Static | ZeroBOX

PE Compile Time

2063-05-23 14:10:48

PE Imphash

f34d5f2d4577ed6d9ceec516c1f5a744

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00002000 0x0000c514 0x0000c600 6.18834667775
.rsrc 0x00010000 0x00000598 0x00000600 4.02848377911
.reloc 0x00012000 0x0000000c 0x00000200 0.0815394123432
.CSS 0x00014000 0x0003a600 0x0003a600 7.99921834156

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x000100a0 0x0000030c LANG_NEUTRAL SUBLANG_NEUTRAL data
RT_MANIFEST 0x000103ac 0x000001ea LANG_NEUTRAL SUBLANG_NEUTRAL XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

Library mscoree.dll:
0x402000 _CorExeMain

!This program cannot be run in DOS mode.
`.rsrc
@.reloc
F N/2'
Z };7%
o N"rV
Z?_d
_b`*
UUUU_
v4.0.30319
#Strings
Politic
CompilationRelaxationsAttribute
System.Runtime.CompilerServices
mscorlib
System
Boolean
RuntimeCompatibilityAttribute
DebuggableAttribute
System.Diagnostics
DebuggingModes
AssemblyTitleAttribute
System.Reflection
String
AssemblyDescriptionAttribute
AssemblyConfigurationAttribute
AssemblyCompanyAttribute
AssemblyProductAttribute
AssemblyCopyrightAttribute
AssemblyTrademarkAttribute
ComVisibleAttribute
System.Runtime.InteropServices
GuidAttribute
AssemblyFileVersionAttribute
TargetFrameworkAttribute
System.Runtime.Versioning
Politic.exe
<Module>
Publisher
Object
Program
VirtualProtect
MulticastDelegate
<PrivateImplementationDetails>
__StaticArrayInitTypeSize=11
ValueType
__StaticArrayInitTypeSize=36
__StaticArrayInitTypeSize=1355
<Module>{CAD83984-BFDF-4580-B849-1340A68F315F}
jm80jiH23UKpalUEPx
N7o7s4M3VW4USftvGE
E9o15wiDkoHfEyf1ZA
ppuPHebcoIQOPplcqD
eIDB6SgW6PqR3UmkYq
W1tio0PAGNaG4XBqAZo
tg3WYrP2jB0aEy8mAFQ
Attribute
sRYAFuP8YjW8xS1oIJi`1
YSQPX5Pa41RRbE5GeGu
RnoARZPsJjE3jEXdcmX
wKmF2DPU727oH6nUiXj
GaxQ14PBdUDYlbtxbBj
nLJoYmPCrTwx9mHVMHR
DJZ0t11IdsLsk6OFyw2
Rqln711P6NLnWEnfD1f
bF2xwE11Mp7qAhjeM2K
sM00Zh1t9aiHS6r6Q4f
DyePVB1VmsqM6dIMbgr
bKRyS617y3D5wAguZZ2
uxJeHI1qhJeAIb6Du1s
zhps7S1J0kiGqxaFDGO
U2Gk9v1RVSnONOQjsKc
qOk4Li1LtD7jcpHmh1s
kZOBwt1l9QiGcnt54i4
JcmspP10n8x0u2dRMCG
dbADEB1OoOhJvbhrrWr
<PrivateImplementationDetails>{E3EC5271-0AEB-4A8C-9940-0487B5E4BEBD}
__StaticArrayInitTypeSize=16
__StaticArrayInitTypeSize=18
__StaticArrayInitTypeSize=30
__StaticArrayInitTypeSize=32
__StaticArrayInitTypeSize=40
__StaticArrayInitTypeSize=64
__StaticArrayInitTypeSize=256
f8DD5B197BA5DF9D
m8DD5B197BA5DF9D
TimeSpan
DateTime
get_Now
op_Subtraction
get_Days
Exception
.cctor
GhQlsG318
UInt32
Marshal
GetDelegateForFunctionPointer
IntPtr
RuntimeHelpers
InitializeArray
RuntimeFieldHandle
dataKey
inputData
sectionContent
GetProcAddress
hModule
procName
kernel32.dll
GetModuleHandleA
moduleName
CallWindowProcW
lpPrevWndFunc
wParam
lParam
user32.dll
DeleteSentence
ioAdhugxya
cjhgay
Sygcydy
iuogfht
List`1
System.Collections.Generic
ToString
Encoding
System.Text
get_UTF8
Convert
FromBase64String
GetString
ToInt32
get_Item
ArgumentNullException
ArgumentException
UInt16
Application
System.Windows.Forms
get_ExecutablePath
System.IO
ReadAllBytes
BitConverter
ToUInt16
ToUInt32
Console
WriteLine
get_ASCII
TrimEnd
get_Chars
object
method
Invoke
lpAdress
dwSize
flNewProtect
lpflOldProtect
BeginInvoke
IAsyncResult
AsyncCallback
callback
EndInvoke
result
074E1DFFDDF2B0C3F55E8F7D1DC7FF42122304BC54707F839B1BFC631CC929CD
AD446C34F2704865A9E424BE5755BC8F9140414FD7E1456F1A4581F8C2D778A0
B86C921CDC504CE0C498E5F2E9548A01E33F930047FB5D22BF2DA2270E113ECD
mhR9Y2igd
Module
C4T1UYFj9N
typemdt
FieldInfo
MethodInfo
ResolveType
GetFields
MemberInfo
get_MetadataToken
ResolveMethod
MethodBase
Delegate
CreateDelegate
SetValue
GetTypeFromHandle
RuntimeTypeHandle
get_Assembly
Assembly
get_ManifestModule
PrxP7e3sFQ
N06Pqw2MUi
JkJPJxqeqp
SS6PRbB3e6
rQBPc0Uy1e
ie0PntmT0X
RSACryptoServiceProvider
System.Security.Cryptography
UPdPp2YfFD
Dictionary`2
thPPLV2R04
CZEPlgKGb9
fiXPHrTZBR
VgyPMvaAxt
RswP9grpL2
NqTPi5KTpg
ISwPbuQyUL
PdUPghw1r9
aymPQeWVJp
XppPfNt9a1
VJfP0Zvtnd
VLhPOe1Tof
P2DPhLIje7
uw7PTO2JGd
SortedList
System.Collections
mkKPFkyfpy
fUBPKo2mdg
TwZPDoaK6I
FoVPuje4Ok
yurPmqPxOv
BwFPG90xjP
yFrPWZBxdM
nv1P4HbaZI
EotPeSIHDH
rEwPkf1cME
CCGPSnqw1q
LDjPExXXwp
Hashtable
Qh1PXsqfZ5
og4P5uyJWb
IRSPZfKqAj
ul9PNtNMlb
mXgPd3OS8w
k5WP6D6lMn
T3hPofXsk7
set_UseMachineKeyStore
U7V1BKO3PY
wWfQ2gHoY
UInt64
GetBytes
yC1fpnZwL
Hw60rhVR9
iLWOU3hyh
ySuhhNVq3
vMuTHKeQp
GH0Fmnaxr
RlhKddNjQ
MCUDEeiC8
SymmetricAlgorithm
AesCryptoServiceProvider
System.Core
RijndaelManaged
Activator
CreateInstance
ObjectHandle
System.Runtime.Remoting
Unwrap
Q8LuG2IH3
MD5CryptoServiceProvider
CryptoConfig
get_AllowOnlyFipsAlgorithms
dKlmbG06Y
HashAlgorithm
ComputeHash
kxuGBBK6Z
Stream
W5WWFPUmT
TransformBlock
aTx4gdy4h
BinaryReader
get_BaseStream
set_Position
ReadUInt32
BSueaVNUD
ParameterInfo
DynamicMethod
System.Reflection.Emit
ILGenerator
Monitor
System.Threading
GetManifestResourceStream
get_Length
ReadBytes
MemoryStream
BindingFlags
get_Module
GetGenericArguments
get_IsStatic
get_FieldType
GetParameters
get_DeclaringType
get_IsValueType
MakeByRefType
get_ParameterType
get_ReturnType
GetILGenerator
OpCode
OpCodes
Ldarg_0
Ldarg_1
Ldarg_2
Ldarg_3
Ldarg_S
Tailcall
Callvirt
b0VkrBkDg
lH7SZ8Nqx
aeXEg5kHJ
ishXtwoDE
Debugger
get_IsAttached
x7P5i0p0a
ICryptoTransform
Reverse
GetName
AssemblyName
GetPublicKeyToken
set_Mode
CipherMode
CreateDecryptor
CryptoStream
CryptoStreamMode
FlushFinalBlock
get_EntryPoint
op_Equality
BjtZMJlCF
get_Unicode
FCZNErGCl
qHKd8I3JR
a3a6WOBA4
GetMethod
wlyoLdRpU
get_Location
Exists
get_CodeBase
Replace
GetType
GetProperty
PropertyInfo
GetValue
HP5AJVasU
LoadLibrary
kernel32
mbB2DiPJm
jh98MDHec
Concat
taryxQsTc
I4Da3YsJo
QMFwGZfSl
biAsFAJfD
HfgUS1eTL
xTuFFuFOZ
C8vBRdeR5
FileStream
FileMode
FileAccess
FileShare
IDisposable
Dispose
BChjMdK3b
U6mryaVCt
ToArray
YPUC4TRft
set_Key
set_IV
g4A36Yq3d
joEY49Nv9
LNTxkAW34
g7hvTlZgG
vcgzL4g4C
sBmPIj0Kdw
RwxPPdgXdO
fQGP1O0NEy
UjLPteQs6Z
GmmPVaxCD6
exq9rJPyHXRxHuRk1PT
ykGPwgHwAO
CreateEncryptor
ToBase64String
classthis
nativeEntry
nativeSizeOfCode
FSlPjkOnJC
zhTPr4cHxq
aTwPza5mq1
nW4lBacjpc
B2KP3xokPn
gaTPYwoJ5G
TYLPxbKoYW
ReadInt32
kO0PvR7N8F
lpName
lpType
lpAddress
flAllocationType
flProtect
hProcess
lpBaseAddress
buffer
lpNumberOfBytesWritten
dwDesiredAccess
bInheritHandle
dwProcessId
value__
WKA1cwQRyI
iYp1j7Qfdh
lAG1buM9Yi
KhE1g2gObD
h6H1QDyGUG
KSg1foq725
ukq1MS1KTi
DeflateStream
System.IO.Compression
CompressionMode
jRB19eVdSX
GetManifestResourceNames
AddRange
IEnumerable`1
r6K1iPAUHJ
ResolveEventArgs
get_Name
AppDomain
get_CurrentDomain
ResolveEventHandler
add_ResourceResolve
kLjw4iIsCLsZtxc4lksN0j
hQEQGE15fjft58x1FaD
EnEmaZ1ZY1xkUWV7jhJ
UfmE3q1NluupW9GKLIJ
CfuLwb1dgXkTFirB4bN
tV57IG16SfYLi8HOaQg
WRx6PG1oBXxBrS3u01Z
IjvYME1AakhNoXhXEDM
iqTaBL12q9cXgHPb79W
CopyTo
mD2WBM18kI1EF0yZJsp
memQJP1yXojRSFS1Fgy
tqjAgR1ajyp9AfkJ4KM
PRUpEf1wGNKHsqQKjYX
gcwqGo1sw7rn4pwDPgB
TG3E8I1E1OG4P4r6PgA
Gu5SmZ1Xg4rsHt0nabT
DOy1h9YEcI
IsLittleEndian
idX1TUKobN
LiV1FpfZt0
i701KaU8Po
LUk1Dtqt7k
tWR1uNYEvx
drh1mtIfRg
toM1GSPObS
iMU1WPi3w9
tnJ146DGBh
0E448EF5E5E60630BDDB19388CB6378436E3C65D03DD66DA7C6EBFF563BD857A
4BED3ADC52D4904075F6BBF279EC4ACEDE079533B95E229A29809542EA324A7B
62E6F13B53D67FDD780E20D89A6E8EE503B197AC16AC3F1D2571C147FDD324C9
7F535673D836D3D77A97DB03EB3D71EA780F44372F5AEBECEBEDD696AAEB8378
97E613E5A3A47DEC76B7E50D47644B35EA4322F00D594D80D2F1C1F3644F8A4A
C356AFF1A01C2B0DA472E584C8E3C8F875B9A24280435D42836A77B19F5A8C18
C61B1941CF756EB7551F7C661743802362728B785ADC22E860D269713DFB01A6
D5B7247C497788CF0031CEB06E3DF77A45FEF59F1E49633DC7159816D64759B5
CompilerGeneratedAttribute
UnmanagedFunctionPointerAttribute
CallingConvention
CharSet
FlagsAttribute
HSKlnbtCdXsODAJNj7.6Hp8lFVKwQIaI54YMP
N_GHXAO
*H*+,Z
S\QWKVIJP2`9ACZ<*.dVacG]
&B[!+Y
[2:K@Q$L=
LQ+Y=!
.(%K)0PWd'
?cX>5DI
(*Q62EZ?SEQ
]%RD\<
WrapNonExceptionThrows
Politic
Copyright
2025
$5c249bfa-2dd8-4f1a-9314-11e3fed61454
1.0.0.0
.NETFramework,Version=v4.7.2
FrameworkDisplayName
.NET Framework 4.7.2
eIDB6SgW6PqR3UmkYq.ppuPHebcoIQOPplcqD+tg3WYrP2jB0aEy8mAFQ+sRYAFuP8YjW8xS1oIJi`1[[System.Object, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]][]
SUsSystem.Runtime.InteropServices.CharSet, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
CharSet
R]]^|k
{7P[Rs}
JC_Yf3 3
=t?VZS
Lg0Tr_
o%2E`L
*#Cs9ve9
+q%FL`p9
DBRfhn M
Politic.pdb
_CorExeMain
mscoree.dll
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<assemblyIdentity version="1.0.0.0" name="MyApplication.app"/>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges xmlns="urn:schemas-microsoft-com:asm.v3">
<requestedExecutionLevel level="asInvoker" uiAccess="false"/>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
@Eb;'I
+{eW?
PH]BjfP
8R0/ ?_
"V}hjw
'cV'cb
#S32O!W
KWt;'uMa
u9`$~}N
^aA1NV
5(@p!
*} BGQ
;jQ2[Q
Mq*a6n
Nz;C9+
-iAAneL
0[xs=}0
xcu3O&gG
_SS\Q2m_
g-`/i/I
b|J"d?O
*/_n'?
CA. H$or
nrbb#q
QIO/ch
7evOM
GSJg:`
+K:\R,'
iIh|l
]j%8?2
>|k&l_iTV
mK^R=^
ht$|>>
u&Sy(^8jv
;cF.Q..
h`HgLSJ
:{X=2]
$;628d
h<`dZD
;X~D\-
6;`8vU
x$6\^h
\dzqC_
?f=qI
MF}m&$
^{sB(Md
<d_6]S>U
XyEa)m5
mz1Bm)=
}[m7W+
GKx42;
oBP|*8
}JJ!|i
eKE&m'
o-Pkz0
-9l98=Z
Dri^-R
xX=Q`O>3
ZH<(n6
mO\cJ6
5y(lk}
hIn8,L
M^|0|w
JR?~0FD
FGUD76+
eK+A4{@"
18G8HS/
n&-RA)B
`:{417
rC[+2
V=5Y,e
Y.w1q>
ROc,Dh+O3tw2{j0(
!yMmb]]
+lDd+6_
AGe|>P
qO#e=p
Z_;U!*c
S{P6r{
J$ZqU5
C?kXNZ
euAdaRf
u<xUP/
#.jZ/P
Z`Z'p$
%;"GYV
C1#Y]v
GFKTTR
J"_\w.N
Z-2a#Q
HowiW#
\tz@/)
p";Z1
RqZi0+
SR~?eC^
(r^t@x}j4
wL[xZnu
&cq\0qi
8[(AHQ
/%nNcA
Cev:wj
d7kkUT
@mO4#{
$\SIZWmp
y*NQ*q
vI..&S
u+Y TNJ
Xc"$M
Vq_yYS
9&'ffm
aX2_%^
oT0:,3~
V{{gB!
2|Q#NQ
YC*eX"
NH\LB$
n4:v[4
kb3L\f
"@3soCDh
pJ;7T&
rN1g>0
+f *"|
K+9[`kO
<t{,d&
9*jRO^j
{c &eAG
.vmpL8
x?^0y
mFh-L8;
Qz~Y<)
eh\{`a
;V'}.e
ZV77Bp3
au=\u'H
3$m Ku
c]5",z
`]<%%_
.YJ5Md
*hR7}M
a9fC/D
!B6Pcww
!1Jjtxo
7a'#<qg:
/iy0d[
F:}3rX
sS#=&2_QR3F
HDL;I\
+<4g>b
!6F+TI^
';>|JP*
]NqKMth
(%u[4]
c)+6~u
Zi3z,F
nK{d?r?
iBdc^K
B9Xq4
' 9Ye#
{'Jn0,:
XgrI?Kg
Vqk|Fx[
ax(:*,
x<+?Mp*-
r/0:,B
=`vf7l
mi,KT4
^H.yE_9
h`)En"0
Hzrt7N
D_??-;og:
W "j3:w
1)bB([
!%sd(?i
dDHUaO#
\:9'GP<
FR<.>7
:^aX__
Y\j=sWU
~]m]o.5*
Ds!{e(
m~=^4G=
9q @;,
K[;,I'
abN*(C-
t03l&G
z.}. W
[QIWz*
xL&`+EK|3
DL0U\(
AoWs:Y
#_8d/tU
i,Ya3P
`"mO|"
E',vOW
;_:\?O?
zqe#DM
^4kgv_
k>l}k/
y'dZ*OU
!y=3OG
[C\%5p
<qBZ3b
jUkX~?KIs
q5I4ZeZM)$
l}DCc`
&[a/Tn
s2?MC,
b{~bN{\
mq]GM|
]km=fbBBpsra
*eM.3x
cJN^T/
n3xC3r
ZdNT-j
ToI3OQM
GGL9(%
;Y8v~~/Y
2W`4?"C
A2 m*{[Kf
cG9,FV
[(1@aLzS
'S<V1?
%7l}xnv
e'+,oy
o0h=\g
hSB2m
aEq2.'
P-;$k(M
(&C^im
IM${)IdYh{
Rx),-6
/9hM%fA
.shRqJ
%H1A3.
%3Q0_
99;A H
+Fh?5@
_`~XC?s
6!w"(h>
Z?kJ*h\Z
jc"\O(
O>f7dx
kY^:}z
T(}]#P
S_(hD8\U
=p3;630T
X2z6tA
n R}L&o
@`nD*y@
vraOGx2
<X:ZR.
E[7RJ;
ryZd ?
ck/oQ^
!zPA(tL}
oR]M/Q
Mw9)?t
)`qYyU6
Q>D_k]NU
hO$'8
e+7"0~
fd'\}k
H{@[U{x~
\r MXUA
_%"b"m
WJ1BM(<}C
1E<~E_#j
yjC6hQMU
6zGA(r#
{%4`Jrma
kB9?l)
i9T$"ri#
U8<+^p
Pd\I!J
#=xo"s
X/5#/&
!OQdin
MCpGv
0Bm7vk
QhTRmc
m>t0j.
49_jI
%$e]U[
oaCA@3
LDuks#Po$
Hnvp|#
OqD%9u}
g`a4@#
|/VBOh
p{jn5I
K{Zfny
OX6Aa+G\
\$)=/"
}w@<e\
E3?|S)
CF2:~pu
,eD$%
Q$m'RW
ScFO%6
MbHY@$
r6&+$&#
T!)JsBWn
de-Ser
<OMw1d
/a]RS
>w2Rv/
fH"E_6
4)iq<;
d*QeTR3
56HE6H
a1{Vd"
o_*WJ8o
T;W%Yo|
F_Q|.L92
m[<vOZ
Qi^;XO
.eHCWmi
MJn0.p
5BC=l
jTRr;--}X
x;Tt+u
5B$](lS
k*K*#'fCL|
=W2(Y
VoU}g]o
@2N`R9E8
tV43.
F)Z5Rs
d[3]{N
gni]j+'
oA)h@&?
~p?]\J
dFZ(Ke
Ec2*SY
w~>`wb
:e:IAK^
V"5~;Xc;
(fn~'
Ss+A(*|$
jEhi@h
~$9K_<
$E+p`Q
!/yZbwxC;
$bOyG5@b
i_l:dP
.XIx:l%
]GQfs5
%kgV+|xs
YoU%r)8
.=.:Yk
*h,N]5
_11pg
b_7Oj[Q
ltZG5~
5S2snX
O_2?nVz"p
Nku*bl
TL7<cbg
$B_yA%8
XZK:v
52,f&`LK
fRw+J0
&i\y-3*
~$pSb+
rs6a_U{?
Y0RN'3
'=EzN=,
5RzQ."
:u"n8pE$.d
8*me4k
iyk(lt
LYLG*_%
5Vz2.)
P[dw^d2*
bTVYoti
z%XPjn
o'WGD#b
OHiy,'W
T.OI1+
EPV~?I
!C 8Gm
^O\g39.[
X\+F_e6X
P:o%;5
'2cfq^
zI$5$x
n3v0]-b3
57fsC}
<r+.bP.
fP/8|6
MU0a?}
GMer,Rvn
s1Jr>fR
-,m0ar
YjvI4:
@Y#w3|
hBc\b&
TI% qO5&v
C[,!}z
LSYH {
f 2p,Y
i[N.p)W^
W1vz,2
?2TaPk
&a:jL*
ln(NaB
MzoV-'
N/<x~
]%t9$8
e#J 4A
$#%CxMq=
+Gf&B.899gLl
2,?G3j
Y=_Ar"
S=91t|
|t'^1tIeH
|b[0NP/
)R71RDARWQRWYRWaRWiRWqRWyRW
R7.S\.Kb.CJ.[\.s
.#J.;\.3\.+\
! " # $ % & '
kernel32.dll
VirtualProtect
System.Core, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
System.Security.Cryptography.AesCryptoServiceProvider
System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089
UHc782p09dAh9pR5BQ.naGgHLLYdkqMYqx2xj
{11111-22222-10009-11111}
{11111-22222-10009-11112}
Debugger Detected
{11111-22222-50001-00000}
GetDelegateForFunctionPointer
file:///
Location
ResourceA
Virtual
Write
Process
Memory
Protect
Process
Close
Handle
kernel
32.dll
{11111-22222-10001-00001}
{11111-22222-10001-00002}
{11111-22222-20001-00001}
{11111-22222-20001-00002}
{11111-22222-30001-00001}
{11111-22222-30001-00002}
{11111-22222-40001-00001}
{11111-22222-40001-00002}
HSKlnbtCdXsODAJNj7.6Hp8lFVKwQIaI54YMP
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
CompanyName
FileDescription
Politic
FileVersion
1.0.0.0
InternalName
Politic.exe
LegalCopyright
Copyright
2025
LegalTrademarks
OriginalFilename
Politic.exe
ProductName
Politic
ProductVersion
1.0.0.0
Assembly Version
1.0.0.0
Antivirus Signature
Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Stelpak.4!c
Elastic malicious (high confidence)
ClamAV Win.Packed.Msilzilla-10042543-0
CMC Clean
CAT-QuickHeal Trojan.MSIL
Skyhigh BehavesLike.Win32.Generic.dc
ALYac Gen:Variant.Lazy.658915
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Trojan:MSIL/Stelpak.0997b584
K7GW Trojan ( 005c27361 )
K7AntiVirus Trojan ( 005c27361 )
huorong Trojan/MSIL.Agent.vl
Baidu Clean
VirIT Trojan.Win32.GenusT.ERGM
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of MSIL/Kryptik.ANFM
APEX Malicious
Avast Win32:PWSX-gen [Trj]
Cynet Clean
Kaspersky HEUR:Trojan.MSIL.Stelpak.gen
BitDefender Gen:Variant.Jalapeno.19871
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Jalapeno.19871
Tencent Malware.Win32.Gencirc.10c16915
Sophos Troj/MSIL-THD
F-Secure Trojan.TR/AD.Nekark.cxkym
DrWeb Clean
Zillya Clean
TrendMicro Clean
McAfeeD Real Protect-LS!4CA928AE23FC
Trapmine Clean
CTX exe.trojan.msil
Emsisoft Gen:Variant.Jalapeno.19871 (B)
Ikarus Trojan.MSIL.Crypt
FireEye Generic.mg.4ca928ae23fcfa66
Jiangmin Clean
Webroot W32.Malware.gen
Varist W32/MSIL_Kryptik.LWW.gen!Eldorado
Avira TR/AD.Nekark.cxkym
Fortinet MSIL/Kryptik.ANFM!tr
Antiy-AVL RiskWare[Obfuscator]/MSIL.Reactor.a
Kingsoft MSIL.Trojan.Stelpak.gen
Gridinsoft Malware.Win32.XWorm.tr
Xcitium Clean
Arcabit Trojan.Jalapeno.D4D9F
SUPERAntiSpyware Clean
Microsoft Trojan:MSIL/Remcos.MBV!MTB
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5736614
Acronis Clean
McAfee GenericRXWQ-QK!4CA928AE23FC
TACHYON Clean
VBA32 TScope.Trojan.MSIL
Malwarebytes Spyware.Lumma
Panda Trj/Chgt.AD
Zoner Clean
TrendMicro-HouseCall Clean
Rising Malware.Obfus/MSIL@AI.94 (RDM.MSIL2:ucNZSA7mMbU3kczIfOKqBw)
Yandex Clean
SentinelOne Static AI - Malicious PE
MaxSecure Clean
GData Gen:Variant.Jalapeno.19871
AVG Win32:PWSX-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Trojan:MSIL/Remcos.MKN2XJC
No IRMA results available.