Static | ZeroBOX

PE Compile Time

2014-07-18 14:48:33

PE Imphash

3ad350f14c2e450686dbd3fbcbe807a6

PEiD Signatures

Armadillo v1.71

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00016456 0x00017000 6.37753498836
.rdata 0x00018000 0x0000222c 0x00003000 4.16011950818
.data 0x0001b000 0x009268e5 0x00015000 6.67683714368

Imports

Library KERNEL32.dll:
0x418038 GetCurrentThread
0x41803c SetPriorityClass
0x418040 GetCurrentProcess
0x418044 lstrcatA
0x418048 lstrcpyA
0x418050 GetShortPathNameA
0x418054 GetModuleFileNameA
0x418058 CreateMutexA
0x41805c SetThreadPriority
0x418060 GetLastError
0x418064 SetFileAttributesA
0x418068 CopyFileA
0x41806c GetModuleHandleA
0x418070 GetTickCount
0x418074 LCMapStringW
0x418078 LCMapStringA
0x418080 CompareStringW
0x418084 ResumeThread
0x418088 GetSystemDirectoryA
0x41808c CreateProcessA
0x418090 OpenProcess
0x418094 WaitForSingleObject
0x418098 GetSystemInfo
0x41809c LoadLibraryA
0x4180a0 GetProcAddress
0x4180a4 GlobalMemoryStatus
0x4180a8 CreateThread
0x4180ac CloseHandle
0x4180b0 ExitThread
0x4180b4 lstrlenA
0x4180b8 Sleep
0x4180bc CompareStringA
0x4180c0 GetFileAttributesA
0x4180c8 GetOEMCP
0x4180cc GetACP
0x4180d0 GetCPInfo
0x4180d4 FlushFileBuffers
0x4180d8 IsBadCodePtr
0x4180dc IsBadReadPtr
0x4180e4 GetStringTypeW
0x4180e8 GetStringTypeA
0x4180ec MultiByteToWideChar
0x4180f0 RaiseException
0x4180f4 SetFilePointer
0x4180f8 WriteFile
0x418104 WideCharToMultiByte
0x418114 IsBadWritePtr
0x41811c GetSystemTime
0x418120 GetLocalTime
0x418124 RtlUnwind
0x418128 ExitProcess
0x41812c TerminateProcess
0x418130 DuplicateHandle
0x418134 HeapFree
0x418138 HeapAlloc
0x41813c GetStartupInfoA
0x418140 GetCommandLineA
0x418144 GetVersion
0x418148 SetHandleCount
0x41814c GetStdHandle
0x418150 GetFileType
0x418154 SetStdHandle
0x418158 CreatePipe
0x41815c GetExitCodeProcess
0x418160 HeapReAlloc
0x418164 HeapSize
0x418168 GetVersionExA
0x41816c HeapDestroy
0x418170 HeapCreate
0x418174 VirtualFree
0x418178 VirtualAlloc
Library USER32.dll:
0x418180 wsprintfA
Library comdlg32.dll:
0x4181dc GetFileTitleA
Library ADVAPI32.dll:
0x418000 CreateServiceA
0x418004 OpenServiceA
0x418008 StartServiceA
0x41800c RegSetValueExA
0x418010 CloseServiceHandle
0x41801c SetServiceStatus
0x418020 RegOpenKeyExA
0x418024 RegOpenKeyA
0x418028 RegQueryValueExA
0x41802c RegCloseKey
0x418030 OpenSCManagerA
Library WS2_32.dll:
0x418188 WSAGetLastError
0x41818c gethostname
0x418190 select
0x418194 __WSAFDIsSet
0x418198 recv
0x41819c WSAIoctl
0x4181a0 connect
0x4181a4 send
0x4181a8 socket
0x4181ac WSAStartup
0x4181b0 inet_ntoa
0x4181b4 setsockopt
0x4181b8 sendto
0x4181bc closesocket
0x4181c0 WSACleanup
0x4181c4 ntohl
0x4181c8 htons
0x4181cc inet_addr
0x4181d0 gethostbyname
0x4181d4 WSASocketA
Library iphlpapi.dll:
0x4181e4 GetIfTable

!This program cannot be run in DOS mode.
`.rdata
@.data
@SVWh
@SVW_^[
t.;t$$t(
VC20XC00U
QQSVWd
uRFGHt
HHtpHHtl
sO;>|C;~
DSUVWh
8t9UW
SS@SSPVSS
t#SSUP
t$$VSS
_^][YY
QSUVW3
>:uNFV
>:u#FV
t/WWUPj
^}%95L
HHtYHHtF
QQSVW3
"WWSh$
+ttHHtd
0123456789abcdefghijklmnopqrstuvwxyz-
%%%c%c%%%c%c
HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*
Accept-Language: zh-cn
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
Connection: Keep-Alive
Pragma: no-cache
Connection: Keep-Alive
Host:
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
Accept-Language: zh-CN
Accept: text/html, application/xhtml+xml, */*
%d.%d.%d.%d
setsockopt error: %s
HARDWARE\DESCRIPTION\System\CentralProcessor\0
@INFO:0.%d%%|%s
0.0%d Mbps
INFO:%d%%|%s Mbps
VERSONEX:%s|%d|%d MHz|%dMB|%dMB|%s
Hacker
GlobalMemoryStatusEx
kernel32.dll
Windows NT
Windows 7
Windows Server 2008
Windows Vista
Windows Server 2003
Windows XP
Windows Server 2000
ProductName
SOFTWARE\Microsoft\Windows NT\CurrentVersion
Yow! Bad host lookup.
Error %d when getting local host name.
vmtoolsd.exe
> nul
/c del
COMSPEC
SYSTEM\CurrentControlSet\Services\
Description
Antdll
NtQuerySystemInformation
@cmd.exe
command.com
`h````
ppxxxx
(null)
Illegal byte sequence
Directory not empty
Function not implemented
No locks available
Filename too long
Resource deadlock avoided
Result too large
Domain error
Broken pipe
Too many links
Read-only file system
Invalid seek
No space left on device
File too large
Inappropriate I/O control operation
Too many open files
Too many open files in system
Invalid argument
Is a directory
Not a directory
No such device
Improper link
File exists
Resource device
Unknown error
Bad address
Permission denied
Not enough space
Resource temporarily unavailable
No child processes
Bad file descriptor
Exec format error
Arg list too long
No such device or address
Input/output error
Interrupted function call
No such process
No such file or directory
Operation not permitted
No error
GAIsProcessorFeaturePresent
KERNEL32
__GLOBAL_HEAP_SELECTED
__MSVCRT_HEAP_SELECT
runtime error
TLOSS error
SING error
DOMAIN error
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
abnormal program termination
- not enough space for environment
- not enough space for arguments
- floating point not loaded
Microsoft Visual C++ Runtime Library
Runtime Error!
Program:
<program name unknown>
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
GetLastActivePopup
GetActiveWindow
MessageBoxA
user32.dll
1#QNAN
1#SNAN
string too long
invalid string position
Unknown exception
ExitThread
CloseHandle
CreateThread
GlobalMemoryStatus
GetProcAddress
LoadLibraryA
GetSystemInfo
WaitForSingleObject
OpenProcess
CreateProcessA
GetSystemDirectoryA
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
CreateMutexA
lstrlenA
GetLastError
SetFileAttributesA
CopyFileA
GetModuleHandleA
GetTickCount
KERNEL32.dll
wsprintfA
USER32.dll
GetFileTitleA
comdlg32.dll
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
RegSetValueExA
StartServiceA
OpenServiceA
CreateServiceA
OpenSCManagerA
ADVAPI32.dll
WSASocketA
WSAIoctl
WS2_32.dll
GetIfTable
iphlpapi.dll
GetTimeZoneInformation
GetSystemTime
GetLocalTime
RtlUnwind
ExitProcess
TerminateProcess
DuplicateHandle
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
SetHandleCount
GetStdHandle
GetFileType
SetStdHandle
CreatePipe
GetExitCodeProcess
HeapReAlloc
HeapSize
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
SetConsoleCtrlHandler
GetFileAttributesA
CompareStringA
CompareStringW
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
RaiseException
192.168.1.244
7:ac[:atB:a
C=;&n\;::
;hN@;il
p;i+4;,
;xXb;x
<;xb>;
< j}<
< fV<
!< k9<
V<+&3<1
< hz;,w
X=:S[=
&=?6d=8
,=BZ>=C
=K+_=L
=Yc5=NXR<
=[S==[
=Yc6=S
=Yc<=Yc,=[
yac+yw
"yt?Ky6E
{cJ {l
|)F|)F
|)Fw|)B
|)F;|)G
|)Fy|)D]|)Ge|)G/|)F
|)D5|)D
|)D/|)DB|)D
|)D9|)B
|)E{|)B
|)E;|)F
|)D[|)B
|)DW|)D
|)G>|)
|)G |)G=|)B
|)E!|)F
|)Ee|)D
|)GB|#.
|)Jx|)G|
|)JY|)E
|)UM|)J
|)JG|)J
|)Dm|)J
|)EF|)J7|)J'|)G
F|)J(|)JT|)LC|)
L|)Do|)J@|)
|)LW|)D4|)L
|)F#|)FK|)
*|)L4|)X
|)Jd|)T
|)L.|)E
|)EQ|)V
|)J-|)V
|)Ja|)
|)LH|)UP|)K
"|)Jt|)JA|)J||)K
|)Jk|)
|)E$|)Ji|)J
|)JI|)M
|)b1|)M
|)Tt|)J#|)K
|)Js|)B1|)
|)J0|)J"|)
|)Jc|)S
|)B)|)J1|)V
|)JC|)
O|)b9|)U
|)OY|)Oi|)b,|)bI|)Jq|)
|)Oh|)_
|)L'|)S
|)K/|)Y
|)B9|)
|)`R|)^[|)V
)|)Jb|)K
|)Ik|)b
|)Fx|)L
|)B5|)P
|)@9|)F`|)_o|)I
|)CV|)LF|)_L|)Oc|)C
|)b3|)b|)`U|)@{|)__|)K
|)^_|)D
|)Jf|)F
:|)M'|)C
|)M?|)
|)M.|)F
|)LA|)IG|)V
|)V=|)Iq|Jd
|)@a|)
|)G.|)`
|)G0|)Gn|)F
|)J!|)G
|)FV|)D
|)E"|)IQ|)I
|)CP|)CI|)D
|)OZ|)@
|)DF|)P
|)HM|)OT|)D
C|)Oe|)@
|)CS|)B
|)D%|)@
|)B|)
|)D:|)N
|)L+|)D
|)Ek|)B
|)E*|)f
|)@m|)B
|)FN|)D
|)NF|)M(|)f
|)E6|)Cp|)dI|)F
|)F.|)F
|)Dz|)D
|)E~|)F
|)TC|)F
|)D1|)L!|)
?|)@u|)Cg|)D
|)CY|)F
|)D=|)P
|)J%|)P
|)dH|)Jl|)3
|)HS|)B
|)EC|)
5|)NG|)E
|)IF|)H/|)P
|)AC|)CM|)T |)Jh|)LI|)E
|)PH|)3
6|)@7|)O%|)J[|)@
|)Os|)O
|)U]|)E>|)
|)CJ|)D
|)O&|)D||)A
|)J/|)D3|)J,|)L(|)
|)L/|)AS|)@
|)X'|)
|)JM|)V
|)e#|)G
|)Lo|)JS|)@
|)L9|)G
|)AD|)Ev|)E+|)A
|)L)|)L
|)Tx|)@
|)L*|)Tj|)
|)J?|)@
|)NS|)C_|)I
:|)E,|)
|)LM|)LN|)
M|)L:|)Y
|)B'|)
|)O"|)
8|)Cc|)
K|)LB|)Tr|)L"|)A
|)UN|)L
|)J$|)C
|)IK|)X
|)UJ|)Vl|)AU|)
|)O|)I
|)M|)J
|)LZ|)X||)H;|)C
|)JL|)X}|)T
|)Lt|)_
|)LE|)B
|)X=|)S
|)R-|)C#|)X)|)_
|)LJ|)c&|)T
|)Ti|)Ut|)K
|)V#|)V
3|)^Y|)M4|)
|)J>|)
|)Ug|)J`|)OU|)H+|)C
|)LT|)
+|)VR|)
|)BF|)OC|)J
|)^Z|)S
|)c#|)b#|)_
|)C|)
|)_y|)W
|)_f|)C
|)VG|)V
|)UH|)b%|)C'|)X
|)B!|)S
|)Om|)WO|)Rm|)@|)Y
|)Eu|)I
|)W]|)L
|)WF|)K
|)It|)@A|)M
|)CD|)R/|)R
|)^X|)S
|)AI|)VE|)K
|)IE|)
|)V$|)I
|)W[|)Rq|)
|)Ct|)G
|)`N|)I
%|)cB|)
|)Rs|)
|)MD|)B
|)DN|)H
|)`Q|)R;|)Q
|)JH|)R
|)Od|)
|)V;|)
|)RC|)
|)HD|)F<|)R%|)PB|)f
|)dW|)C
|)CU|)EJ|)Q
|)T[|)S
|)H)|)R+|)
|)H'|)M$|)J |)I
|)@}|)f
|)HL|)C
|)Ck|)ID|)H
|)H"|)@Q|)OE|)
|)ND|)W
|)QJ|)Ob|)
|)EZ|)Cl|)P
|)a#|)
O|)RS|)W
|)J*|)B
|)H5|)C^|)R |)O
|)Dp|)I
|)dR|)J
5|)Jz|)B4|)P
|)A`|)D
|)Ac|)E
|)PP|)PO|)
/|)O\|)A
|)@J|)D0|)PQ|)d
|)XN|)PM|)C
|)H|)
|)H!|)J
|)Ex|)H&|)dF|)P
|)T*|)C
|)@(|)P
|)HH|)C
|)@z|)C
|)C}|)
|)40|)L<|)H
'|)WQ|)J&|)G
|)IL|)F
|)IM|)V
|)SH|)J
|)SC|)d
'|)@I|)
|)IX|)A
|)AT|)Ro|)H
|)IV|)E
|)HQ|)D
|)A^|)I^|)D
|)PU|)W
|)D&|)
|)U~|)J
|)R5|)HI|)@t|)O
|)RW|)c
|)R7|)O |)
|)J~|)X0|)H
|)HN|)
|)T:|)JR|)
|)R?|)
|)Rp|)O
|)c%|)a
|)c'|)C
|)WT|)I
P|)X\|)C$|)W
|)QI|)
9|)_z|)Ru|)
|)JD|)VF|)AH|)
|)On|)cD|)Ri|)WA|)e
|)cC|)A
|)RB|)R=|)N
|)RO|)VJ|)A
|)Rh|)
|)R3|)I
|)QD|)S
|)RK|)
|)RA|)S
|)dT|)QL|)RR|)
I|)R]|)H
|)IN|)A
|)cb|)WD|)QP|)Rk|)CT|)RV|)Q
|)RX|)I
|)aB|)R0|)
|)@~|)B$|)J
|)QS|)
|)QQ|)A
|)dB|)f
2|)RL|)Rl|)
|)ST|)I
|)R<|)H4|)I
%|)C`|)PF|)S
|)g"|)J
|)H |)J
|)SM|)SE|)
|)R\|)H
|)SR|)A
|)c$|)R8|)Q
|)@>|)
|)SJ|)R4|)S
C|)R:|)H
|)RN|)RD|)S
|)R&|)I
|)RZ|)A
|)ad|)Rd|)R^|)R2|)N
|)R~|)S
|)SN|)
`0|n'y|ms
|n(E|n'
|n(A|n'
|n'=|)
|n(%|n
|j(#|CA
=}M~5}
}bL&}bL%}]3
}bL'}bL$}
}C@.}g
AD#>'D
D"f-D#
2D$'LD$
D$raD$ihD
QD$1AD$4jD
D%UpD$
D&|uD&
D&_1D'B
D'={D'
D'C4D'
D){xD*N
D*^3D+
D*P3D*
D,B~D*
D+mQD+5RD,]
D+i{D,
D,AmD,~!D,'"D,
D-!2D-
ID. lD.
1D-nBD.
`D0:=D/
D1%RD1$/D1e~D1
D2ED1+
D3>$D2z3D1
%D3g6D33
-D4;bD3
eD5LQD5cXD3
D6n]D3
UD7SdD5
fD7YoD6
D@3+D@3)D8
D8H>D@1{D8
_D@3*D8
D462D@
D8VOD9%
D94@D99
5D9~1D@5
RD@2YD:G
D@1xD@
D@1wD9
D;j~D@
D8XgD@
D7BXD@
D@02D@03D:.
D8}mD@3-D:Q
D@3,D<
D;j~D@2XD;z
D<4"D;
D@1|D?
D;U(D<
DAG.D@1
D;VkD:
DAETD<=
(DA3dD?D=D>
D@( D=]cD>b
D>OWD?
DA3oDA
ZDAY-DA
D?;QDA
DA/:DA
DA3eDA
D=ZfDA
D@()DA
&D@lNDA
DD {DA
DDb>DA
DDb6DA
DDe#DA
DDb#DA
DDb*DA
DDb+DA
DDb$DA
#DDb7DDdLDA
DDeFDDb"DA
DDb,DDe%DDb.DDe&DDb%DA
DDe"DDb;DDb
DDb:DA
&DDa,DA
DDcHDA
DDb8DDb<DA
DDb5DA
RDDb9DA
DDb3DDb(DB
DDb4DDb'DDb2DDcrDA
DDb&DA
SDDb)DDb
VDC(BDA
DDeEDDeSDDeDDA
DCE/DA
DCD:DCE
DCE4DCD
DCD9DCD
DCD.DCE
DCE2DCD>DCD
DCE1DCi
DCE,DA
DCE3DCEZDCN
DCL&DCE
DCM)DCM1DC
DCE+DC6pDCE
DCLJDC6rDCM>DCL4DC%DDCH&DCL'DC6qDCL<DCH1DCH,DCH%DCM
fDC$6DCM
~DDa1DA
~DCE:DA
.DCHDCL
{DCMmDCL
TD@m<DA
3DC%GDA
KDC%rDA
DC<5DA
[DDd>DA
bDCD$DA
DCOJDBn+DA
DC#"DDZ
DDZ7DDZ
DDZXDDZ4DDZ
DDZ2DDZ,DDZZDD'QDB\
DD\bDCr
D;j~DD
DE2pDD
DC&$DD:DD
DD]DD
DFW7DFWgDFW
DFWSDFW
DFW!DFW<DD
DFWpDFW:DD
DFWVDFWUDFWQDFW_DD
DFWbDFW
DFW(DD
DFWsDD
DFWvDFW
DFWZDFWoDFW
DFWfDFW3DFW
DFWqDFWkDFW
DFW1DFW
DFWxDFW
DFWjDE
DFW,DD
{DFSPDD
DFWcDD
DFWODFW
DF^7DFWmDF^*DFW
DFW\DF^
DD^DD
DD_DD
XDF^lDD
oDFW?DF^
DF^)DFW
DFWhDFW
DF^/DF^
DFWzDF^uDD
DF^^DF^
ZDF^JDD
DF^MDF^
DF^=DC
DF^-DD
DF^KDF^,DD
DF^YDF^2DF^
DF^LDF^nDF^
DF^FDBg
DF^mDA
DBb8DD
DF^SDF
(DBh5DD
DBkNDC
DF:%DC
DF:-DC
DBj[DD
DG!.DG!bDG
DG#XDG
0DCs'DG!}DG
DG!zDG
DG!~DG
,DG#MDG
/DG#rDG
DG#WDG
-DG#YDG!5DG
DG#ODG#RDG
DG#}DG#yDG
DG#|DG
wDG!+DG
DG!-DG!
DG!,DG
DG&*DG'
DG#PDG
DG'jDG
vDG&,DG
DG'mDG
DG#FDG&+DG
DG'lDG
DG#fDG
DG#pDG
DG#lDG
DG#QDG
.DG3lDG0aDG1
DG06DG9
DG3EDG3
DG3DDF;
DG:6DG3>DG:BDG:3DG
DG3FDG3mDF
mDG:jDC1
DG)TDG9
DG:5DG:
DG*YDG9#DG9"DD
DG:kDG
DG93DG:"DG:&DG<
DG:1DG=
DG:nDG:mDG;
DG:2DG
DG:lDG:
DG:EDD
$DG:FDG:
!DG=XDG=
)DG:4DGk1DGm&DG=
DG:iDG:
DG:#DG:$DG9
DG:%DG:!DG:
DG92DG=YDG0
DG:DDG:
DG,iDG
DG(yDG
DG=\DG;
DG1%DG;
9DGa"DE
DGa!DE
DF^!DE
DKrwDE
DKs~DE
MDG?hDE
aDJb1DE
DG?dDE
DG-*DE
DG!*DE
DG?fDH
DJDQDP>
DG*ED2n
DMdsDE
EDG-*DHLKDPaEDPl
DPrDDP
DG?kDG?iDG7
DQz2DQ
+DRd,DQ
DWUjDS
HDTb:DZ7eDT
D`3"DeuKDW@
)DYYaD]
DbsvDk
.DZ%|Dl
DluCDj%=Dh
DlNQDM~
$Dl}]D^
D[]qDC
DG-*DaJ*Da
DZ7fD}
Dkb5DWM
DyiaDb
DcF7Db
DcMTDz
D`7Db
Dq<cDvC Dc
DcKpDo
DpT=DpT
D`8Dd
WuDq<dDxJ
Dd'QDe:ZDe7hDvB
DcMTD`
^DqzGDk
DcOeDnC
Dv#:Dj
DcszDk
6DtlzDc
<DsAFDQ
dDc:lDt"
DgGdDq
Dt"#Dp
DpmYDe>
DcudDq
UDsE.Dx
%DpTKDp
Ds/ZDC1
Du}4Dt }Dt ~Dc
Dt)SDe,
D~01DcMTDb
Dr\-Dk
Dp5~DuvQDs
Du`yDv
DvtjD]
D~4ADe9
Dt"_Dx
YDi9|Dz
8Di8^D{2zDp
DtBDe9
Ds}RDw7lD2
\Dt>NDo{
2Dt>MDeQEDwX(Dvu
Du|uDb
>Do{eDup
Du|vDt'
Dvw+Dv
Du|rDvv
uqDw`"Ds
Dw`'Ds|zD
Microsoft Software t4d7
Thank you for use t4d7
.?AVexception@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
C:\Documents and Settings\Administrator\
\winServer\Server\Release\taskclient.pdb
(null)
((((( H
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Clean
tehtris Clean
ClamAV Win.Trojan.Zard-9880336-0
CMC Clean
CAT-QuickHeal Trojan.ServStart.A
Skyhigh GenericRXAE-XG!EAEB33CC12FD
ALYac Clean
Cylance Unsafe
Zillya Backdoor.PePatch.Win32.44306
Sangfor Clean
K7AntiVirus Trojan ( 00592b3f1 )
Alibaba Clean
K7GW Trojan ( 00592b3f1 )
Cybereason malicious.c12fd7
huorong Trojan/ServStart.f
Baidu Win32.Trojan.ServStart.aj
VirIT Trojan.Win32.Generic.WYR
Paloalto Clean
Symantec SMG.Heur!gen
Elastic malicious (high confidence)
ESET-NOD32 Win32/ServStart.IO
APEX Malicious
Avast Win32:MrBlack-D [Trj]
Cynet Malicious (score: 100)
Kaspersky Trojan.Win32.StartServ.xer
BitDefender Gen:Heur.Mint.Zard.30
NANO-Antivirus Trojan.Win32.Heuristic131.dcnfpc
ViRobot Clean
MicroWorld-eScan Gen:Heur.Mint.Zard.30
Tencent Malware.Win32.Gencirc.10b0c663
TACHYON Clean
Sophos ML/PE-A
F-Secure Backdoor.BDS/Backdoor.Gen2
DrWeb Trojan.MulDrop11.50250
VIPRE Gen:Heur.Mint.Zard.30
TrendMicro TROJ_SERVSTART_GJ1000AC.UVPN
McAfeeD Real Protect-LS!EAEB33CC12FD
Trapmine malicious.high.ml.score
FireEye Generic.mg.eaeb33cc12fd7153
Emsisoft Gen:Heur.Mint.Zard.30 (B)
Ikarus Trojan.Win32.ServStart
GData Gen:Heur.Mint.Zard.30
Jiangmin Trojan/Generic.bamdh
Webroot Trojan.Gen
Varist W32/Trojan.NEMT-1463
Avira BDS/Backdoor.Gen2
Antiy-AVL Trojan/Win32.AGeneric
Kingsoft malware.kb.a.1000
Gridinsoft Clean
Xcitium TrojWare.Win32.ServStart.CA@6q1016
Arcabit Trojan.Mint.Zard.30
SUPERAntiSpyware Trojan.Agent/Gen-Jaik
ZoneAlarm Trojan.Win32.StartServ.xer
Microsoft Trojan:Win32/ServStart!pz
Google Detected
AhnLab-V3 Backdoor/Win32.Zegost.R117606
Acronis Clean
McAfee GenericRXAE-XG!EAEB33CC12FD
MAX malware (ai score=84)
VBA32 Trojan.StartServ
Malwarebytes Generic.Trojan.ServStart.DDS
Panda Trj/Genetic.gen
Zoner Clean
TrendMicro-HouseCall TROJ_SERVSTART_GJ1000AC.UVPN
Rising Backdoor.Farfli!1.BEF4 (CLASSIC)
Yandex Backdoor.Agent!W+qsqWX+TeU
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.9609723.susgen
Fortinet W32/StartServ.VIK!tr
BitDefenderTheta AI:Packer.4ABEE65B1E
AVG Win32:MrBlack-D [Trj]
DeepInstinct MALICIOUS
CrowdStrike win/malicious_confidence_90% (W)
alibabacloud DDoS:Win/FloodAttack.52b5f023
No IRMA results available.