'O[6ko
{;iK5^
,Jy})4\
B8i=qb^V5f
N'LZ5H-
5q^62^F
:uhOtq
kWT<uk2
3BVDRm;
F^Vt$R8
(z-X$6]
^%t&)9
w6)g8-
x4!Ewba
9JaKV}W
iw-zav
6`~<Hb
rkZ6Kv
a5L_(:
tN^Zj@
JPj%$Q
`V]#gF
9S_L+a
x+j#oU=Te
*!S;bMQz}
T [@S~KB
s\prIQ
8zP9_S
sI-h4b
k&#Lgdx
1.|Fxet
vq<&$s
=*U>_p
&n-(s}f
l1W,oc$
-yZG6;
!D(3IQ
OgJ@Jms
9Y>b07bT6@XQ
@+OwPz#
$Jo^0c
`hgz@"
o;s!Hq
Q95Ofp+Ee8B
FJ7+rb
3&s,Sp2*@
:6l>Z1U7
!p:ri|
U3vcT\
Xu0,_C
'H$tXS
t=y DV
6Qo5(}
o]9FW~
`i_=\
@5R_*Sy
tNQp%\)Q
VGcHiu
Maat06SB$Yw.D
Vg>IB:h
!E'{{9
.T)Ox'
]$~bH'
Rc`8:$
n'3H7A5
OfGvesH
O+XfH|
pI&9LY
?GM9cA
#@8#P0
2+0&Pz
're ((
WX"wvS
S<qkz4
WjFy]G
xDe}I|
% LMZ
FI}H!:E
Qr(9@v
aL0,"7:\
rAXShhK
cflFt$
O<NlR
#7}HA
>hDykG
tvW*6m
*T}~' ass
h9XXpz
cP0-]/
$50S<#
\<0E>]
5ujn/U
T( Hzzn
$N]f)I
$b/>>.\k
YQgmgc
V@H7W
3E75#+
wo\H2#
/S]Fv;<
*-K!<4
GM4Q5wJx
)X$0F]
Fcg&rv1
?zL[Q<
1|$#%pg
AKF{d\
Qd([]b/
)7P-q7
.?tmo'
D"?(Zi
f_[i+x
oA)5F:k
WKM1AV
)up4DR
4*n{^8
k4Tj+*x
o959_z
Le(X+
|\.'}%
ODe\'&y
rCCTxfQ
vYd0*G
=%>#8>
mO$!W%,
_Nt~z#&
<SC ZO
m<Aru)
TJ,/Te
F,-diopQ
$WJ;/iP
b3+pk!
K$">WZ
Xam?1a)I
:34s\%S!
6*<)-8
ec'P!I
AYN([V
fw|}0n
w!TP!C
z]ZUokw
^Eof=q
1}7oF'
M&om{AI
nzv0'.-
*`HP-F
3b^~Mw
u_``nA06d
'K,q{z
&/%m#`
\:-`!tX
=jj}Q8
p_a;iV
U^\%{B
hwWM].y
I>?,0g
DfM;(L(llH
/;U5zw$w
8}]@wk
/-:XgG7Cq
z(HGqg
+8z\$)
$h"b|m0
LVNdVb?
Ye[~]L-
\@dl!F[
go8>q7
~@@HS'
Jm}ThCMz
[9};&{
~^oDsY&
FW=|{5
p}}ON&
xrc%X,
k?1yd
BxWR_{
MToM^
Eqza|%
SZ\fQ9
b\[58
%c,pS7R
y#~bch<
J|wx;E``
F?x.)V
~ 85]m2
-J6soQ|
&_wid*
v4.0.30319
#Strings
<Module>
Laptop.exe
dYuVXzkLLVWbcxpNkzwMQNycwFrMShzJDdw
MSG_NET
ZtrbobDfRVDVSYJDbiTjJYMtnApmznZIIGm
Correct
Program
Angelo
DgasyudguygiuxHIA
fJhisuAIUO
ThrSgtrjyt
VProtectEx
RemoteObjects
mscorlib
System
Object
MulticastDelegate
XcPUCXlXkRnyAdQ
SEpkIxkGeQJmaOu
SuperBook
GetRemains
EternanExplicit
GetProcAddress
GetModuleHandle
AlphaManager
ReturnSpecialList
Invoke
IAsyncResult
AsyncCallback
BeginInvoke
EndInvoke
userBuffer
target
dataBoost
xnbcoiAi
fwerdwef
gwserdeaww
AScsrhgtr
QuvxUI
cmnzIAow
object
method
cbjxBAuiw
zokpcihUw
callback
result
cnxnUIAuwBuwwqq
sjinxnSCe
kmvoSnci
cniuABiuw
vpja2bx
kjcbkjiw
protectonType
oldProtect
System.Runtime.Versioning
TargetFrameworkAttribute
System.Reflection
AssemblyTitleAttribute
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
AssemblyCultureAttribute
System.Runtime.InteropServices
ComVisibleAttribute
GuidAttribute
AssemblyVersionAttribute
AssemblyFileVersionAttribute
System.Security.Permissions
SecurityPermissionAttribute
SecurityAction
System.Diagnostics
DebuggableAttribute
DebuggingModes
System.Runtime.CompilerServices
CompilationRelaxationsAttribute
RuntimeCompatibilityAttribute
Laptop
System.Collections.Generic
List`1
ToArray
Convert
ToString
TryParse
get_Count
get_Item
SetValue
String
get_Length
GetValue
Exception
.cctor
rivateImplementationDetails>{9606DA15-70D1-4B25-B545-CFB0E3A7A4B1}
CompilerGeneratedAttribute
ValueType
__StaticArrayInitTypeSize=1196
$$method0x6000020-1
RuntimeHelpers
RuntimeFieldHandle
InitializeArray
DllImportAttribute
kernel32.dll
IntPtr
Marshal
GetDelegateForFunctionPointer
UnmanagedFunctionPointerAttribute
CallingConvention
__StaticArrayInitTypeSize=16
$$method0x6000021-1
__StaticArrayInitTypeSize=363520
$$method0x6000021-2
System.Security
UnverifiableCodeAttribute
.NETFramework,Version=v4.7.2
FrameworkDisplayName
Production Catches Collagis
Overchills
Copyright
2023
$d17b41c9-3955-4890-95b8-887aac006e01
1.0.0.3
WrapNonExceptionThrows
System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
SkipVerification
c:\9w7kjnhf\obj\Release\Laptop.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
210429000000Z
360428235959Z0i1
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
[K]taM?
SA|X=G
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
jj@0HK4
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA10
221018000000Z
251015235959Z0
California1
Santa Clara1
NVIDIA Corporation1
NVIDIA Corporation0
L/I=Ht
Mhttp://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Mhttp://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0>
http://www.digicert.com/CPS0
http://ocsp.digicert.com0\
Phttp://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
DigiCert, Inc.1A0?
8DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
;h0al\
20240207171407Z
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
230714000000Z
341013235959Z0H1
DigiCert, Inc.1 0
DigiCert Timestamp 20230
Ihttp://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
http://ocsp.digicert.com0X
Lhttp://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
l2|X/gGe
(f*^[0
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
220323000000Z
370322235959Z0c1
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA0
http://ocsp.digicert.com0A
5http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
2http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
DigiCert Inc1
www.digicert.com1$0"
DigiCert Assured ID Root CA0
220801000000Z
311109235959Z0b1
DigiCert Inc1
www.digicert.com1!0
DigiCert Trusted Root G40
]J<0"0i3
v=Y]Bv
http://ocsp.digicert.com0C
7http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
4http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
~qj#k"
DigiCert, Inc.1;09
2DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA
240207171407Z0+
/1(0&0$0"
@WhA6o
xR}JlW
ztJVdNS
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 20120
230914191423Z
240904191423Z0
Washington1
Redmond1
Microsoft Corporation1;09
2Microsoft Windows Hardware Compatibility Publisher0
'V:VAP
Microsoft Corporation1
232825+5014930
chttp://www.microsoft.com/pkiops/crl/Microsoft%20Windows%20Third%20Party%20Component%20CA%202012.crl0
ehttp://www.microsoft.com/pkiops/certs/Microsoft%20Windows%20Third%20Party%20Component%20CA%202012.crt0
ItEPxe
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
120418234838Z
270418235838Z0
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 20120
-g<'<V
}PH.=C
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
p%|Yi1$
Washington1
Redmond1
Microsoft Corporation1806
/Microsoft Windows Third Party Component CA 2012
(https://www.microsoft.com/en-us/windows 0
aOC,3
20240208082516.974Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
231206184534Z
250305184534Z0
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service0
~|,sZb
PwO?8:
Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l
Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0
Washington1
Redmond1
Microsoft Corporation1200
)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|1
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
3http://www.microsoft.com/pkiops/Docs/Repository.htm0
Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z
>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
as.,k{n?,
Washington1
Redmond1
Microsoft Corporation1%0#
Microsoft America Operations1'0%
nShield TSS ESN:A000-05E0-D9471%0#
Microsoft Time-Stamp Service
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 20100
20240207215120Z
20240208215120Z0w0=
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
Washington1
Redmond1
Microsoft Corporation1&0$
Microsoft Time-Stamp PCA 2010
OmmLUOYnOXYPbQacJiJgtIiOzIZqtuzkkZYgGzISElssPeGNll
RuJwfBUCLwnFkjrsmBeNtwwSyNBZKewfylZFqqPiXRqujAEskL
kernel32.dll
FreeConsole
VirtualProtectEx
WaitForSingleObject
CreateThread
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Microsoft Corporation
FileDescription
Microsoft Connection Manager Profile Installer
FileVersion
7.2.19041.1 (WinBuild.160101.0800)
InternalName
LegalCopyright
Microsoft Corporation. All rights reserved.
OriginalFilename
CMSTP.EXE
ProductName
Microsoft(R) Connection Manager
ProductVersion
7.2.19041.1
VarFileInfo
Translation
$NVIDIA Corporatio
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Lumma.i!c
tehtris Clean
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh Artemis
ALYac Clean
Cylance unsafe
Zillya Clean
Sangfor Infostealer.Msil.Lumma.Vc8v
K7AntiVirus Clean
Alibaba Trojan:MSIL/Stealerc.307bfdff
K7GW Clean
Cybereason Clean
Baidu Clean
VirIT Trojan.Win32.Genus.VMB
Paloalto Clean
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of MSIL/GenKryptik.GVUB
APEX Clean
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan-PSW.MSIL.Lumma.gen
BitDefender Gen:Variant.Zusy.542885
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Zusy.542885
Tencent Malware.Win32.Gencirc.10bfcb5f
TACHYON Clean
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Nekark.hyisb
DrWeb Clean
VIPRE Gen:Variant.Zusy.542885
TrendMicro Clean
Trapmine Clean
FireEye Gen:Variant.Zusy.542885
Emsisoft Gen:Variant.Zusy.542885 (B)
SentinelOne Clean
GData Win32.Trojan.Kryptik.R4DK0R
Jiangmin Clean
Varist W32/MSIL_Kryptik.KTZ.gen!Eldorado
Avira TR/AD.Nekark.hyisb
Antiy-AVL Clean
Kingsoft Clean
Gridinsoft Malware.Win32.Gen.tr
Xcitium Clean
Arcabit Trojan.Zusy.D848A5
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-PSW.MSIL.Lumma.gen
Microsoft Trojan:MSIL/Stealerc.AMMF!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5606905
Acronis Clean
McAfee Artemis!CFD2733BA128
MAX malware (ai score=89)
VBA32 Clean
Malwarebytes Clean
Panda Trj/CI.A
Zoner Clean
TrendMicro-HouseCall TrojanSpy.Win32.RHADAMANTHYS.YXEDBZ
Rising Stealer.Lumma!8.177F6 (CLOUD)
Yandex Clean
Ikarus Trojan.MSIL.Krypt
MaxSecure Clean
Fortinet MSIL/GenKryptik.GVHR!tr
BitDefenderTheta Gen:NN.ZemsilF.36802.ym2@auYXnOli
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_70% (D)
alibabacloud Trojan[stealer]:MSIL/Lumma.gen
No IRMA results available.