System currently contains 108,571,523 malware samples.
| 8e90941eaf0881ffba9c6c5e957a7e4d6925a97ae034ae3d9e8fb1fec91c1f2a |
| VirusShare info last updated 2026-01-28 00:00:01 UTC |
|
|
| MD5 | eb1922b82b395409941bebba18a7701d |
| SHA1 | f0b0cc1336707d7f6963452515092f325c0651c2 |
| SHA256 | 8e90941eaf0881ffba9c6c5e957a7e4d6925a97ae034ae3d9e8fb1fec91c1f2a |
| SSDeep | 3072:SJ0Bs3o8A4M3riN6MhGkgS3PL6pb9t16n5OkhBOPC/c/FnncroP9:GwDeM7iNEkgiOb31k1ECaJ/F |
| Authentihash | 07931abb0f3e17f9ca5f1ba606fea45675ad53e83ab2102de762765f701f9824 |
| Size | 241,664 bytes |
| File Type | PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed |
| Mime Type | application/x-dosexec |
| Extension | exe |
| TrID | UPX compressed Win32 Executable (39.9%) Microsoft Visual C++ compiled executable (generic) (24.3%) Win32 Dynamic Link Library (generic) (9.6%) Win16 NE executable (generic) (7.4%) Win32 Executable (generic) (6.6%)
|
Detections (59/72) | | ALYac | Trojan.Agent.CYZT | | APEX | Malicious | | AVG | Win32:Banker-LAA [Trj] | | AhnLab-V3 | Downloader/Win.Nemucod.R658392 | | Antiy-AVL | RiskWare[Downloader]/Win32.Snojan | | Arcabit | Trojan.Agent.CYZT | | Avast | Win32:Banker-LAA [Trj] | | Avira | TR/Agent.qasng | | BitDefender | Trojan.Agent.CYZT | | Bkav | W32.AIDetectMalware | | CAT-QuickHeal | Trojan.GenericPMF.S33900397 | | CTX | exe.trojan.cyzt | | ClamAV | Win.Malware.Cymt-10023133-0 | | CrowdStrike | win/malicious_confidence_100% (D) | | Cylance | Unsafe | | Cynet | Malicious (score: 100) | | DeepInstinct | MALICIOUS | | DrWeb | Tool.Snojan.1 | | ESET-NOD32 | Win32/Agent.AAEF trojan | | Elastic | malicious (moderate confidence) | | Emsisoft | Trojan.Agent.CYZT (B) | | F-Secure | Trojan.TR/Agent.qasng | | Fortinet | Riskware/Snojan | | GData | Trojan.Agent.CYZT | | Google | Detected | | Gridinsoft | Trojan.Win32.Agent.oa!s1 | | Ikarus | Trojan.Agent | | Jiangmin | Downloader.Snojan.adp | | K7AntiVirus | Trojan ( 004bcce41 ) | | K7GW | Trojan ( 004bcce41 ) | | Kaspersky | HEUR:Flooder.Win32.CoreWarrior.a | | Kingsoft | malware.kb.a.998 | | Malwarebytes | Generic.Trojan.Malicious.DDS | | MaxSecure | Trojan.Malware.121218.susgen | | McAfeeD | ti!8E90941EAF08 | | MicroWorld-eScan | Trojan.Agent.CYZT | | Microsoft | TrojanDownloader:Win32/Nemucod | | NANO-Antivirus | Trojan.Win32.Snojan.jqzopm | | Panda | Trj/Genetic.gen | | Rising | Trojan.Agent!1.B576 (CLASSIC) | | Sangfor | Trojan.Win32.Save.a | | SentinelOne | Static AI - Malicious PE | | Skyhigh | BehavesLike.Win32.NemucodDownloader.dt | | Sophos | Troj/Bdoor-BHD | | Symantec | Trojan.Downloader!g2 | | Tencent | Trojan.Win32.Agent.cqe | | Trapmine | suspicious.low.ml.score | | TrellixENS | GenericRXWT-SU!EB1922B82B39 | | TrendMicro-HouseCall | Trojan.Win32.VSX.PE04C9t | | VBA32 | Flooder.CoreWarrior | | VIPRE | Trojan.Agent.CYZT | | Varist | W32/Trojan.AHVI-3908 | | VirIT | Trojan.Win32.AgentT.LM | | Webroot | W32.Malware.gen | | Xcitium | TrojWare.Win32.Snojan.B@7h1cjp | | Zillya | Trojan.GenericKD.Win32.100891 | | ZoneAlarm | Troj/Bdoor-BHD | | alibabacloud | DDoS:Win/Nemucod | | huorong | TrojanDownloader/Small.es | | VirusTotal Report submitted 2026-01-25 03:16:46 UTC |
|
| ExIF Data | | CodeSize | 86016 | | EntryPoint | 0x1130 | | FileSize | 236 kB | | FileType | Win32 EXE | | FileTypeExtension | exe | | ImageFileCharacteristics | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug | | ImageVersion | 1 | | InitializedDataSize | 4096 | | LinkerVersion | 2.56 | | MIMEType | application/octet-stream | | MachineType | Intel 386 or later, and compatibles | | OSVersion | 4 | | PEType | PE32 | | Subsystem | Windows command line | | SubsystemVersion | 4 | | TimeStamp | 2014:07:01 18:02:13+00:00 | | UninitializedDataSize | 77824 |
|