Static | ZeroBOX

PE Compile Time

2025-02-03 18:10:45

PDB Path

C:\Users\Administrator\Desktop\vdr1\Release\vdr1.pdb

PE Imphash

88967e8dc94c2149dd89b55f39e46fa6

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x00017dd8 0x00017e00 6.45743685564
.rdata 0x00019000 0x00003454 0x00003600 5.69611629593
.data 0x0001d000 0x00001fe8 0x00001600 1.647997133
.00cfg 0x0001f000 0x00000004 0x00000200 0.0611628522412
.rsrc 0x00020000 0x000001a8 0x00000200 4.16623958895
.reloc 0x00021000 0x00000f1c 0x00001000 6.56892662627

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00020060 0x00000143 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document, ASCII text

Imports

Library msvcrt.dll:
0x41b4a0 ??2@YAPAXI@Z
0x41b4a4 ??3@YAXPAX@Z
0x41b4a8 ??_U@YAPAXI@Z
0x41b4ac ??_V@YAXPAX@Z
0x41b4b0 _itoa_s
0x41b4b4 _splitpath
0x41b4b8 atexit
0x41b4bc free
0x41b4c0 isupper
0x41b4c4 malloc
0x41b4c8 memchr
0x41b4cc memcmp
0x41b4d0 memcpy
0x41b4d4 memmove
0x41b4d8 memset
0x41b4dc rand
0x41b4e0 srand
0x41b4e4 strchr
0x41b4e8 strcpy
0x41b4ec strcpy_s
0x41b4f0 strlen
0x41b4f4 strncpy
0x41b4f8 strstr
0x41b4fc strtok_s
Library KERNEL32.dll:
0x41b504 CloseHandle
0x41b508 CopyFileA
0x41b50c CreateDirectoryA
0x41b510 CreateEventA
0x41b514 CreateFileA
0x41b518 CreateProcessA
0x41b51c CreateThread
0x41b524 DeleteFileA
0x41b528 ExitProcess
0x41b534 FindClose
0x41b538 FindFirstFileA
0x41b53c FindNextFileA
0x41b540 GetComputerNameA
0x41b544 GetComputerNameW
0x41b548 GetCurrentProcess
0x41b54c GetCurrentProcessId
0x41b550 GetDriveTypeA
0x41b558 GetFileAttributesA
0x41b560 GetFileSize
0x41b564 GetFileSizeEx
0x41b568 GetFileType
0x41b56c GetFullPathNameA
0x41b570 GetLastError
0x41b574 GetLocalTime
0x41b578 GetLocaleInfoA
0x41b584 GetModuleFileNameA
0x41b588 GetProcAddress
0x41b58c GetProcessHeap
0x41b590 GetSystemInfo
0x41b594 GetSystemTime
0x41b598 GetTempPathW
0x41b59c GetTickCount
0x41b5b0 GlobalAlloc
0x41b5b4 GlobalFree
0x41b5b8 GlobalLock
0x41b5c0 GlobalSize
0x41b5c4 HeapAlloc
0x41b5c8 HeapFree
0x41b5d0 LoadLibraryW
0x41b5d4 LocalAlloc
0x41b5d8 LocalFree
0x41b5dc OpenEventA
0x41b5e0 OpenProcess
0x41b5e4 Process32First
0x41b5e8 Process32Next
0x41b5ec RaiseException
0x41b5f0 ReadFile
0x41b5f4 ReadProcessMemory
0x41b5f8 SetFilePointer
0x41b5fc Sleep
0x41b604 TerminateProcess
0x41b608 VirtualQueryEx
0x41b60c WaitForSingleObject
0x41b610 WriteFile
0x41b614 lstrcatA
0x41b618 lstrcpyA
0x41b61c lstrlenA
0x41b620 lstrlenW
Library ADVAPI32.dll:
0x41b62c GetUserNameA
0x41b630 GetUserNameW
0x41b634 RegCloseKey
0x41b638 RegEnumKeyExA
0x41b63c RegGetValueA
0x41b640 RegOpenKeyExA
0x41b644 RegQueryValueExA
Library api-ms-win-crt-runtime-l1-1-0.dll:
Library USER32.dll:
0x41b654 CharToOemA
0x41b658 CloseDesktop
0x41b65c CloseWindow
0x41b660 CreateDesktopA
0x41b664 EnumDisplayDevicesA
0x41b668 GetDC
0x41b66c GetDesktopWindow
0x41b674 GetWindowRect
0x41b678 MessageBoxA
0x41b67c OpenDesktopA
0x41b680 ReleaseDC
0x41b684 wsprintfA
0x41b688 wsprintfW
Library api-ms-win-crt-stdio-l1-1-0.dll:
Library GDI32.dll:
0x41b69c BitBlt
0x41b6a4 CreateCompatibleDC
0x41b6a8 CreateDCA
0x41b6ac DeleteObject
0x41b6b0 GetDeviceCaps
0x41b6b4 SelectObject
Library SHELL32.dll:
0x41b6bc SHFileOperationA
0x41b6c0 SHGetFolderPathA
0x41b6c4 ShellExecuteExA
0x41b6c8 ShellExecuteExW
Library ole32.dll:
Library WS2_32.dll:
0x41b6dc WSACleanup
0x41b6e0 WSAStartup
0x41b6e4 closesocket
0x41b6e8 connect
0x41b6ec freeaddrinfo
0x41b6f0 getaddrinfo
0x41b6f4 htons
0x41b6f8 recv
0x41b6fc send
0x41b700 socket
Library SHLWAPI.dll:
0x41b708 PathFileExistsA
0x41b70c PathMatchSpecA
0x41b710 None
0x41b714 None
0x41b718 StrStrA
Library CRYPT32.dll:
0x41b724 CryptUnprotectData
Library WININET.dll:
0x41b72c HttpOpenRequestA
0x41b730 HttpQueryInfoA
0x41b734 HttpSendRequestA
0x41b738 InternetCloseHandle
0x41b73c InternetConnectA
0x41b740 InternetCrackUrlA
0x41b744 InternetOpenA
0x41b748 InternetOpenUrlA
0x41b74c InternetReadFile
0x41b750 InternetSetOptionA
Library bcrypt.dll:
0x41b75c BCryptDecrypt
0x41b760 BCryptDestroyKey
0x41b76c BCryptSetProperty
Library dbghelp.dll:
0x41b774 SymCleanup
0x41b778 SymFromAddr
0x41b780 SymInitialize
0x41b784 SymMatchString
0x41b788 SymSetOptions

Exports

Ordinal Address Name
1 0x40f48a _UnhandledExceptionFilter@4
!This program cannot be run in DOS mode.$
.rdata
@.data
.00cfg
@.rsrc
@.reloc
QPQQhM
QPQQhM
QPQQhM
RQRRhM
QPQQhM
D$8QSP
D$ QSP
D$<QVP
D$TQVP
D$pQVP
|$pt71
t$,RPVV
L$,VWP
;L$0td9
t$4;t$(
?tw<?ts
t$`RQPVS
PVQQh1
PVWWhe
PQRSUWh
L$ f94
f;4$t"
|$4+t$
1;W(s+
~LQRPWS
;D$Pu0
1523bc97faf997afd75ddd4d6b51e05d
0123456789
ChromeBuildTools
DPAPI0123456789ABCDEF
<unknown>
Qkkbal
{"id":1,"method":"Storage.getCookies"}
Security
History
Work Dir: In memory
SOFTWARE\Microsoft\Cryptography
firefox
%08lX%04lX%lu
_key.txt
Soft\Steam\steam_tokens.txt
\Discord\tokens.txt
passwords.txt
information.txt
localhost
WebSocketClient
" & exit
GdipGetImageHeight
GdipGetImagePixelFormat
N0ZWFt
\Monero\wallet.keys
Azure\.aws
status
Wallets
_CreateProcess
GdipGetImageEncoders
Software\Martin Prikryl\WinSCP 2\Sessions
Plugins
/devtools
prefs.js
Local Extension Settings
Sync Extension Settings
cookies
Cookies
\BraveWallet\Preferences
key_datas
%s\%s\%s
PortNumber
CurrentBuildNumber
GdiplusStartup
GdipCreateHBITMAPFromBitmap
Opera Crypto
Unknown
GdiplusShutdown
_logins.json
invalid string position
Software\Martin Prikryl\WinSCP 2\Configuration
DisplayVersion
SOFTWARE\Microsoft\Windows NT\CurrentVersion
amcommunity.com
Telegram
Software\Valve\Steam
GdipSaveImageToStream
GdipLoadImageFromStream
\AppData\Roaming\FileZilla\recentservers.xml
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
approve_april
Network
profiles.ini
GdipGetImageWidth
wallet_path
SteamPath
screenshot.jpg
string too long
vector<T> too long
ProcessorNameString
loginusers.vdf
libraryfolders.vdf
config.vdf
DialogConfig.vdf
DialogConfigOverlay*.vdf
GdipGetImageEncodersSize
steam.exe
C:\Windows\system32\cmd.exe
C:\Windows\system32\rundll32.exe
formhistory.sqlite
cookies.sqlite
places.sqlite
Local State
Azure\.azure
SOFTWARE\monero-project\monero-core
chrome
file_name
DisplayName
HostName
ProductName
UserName
GdipSaveImageToFile
msal.cache
GdipDisposeImage
Azure\.IdentityService
UseMasterPassword
MachineGuid
task_id
build_id
Crash Detected
Disabled
%d/%d/%d %d:%d:%d
vdr1.pdb
\Local Storage\leveldb
_0.indexeddb.leveldb
_formhistory.db
_history.db
_cookies.db
_passwords.db
_webdata.db
_key4.db
\key4.db
file_data
Login Data
Web Data
chrome-extension_
[Processes]
[Software]
\storage\default\
\.aws\
errors\
\Telegram Desktop\
\Steam\
\config\
\.azure\
Stable\
\.IdentityService\
\discord\
/c timeout /t 10 & rd /s /q "C:\ProgramData\
" & rd /s /q "C:\ProgramData\
DISPLAY
Opera GX
EXCEPTION_INT_OVERFLOW
EXCEPTION_FLT_OVERFLOW
EXCEPTION_STACK_OVERFLOW
EXCEPTION_FLT_UNDERFLOW
EXCEPTION_BREAKPOINT
\Local Storage\leveldb\CURRENT
EXCEPTION_DATATYPE_MISALIGNMENT
EXCEPTION_FLT_INEXACT_RESULT
EXCEPTION_IN_PAGE_ERROR
dQw4w9WgXcQ
EXCEPTION_SINGLE_STEP
GdipCreateBitmapFromHBITMAP
EXCEPTION_INT_DIVIDE_BY_ZERO
EXCEPTION_FLT_DIVIDE_BY_ZERO
EXCEPTION_NONCONTINUABLE_EXCEPTION
UNKNOWN EXCEPTION
EXCEPTION_INVALID_DISPOSITION
EXCEPTION_PRIV_INSTRUCTION
EXCEPTION_ILLEGAL_INSTRUCTION
EXCEPTION_FLT_INVALID_OPERATION
EXCEPTION_ACCESS_VIOLATION
EXCEPTION_FLT_STACK_CHECK
EXCEPTION_FLT_DENORMAL_OPERAND
EXCEPTION_ARRAY_BOUNDS_EXCEEDED
IndexedDB
OCALAPPDATA
<Host>
<Port>
<User>
<Pass encoding="base64">
http://localhost:
"webSocketDebuggerUrl":
^userContextId=4294967295
65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73
ws://localhost:9223
.metadata-v2
comctl32
Windows 11
HTTP/1.1
HARDWARE\DESCRIPTION\System\CentralProcessor\0
abcdefghijklmnopqrstuvwxyz1234567890
ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
"ws://
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_.
Content-Type: multipart/form-data; boundary=----
------
moz-extension+++
F8806DD0C461824F*
D877F783D5D3EF8C*
A7FDF864FBC10B77*
A92DAA6EA6F891F2*
%s\*.*
*%DRIVE_REMOVABLE%*
*%DRIVE_FIXED%*
%RECENT%
%DOCUMENTS%
%PROGRAMFILES%
%DESKTOP%
%USERPROFILE%
%DRIVE_REMOVABLE%
%DRIVE_FIXED%
%LOCALAPPDATA%
%APPDATA%
%PROGRAMFILES_86%
--remote-debugging-port=9223 --profile-directory="
Content-Disposition: form-data; name="
"encrypted_key":"
/c timeout /t 10 & del /f /q "
Connection: Upgrade
Upgrade: websocket
Sec-WebSocket-Key:
HTTP/1.1
Host:
Windows:
Cores:
Keyboard Languages:
Threads:
Processor:
Display Resolution:
Function:
Version:
Login:
Path:
Install Date:
TimeZone:
Local Time:
Computer Name:
User Name:
Password:
VideoCard:
MachineID:
HWID:
GUID:
Crash (%d/%s) occurred at address: 0x%llx
File: %s
Line: %lu
File and line number: unknown
Function: unknown
Soft: FileZilla
[Hardware]
Soft: WinSCP
Sec-WebSocket-Version: 13
Unknown exception
bad allocation
oLLD PDB.
C:\Users\Administrator\Desktop\vdr1\Release\vdr1.pdb
vdr1.exe
_UnhandledExceptionFilter@4
??2@YAPAXI@Z
??3@YAXPAX@Z
??_U@YAPAXI@Z
??_V@YAXPAX@Z
_itoa_s
_splitpath
atexit
isupper
malloc
memchr
memcmp
memcpy
memmove
memset
strchr
strcpy
strcpy_s
strlen
strncpy
strstr
strtok_s
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
GetComputerNameA
GetComputerNameW
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetFileSizeEx
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDriveStringsA
GetLogicalProcessorInformationEx
GetModuleFileNameA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetVolumeInformationA
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatusEx
GlobalSize
HeapAlloc
HeapFree
K32GetModuleFileNameExA
LoadLibraryW
LocalAlloc
LocalFree
OpenEventA
OpenProcess
Process32First
Process32Next
RaiseException
ReadFile
ReadProcessMemory
SetFilePointer
SystemTimeToFileTime
TerminateProcess
VirtualQueryEx
WaitForSingleObject
WriteFile
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
GetCurrentHwProfileA
GetUserNameA
GetUserNameW
RegCloseKey
RegEnumKeyExA
RegGetValueA
RegOpenKeyExA
RegQueryValueExA
_invalid_parameter_noinfo_noreturn
CharToOemA
CloseDesktop
CloseWindow
CreateDesktopA
EnumDisplayDevicesA
GetDesktopWindow
GetKeyboardLayoutList
GetWindowRect
MessageBoxA
OpenDesktopA
ReleaseDC
wsprintfA
wsprintfW
__stdio_common_vsnprintf_s
__stdio_common_vsprintf
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCA
DeleteObject
GetDeviceCaps
SelectObject
SHFileOperationA
SHGetFolderPathA
ShellExecuteExA
ShellExecuteExW
CreateStreamOnHGlobal
GetHGlobalFromStream
freeaddrinfo
getaddrinfo
PathFileExistsA
PathMatchSpecA
StrStrA
CryptBinaryToStringA
CryptUnprotectData
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
BCryptCloseAlgorithmProvider
BCryptDecrypt
BCryptDestroyKey
BCryptGenerateSymmetricKey
BCryptOpenAlgorithmProvider
BCryptSetProperty
SymCleanup
SymFromAddr
SymGetLineFromAddr64
SymInitialize
SymMatchString
SymSetOptions
msvcrt.dll
KERNEL32.dll
ADVAPI32.dll
api-ms-win-crt-runtime-l1-1-0.dll
USER32.dll
api-ms-win-crt-stdio-l1-1-0.dll
GDI32.dll
SHELL32.dll
ole32.dll
WS2_32.dll
SHLWAPI.dll
CRYPT32.dll
WININET.dll
bcrypt.dll
dbghelp.dll
https://t.me/sok33tn
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://steamcommunity.com/profiles/76561199824159981
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://t.me/sok33tn
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://steamcommunity.com/profiles/76561199824159981
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://t.me/sok33tn
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://steamcommunity.com/profiles/76561199824159981
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
https://t.me/sok33tn
a110mgz
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
.?AVbad_alloc@std@@
.?AVexception@std@@
.?AVlogic_error@std@@
.?AVlength_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
<?xml version="1.0" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1"
manifestVersion="1.0">
<trustInfo>
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false'/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
0$0,030:0A0H0O0V0]0c0i0
1%141G1a1j1
1!212V2
606C6p6
464=4J4S4g4
6#7A7h7s7z7
=+=R=]=d=
4#4,4v4
666U6o6
9&979V9`9j9
:+:2:[:
:U;c;r;{;
=+=N=V=]=
=5>D>L>]>
? ?'?0?w?
131R1l1
575D5_5}5
:*:J:z:
3#3B3G4
7H8q8~8
9J9Q9X9i9w9
;+;?;k;
?+?V?l?
0S1Z1f1
5,5G5M5\5l5u5
6"6/6K6j6#7/767
:*:t:{:
:C;J;W;g;_<
2.3:3X3
9,9Y9i9
9a:}:B;s;
<!<1<A<
<O=[=|=
=D>c>Z?y?
1<2O2s2
5@5L5m5
9G9M9u9
91:7:b:u:
: ;C;T;p;
=O>X>w>K?W?{?
000<0L0n0y0
01+1;1_1i1p1}1
2/2N2Y2
55(5E5w5
646=6w6
7?7m7y7
7B8h8|8
:,:3:_:f:
:Y;b;i;p;
2 3'393E3i3
4q>*?1?]?
3 4g435k6p6u6z6
7%797H7S7c7m7
838=8e8t8~8
989B9f9p9
;#<1<?<V<a<t<~<
=!=2=A=O=V=l=z=
>.>;>Q>
?2?A?Q?\?m?w?
J0Q0[0x0
2-272F2]2
3G3Z3f3
494?4G4]4c4p4y4
6.6:6K6
7#7*7F7
8*848L8f8n8y8
9!9'9,999?9E9J9W9]9c9h9u9{9
:*:K:o:
;!;.;8;A;S;^;
<O=W=t=
>/?W?j?y?
1)181?1Z1
2@2E2]2x2
3#3*313G3
4"4+4>4
5 6X627
=O=V=x=
=u>|>D?
9&9C9|9
;<X<u<
3<3B3_3m3
6<7B7V7s7
1.2>2P2
4J5X5l5s5
6>6E6R6^6|6
9W9l9v:}:
;T;a;k;t;
<y=3>J>
354H4O4
:K:`:(;2;G;N;];n;
<+<x<~<
=)=4=W=t=z=
2"242F2X2j2|2
383[3b3m3t3}3
4C4K4y4
4/5C5*7
'3\3l3u3}3
:?:h:x:
;-;K;j;
="=(=.=4=:=@=F=L=R=X=^=d=j=p=v=|=
`3d3h3l3p3t3x3|3
:$;0;P;T;d;h;p;
< <0<4<D<H<L<P<X<p<
4$4,40444<4P4
545P5p5
@KA`A~A
CRYPT32dll
Gdiplus.dll
image/jpeg
ChainingMode
ChainingModeGCM
ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=
Antivirus Signature
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Vidar.i!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Mikey-10032681-0
CMC Clean
CAT-QuickHeal Trojan.Ghanarava.1738787732d55bc3
Skyhigh BehavesLike.Win32.Generic.ch
ALYac Gen:Variant.Doina.84985
Cylance Unsafe
Zillya Clean
CrowdStrike win/malicious_confidence_100% (W)
Alibaba TrojanPSW:Win32/Stealerc.85b699b5
K7GW Trojan ( 005a977a1 )
K7AntiVirus Trojan ( 005a977a1 )
huorong TrojanSpy/Stealer.ou
Baidu Clean
VirIT Trojan.Win32.GenusT.EOMV
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win32/Vidar.A
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky Trojan-PSW.Win32.Stealerc.pvq
BitDefender Gen:Variant.Lazy.649375
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Lazy.649375
Tencent Trojan-Banker.Win32.Bandra.16000514
Sophos Mal/Generic-S
F-Secure Trojan.TR/Redcap.wfunp
DrWeb Trojan.PWS.Vidar.69
VIPRE Gen:Variant.Doina.84985
TrendMicro Clean
McAfeeD Real Protect-LS!2049C2A57CF7
Trapmine suspicious.low.ml.score
CTX exe.trojan.vidar
Emsisoft Gen:Variant.Lazy.649375 (B)
Ikarus Trojan.Win32.Vidar
FireEye Generic.mg.2049c2a57cf70a27
Jiangmin Clean
Webroot Clean
Varist W32/ABTrojan.MZAJ-3400
Avira TR/Redcap.wfunp
Fortinet W32/Vidar.A!tr
Antiy-AVL Trojan/Win32.Sabsik
Kingsoft malware.kb.a.987
Gridinsoft Ransom.Win32.Sabsik.sa
Xcitium Clean
Arcabit Trojan.Doina.D14BF9
SUPERAntiSpyware Clean
Microsoft Clean
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5726392
Acronis Clean
McAfee Artemis!2049C2A57CF7
TACHYON Clean
VBA32 BScope.TrojanPSW.Vidar
Malwarebytes Spyware.Vidar
Panda Clean
Zoner Clean
TrendMicro-HouseCall Clean
Rising Stealer.Vidar!1.11757 (CLASSIC)
Yandex Clean
SentinelOne Static AI - Suspicious PE
MaxSecure Trojan.Malware.327652896.susgen
GData Gen:Variant.Lazy.649375
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Trojan[stealer]:Win/Vidar.A
No IRMA results available.