Static | ZeroBOX

PE Compile Time

2023-08-26 21:10:48

PE Imphash

8216626f230fae173fa22074eefacb8e

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00067a9e 0x00067c00 7.91208990941
.rdata 0x00069000 0x000029de 0x00002a00 4.98956453692
.data 0x0006c000 0x003f410c 0x00002c00 1.69169634681
.rsrc 0x00461000 0x00001930 0x00001a00 5.45716233899

Resources

Name Offset Size Language Sub-language File type
RT_CURSOR 0x004622f8 0x00000130 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ICON 0x00461210 0x000010a8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_STRING 0x004625f0 0x0000033e LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_ACCELERATOR 0x004622d0 0x00000028 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_CURSOR 0x00462428 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_GROUP_ICON 0x004622b8 0x00000014 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x00462440 0x000001b0 LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library KERNEL32.dll:
0x469008 LocalUnlock
0x46900c PulseEvent
0x469028 CreateDirectoryW
0x46902c CreateNamedPipeW
0x469030 GetLocaleInfoW
0x469034 FatalAppExitW
0x469038 SetConsoleCP
0x46903c HeapCreate
0x469040 ReplaceFileA
0x469044 GetConsoleAliasesW
0x469048 GetStdHandle
0x469050 GetComputerNameA
0x469058 SetStdHandle
0x46905c PrepareTape
0x469060 LoadLibraryA
0x469064 LocalAlloc
0x469068 AddAtomA
0x469070 lstrcatW
0x469074 VirtualProtect
0x469078 EnumDateFormatsW
0x46907c GetFileTime
0x469080 SetFileAttributesW
0x469088 CreateFileW
0x46908c WriteConsoleW
0x469090 SetLastError
0x469098 CloseHandle
0x46909c SetFilePointer
0x4690a0 HeapAlloc
0x4690a4 EncodePointer
0x4690a8 DecodePointer
0x4690ac GetCommandLineW
0x4690b0 HeapSetInformation
0x4690b4 GetStartupInfoW
0x4690b8 TerminateProcess
0x4690bc GetCurrentProcess
0x4690c8 IsDebuggerPresent
0x4690d0 GetProcAddress
0x4690d4 GetModuleHandleW
0x4690d8 ExitProcess
0x4690dc WriteFile
0x4690e0 GetModuleFileNameW
0x4690e4 Sleep
0x4690e8 HeapSize
0x4690fc SetHandleCount
0x469104 GetFileType
0x46910c TlsAlloc
0x469110 TlsGetValue
0x469114 TlsSetValue
0x469118 TlsFree
0x469120 GetCurrentThreadId
0x469124 GetLastError
0x46912c GetTickCount
0x469130 GetCurrentProcessId
0x469138 RaiseException
0x46913c LoadLibraryW
0x469140 HeapReAlloc
0x469144 RtlUnwind
0x469148 HeapFree
0x46914c GetCPInfo
0x469150 GetACP
0x469154 GetOEMCP
0x469158 IsValidCodePage
0x46915c WideCharToMultiByte
0x469160 GetConsoleCP
0x469164 GetConsoleMode
0x469168 FlushFileBuffers
0x46916c LCMapStringW
0x469170 MultiByteToWideChar
0x469174 GetStringTypeW
Library USER32.dll:
0x46917c SetActiveWindow
0x469180 SetKeyboardState
0x469184 DestroyIcon
0x469188 GetClassLongA
Library ADVAPI32.dll:
0x469000 GetAce
Library ole32.dll:
0x469190 CoTaskMemFree

!This program cannot be run in DOS mode.
`.rdata
@.data
tWItHIt9It
uTVWh[<@
^SSSSS
HHtXHHt
?If90t
QQSVWh
j@j ^V
URPQQh`V@
;t$,v-
UQPXY]Y[
t"SS9] u
<+t"<-t
+t HHt
PPPPPPPP
PPPPPPPP
e>jk]^
68o&]G
^]kBD,2
TFrPbL
nvi%=n
v.s*b&
CQCO]Z
^x&i~1
J<XbW0
sY,TRHU
:*dO@&,n
km$o#Z
]r5V??
b8&zKY
g6 re9
H]C\^B
'Rwfx.
dlPIWS
mnHH-f
(Ai64'6
Lg*1i/
!F:Vf#h)
vLqW^
s|*r(z
xxhDg>46
-hL,O[f
bO+:vZ#
=%,+t,
^?;L**
PV38Q
9Xt6RO
<1m8?}
]]/:K<
RElpIa
]^`&1=|
`ILb<c
oNnW"f
:a=A!2
J$;4m^
J3i_Hc
s&hzFr
=EyzKp
Fo<|Yyf
,TrR^.V9
bhB8w"
3,x3j
VHQomd
BW)k?
Mu8t^$F:a
f8H#u%
M\\juu
D)A9>6
_zC#XK
A>1? o
`-&Rgs
;Q:]<v
7}}V}K
u"Tt^/
E,q7d7
5"e.a4
(V,{3-
ce7m2q
8k6ICL|5L
obq/k\<
UVw5%?X
Z)&^Z2{
Ci=yRuXD
Ge:7G
0=?n3z
yN^1Ki
-",)%h
~%xGG#
*;{,)O
Miv<gs
Kn*$Vy
]@p/Rz`b
YqdCB
bncd{m'
x3V%}`W
%_PEen#*E
P(~qtm
q&lM)
GKGE6w
U22 <.O}
&J2F{ZgC
z3,x#v#0
cghsH_L
a1Eru
7PvPjjw
1<!C<o
#s[F7.>
Q8FZ4>6>
CSSfl=
:PRRPk*j
0U<2G'c
+?rU?|
`RJB}d
nRg{ ^
SU?S,Z&
{o.V^b
V:!@`Lb
?0>8!Z
eVbq,dV
ez0R&`
}b[uB?
pbxpS;
@8@t;u(
B_7mh!
71`P*H
_W[zE`
0 j`ahu`
DmAh{tz P
Rg"Fk40
I\IK7&Z
Y3=zpD
JY&9Gm
fsMKR7zx
X3!qec
hLQG2E
a83EMF
{Rf>s<K
-9Wb\\Vg
YF[y_C
z,#r"X
oHL9MK
!L&gKOl
ttM+~+
c,/BvH
#V"IYN
>x9?o,
H6<(vk
tl_Rc{i
^^_'-#
ERCBND
x;<S\<
`WjoId
=ADaUb
3=bh<g
YsHUF*
yFQN\s
?N/L9i
fPKE.K
v ?ff!
h|iTA[
.l"[pQL
+p&T%B
:j7D2V^
->nbxwY"5D
X$?:KU
vhYmW;
fMju40
SA7t.G?j
s9^:_N
'*L>We
}A+iU7]
3(\X]s
GQx*<`h
368V5gx
>ndSP4
9#hne6
6US"V($
U,Z,&tS:
XqF4n^
AL/83(
8()a6e
Kg8h0_!g
%wXxQ:@M
hs&:Lhd
^)Qwabs
~r4]P4
YJJD%o
1IB>R%
vbm46q
=2Y!*J
8Z@lR,
6HH2hH
gY022
shJXkS
)v'~aGtf
g7@=Kg,
<u7dI\
<c3HMy
#K%1
<3;|U}
/V|AB!_
O[m?J)'
!On,=z
(9}rZd
# Z+Ac(
q(:?L(
Cp eR'
z {JJO0
6aRRop
~fYnoaH$
_'WmvL/
%->8j0
b~o;1H
?dLHrb
na`RP
c|`hT9'
3HG)MQ
7:,bE]
zsCe7H
&]^W2N2|_
m%fO"^
!$b`I91
G,lVUcyr
DX"vx.
pL-o;!
!eG}oM
NvVhIC
4?N"`^
316.j$
F_MEoc
f<Ix4q
Cn;rV8
FDpj[T
$]`H{9
lY_Mc87
n^yfEC
mrv1bC
zQ}FF
i|?`/M
+@d#.2
={v3\e(p
[oqG>I
{-eZiw
znBrn?
:{iy&Y
{Gf?jFO
XJIhR}i4
35o|e
>!r:^.xU
L}_yvY
,]zLcyl
RQ[n0
Q(NU=%M*P
F+_4Fw
?(7EgBQ
Fw,>}B
{kcy>GS
N/Ys4c
T!,$Um<J)
xK*)`4j
!Q9t#]d
9$%Ld4
5hM\fq
IvUw>D
%c?3|5
:Y7W?l
c3ba(dX
*]v'>RB2
gv@=!L
.7U?^f
]>:I/ez
8h'r4'2RB]
U>)$@c
v&OI_0K&
glTqFl9
HAEu"[
W!n8pa
[B:?x[L
ApCGh0
z@fM0kNUO\$
U1~)~~
Db"f.E
TT(|g9
uJ7>VN
eH$^7|]
+]%PJ_
!csaV6
l@,Nb2
+df3,I
.O{FE{g
J'e>PB]
TK9<dqEC
#6q[aXG
U/)3z
H_^9PQS
zu>$;V
d|NTP
m2`3e54H
Gub%I%
~%xt8Q
"n(G8%S
^1e-.
JKi|#D
@vzr~Z
Y`pp&G
.F>-^
G2R=Dkh
RZ`a-D
5"dK>v
L@.u9
v_$ ^l&
'yL()P
>:jNSn
]Huw0n5
y\s>=e
7Bs>qu
x0MDTdN?
s"?.McH
Or5KcJ
W'QqFu:N
@8~#HK
Cv.FM$
`!MCUN
4]Rv?_"
;RE00_
<tw;{IZ
nzm|WtL1
cro*kv
_gT^-D
*>s9L.3><_C
]1, 6S#
W@;j[@
JcI9rX
K-O.PR
=;TG|1
hk%t[0
lU>vA`
f`g>iu
}R&sikS
QuNqnQ
VhYb_%
MwVYh
6a)k@\
A/J}79@q
=vW5Hh@Q1
X qVmV-
&#\pW$
3P^tN
E3=c6X
DpX2+W
2uAN$f
pD3iUH
MkSz;q
'oOBMz
]rnTK
^y0=k_"{
Xk{GU8
~Inz-9
X=J|}Xa
or,ui4
c ^GC@X{
qzsJC*
Tmnd)3
Wx,?d
RTb^/-
YCs*BX)
/C+f4Q
*VpUp#
aj3r(0Ix
u1O0o-
/.vzp^
y<wI]^
3oR0B,XQ
->h4^Ww
v@Maio
=?gqV;
MH&\]R,
I[cW9Tnh
A|t+[J
9R:n)OXEL
X'"n7oz
D2?ec!
OzXi.y
UW.t%xo
MK|/jO
,#.y|]
_H40G1
7d$K.
DEU?J8
e#cD\~'
X@ 8xb
MA}j.x"
$`;z{>p
F{y34U
h\O+};
q"PZtX
#8DD!lr
:-I_O9
}'\QG}
OUnjDPoJ via
hh-G%
_@9 N/-V
Ee^Ait
>G^S0d
X%D5t$
M^>[(
Pt-w'Gw
uw5*{&
NY-Yd-
q9@Uz'1
xK0u;pI
d\%Vr0
DA)"1=
{6n:fD
r(d>qb
3eF\},
5t0<mK.
/-:R^jG
DlR9)FI3X;$
^!q"[R+
+.+lor
MP2S(qJ
GAP^Cb
D3R_]V
jn}C1jJ
&'}_2Nn
`Ely]Y
Y1K01n
zUS,I_q
].FaLa
(y2^n$
IZBNWF
O?bh`Q^
lA%9''
\}5\yBs
x/OB,;
RCe?'XM
<'~!?b7V
\BR{Vg
jGhIq
6iS=#5
pSHj+U9
3<zH,/i+D
tO,+;C!
q~,A(g
}PF)%lf
Col4
G7+,6B
S#cy~R
#z93Us
A/yxhI
5U@u|G
j8(29P
8oHWAu^W
$G/>YGA0
sKp]q_t-
ICeq_'
+{X\8/
u0`@Dc
{)%H|8
ya=%/{M
^}1Jsh(8
O'n+jAK
3VQRI6
E'm-2hh
5D^d!>
b&:eeX
U&d>H8
~X^j%DHLo2
FK<?0F
4'DOC]
7"XY*_
~Aa|=UD
55$2W;
C;vYJ1
p0fgg)
qhb9JR
ewXY{p
"#%ZA#DPP
17F!m9
M&{1jd
W]*z?]
Z3y;vX
#}yW*6
U/_V/s
S%L(y'
q$Oy@"
f)08ml
t)__!X;
R)_)GzL)uC
=AX~ri
X&,/_
kjmP{-
R>hVt
b4@VWro!*B
%Yon(1
r]CEY7
>KQC3a
+gHw":
p>Js85
18D'M
`:BM4F
K+&nF
W4v}}\H
o7*rPi
"eLifw
ZcC^4k
*-XlU]
)aLT[5m
h,D7?LtZw
`U]3w[_
{e(J(R
A6,.^9
S__$rS
n1s?;q
} gqd}
KU8EfG
w?+gy2
e(o53R+]
"*2^xa(b
n^b<[p?
_7+U2uY
d&_:W8z
)$[ p>
\ B9rO
EhN4c_
gLcZC
H8Rxy+
G$]b,}\
-K#'*f
^~J>,J9p#vS
PYECvR
ypjHQS
5l-jcr
?n;b!tW
hO_1;T
NQvL-b
Z=9*!(}
^,?~\[
P+:,>#y
|\I3O
~<&5_a:
u4Kkj"
PKQLe*n,q
2e{%%C
`<?H3j
:^5{y64
=/mm86
t/_O)&
*~aUN@hCsij
mNyr_Eg
-N_7;4;
UtCV;*
$IHk}@%
hfs.U'
Pr6j2{%
kbqFE7
&T-DdL,
*=a&C_s\
MJ1AnX
GX.b6$$
|=4;jd
s*C-uK
@y,h@cQc
-Q%pFl
p[,={
cd_kqM
pB^0B#
J]}g~F!
sz'=-K
2> d@p
P2|JI3
a[BKZt
GFz1ee
,vb.*w
cDb]n:
6_"ry.
>.R)T"dW
L'0iBk
ti/!1S
([&e:q
vCjEg{
oirxGJ
#>8d5fC
L%wY{:
@+hue+lj9"
3Et8Ezv
shOp5$S
b_Yu0&l
7uaOn^
Bc>ZbQ
)V.cQj
|zK5LG
o9ze4tX
'S/YoY$
quw(R+\
'*/{PX
&rd|Q;%
Fd-jL$_
J,CY*^$t
BFkA5V
;.NrSKs
5wU44$
W=3M!DB
o1`8W$
:%:KP[
W5fG(js
Ebpdc\
#-Of-!
clr=r$
oIbB>t=P
#.O4<4
"-b/[7
&!!Gza
sziDld
SMn\/-f
S{\.zt
\crg"z
zU=NRT{:
RVX&LH<
}sMvwKG@
NN(`Qot
Bm`}B"
^=V9Z_
HQ<9i'!
6;w!cK/
w)&pAo
U\%ftl
7sB>K[~
#\:8+Y
xD}U1l
mlZbxovf
g|y<3]
"e|1d$
<]xP:.M.
[dM<U\[
PDK\If
ERU$6if
LkH0ml
_#7ZRE2
L$$_[3
SSSSSS
CorExitProcess
(null)
`h````
xpxxxx
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
_nextafter
_hypot
GetProcessWindowStation
GetUserObjectInformationW
GetLastActivePopup
GetActiveWindow
MessageBoxW
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
`h`hhh
xppwpp
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
1#QNAN
1#SNAN
zutesetutoyoderukeyihexo
GetSystemDefaultLangID
GetComputerNameA
LocalUnlock
PulseEvent
GetConsoleAliasesLengthW
GetProcessIoCounters
WriteConsoleOutputCharacterA
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
InterlockedDecrement
CreateDirectoryW
CreateNamedPipeW
GetLocaleInfoW
FatalAppExitW
SetConsoleCP
HeapCreate
ReplaceFileA
GetConsoleAliasesW
GetStdHandle
GetCurrentDirectoryW
SetLastError
CreateTimerQueueTimer
SetStdHandle
PrepareTape
LoadLibraryA
LocalAlloc
AddAtomA
DebugSetProcessKillOnExit
lstrcatW
VirtualProtect
EnumDateFormatsW
GetFileTime
SetFileAttributesW
GetVolumeInformationW
KERNEL32.dll
GetClassLongA
DestroyIcon
SetKeyboardState
SetActiveWindow
USER32.dll
GetAce
ADVAPI32.dll
CoTaskMemFree
ole32.dll
HeapAlloc
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
HeapSize
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LoadLibraryW
HeapReAlloc
RtlUnwind
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
CreateFileW
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
KYEO>@
CO~pyz
jjjjjjjj
Fjjjjjjj
mscoree.dll
runtime error
TLOSS error
SING error
DOMAIN error
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
- abort() has been called
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
FMicrosoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program:
(null)
KERNEL32.DLL
WUSER32.DLL
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
((((( H
h(((( H
H
CONOUT$
resawatoxuzinela
kanipefumikolilesefodikunaxowog
renej luwoyisawopab dadabayegutenecisufoba wozonotuwugewiropoxu vogiwipeladoxakanahotucucuwi
VS_VERSION_INFO
StringFileInform
040504E4
FileVersion
10.3.3.59
ProductVersion
27.86.30.51
InternalName
Slupido
CompanyName
Torchok
VarFileInfo
Translation
Kotubolohebefu%Vasuyucojek hemuxazayefeza miwe yirub
Robah luj cerizunerGGiwuvayasaye melexeye beculepub holumojore vosuxurikube jenuxafejifamoh=Fub hasobucuwuwu zamojibuw wujenuji dafatavujug get xixamaxow4Kiyigubot yajazavinodiv jax fudusome zihohonelalipotHWuwiwuboviwe suzurivici mixu camatuluxigaj cewayenumimeveh yeci guwikeviIVifagupacalif vemaseveseviti cebowimezu piduzuhoteduv nirapelo non bekebi
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Glupteba.4!c
tehtris Generic.Malware
ClamAV Win.Ransomware.Lockbit-10022840-0
CMC Clean
CAT-QuickHeal Ransom.Stop.P5
Skyhigh BehavesLike.Win32.Generic.gc
ALYac Gen:Variant.Zusy.543359
Cylance Unsafe
Zillya Clean
Sangfor Trojan.Win32.Save.a
K7AntiVirus Riskware ( 00584baa1 )
Alibaba Malware:Win32/km_24ada3.None
K7GW Riskware ( 00584baa1 )
Cybereason malicious.a41714
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Kryptik.HWJL
APEX Malicious
Avast Win32:DropperX-gen [Drp]
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan.Win32.Agent.gen
BitDefender Gen:Variant.Zusy.543359
NANO-Antivirus Clean
ViRobot Trojan.Win.Z.Zusy.454656.H
MicroWorld-eScan Gen:Variant.Zusy.543359
Tencent Trojan.Win32.Obfuscated.gen
TACHYON Trojan/W32.Agent.454656.WE
Sophos Troj/Krypt-AEE
F-Secure Trojan.TR/Crypt.Agent.ziopo
DrWeb Trojan.MulDrop27.45963
VIPRE Gen:Variant.Zusy.543359
TrendMicro TROJ_GEN.R002C0DFG24
McAfeeD Real Protect-LS!39D865AA4171
Trapmine malicious.high.ml.score
FireEye Generic.mg.39d865aa4171442b
Emsisoft Gen:Variant.Zusy.543359 (B)
SentinelOne Static AI - Malicious PE
GData Gen:Variant.Zusy.543359
Jiangmin Clean
Webroot Clean
Varist W32/Kryptik.LPW.gen!Eldorado
Avira TR/Crypt.Agent.ziopo
Antiy-AVL Trojan/Win32.Kryptik.hwle
Kingsoft malware.kb.a.1000
Gridinsoft Ransom.Win32.STOP.tr!n
Xcitium Clean
Arcabit Trojan.Zusy.D84A7F
SUPERAntiSpyware Trojan.Agent/Gen-Zenpak
ZoneAlarm HEUR:Trojan.Win32.Agent.gen
Microsoft Trojan:Win32/Glupteba.AMMA!MTB
Google Detected
AhnLab-V3 Malware/Win.AGEN.R635993
Acronis suspicious
McAfee RDN/Generic.dx
MAX malware (ai score=84)
VBA32 Clean
Malwarebytes Trojan.MalPack.GS
Panda Trj/GdSda.A
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002C0DFG24
Rising Trojan.SmokeLoader!1.F600 (CLASSIC)
Yandex Clean
Ikarus Win32.Outbreak
MaxSecure Trojan.Malware.300983.susgen
Fortinet W32/Conwise.RCE!tr
BitDefenderTheta Gen:NN.ZexaF.36806.Bq0@aO2fqdgi
AVG Win32:DropperX-gen [Drp]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_100% (W)
alibabacloud Trojan:Win/Glupteba.AZOO3DGW
No IRMA results available.