System currently contains 111,562,617 malware samples.
| 16711a52972e1e20d989bd04d708db4ea106e5d1f1c6ee0e7d1804c1d81151d9 |
| VirusShare info last updated 2026-04-10 00:00:00 UTC |
|
|
| MD5 | 10ffca50c86543b4e4efa234dbcaa356 |
| SHA1 | 725c25208e20fcf837c243e197b946e06271ed09 |
| SHA256 | 16711a52972e1e20d989bd04d708db4ea106e5d1f1c6ee0e7d1804c1d81151d9 |
| SSDeep | 48:SWkO0IoyTnXz+ihZjokhOLdGvC6wHQBTcMJLji/Ec5k8:ZJTnXzvokhMd96wHoxZjixq8 |
| Authentihash | de4097e817513cefed781ce499973f93591cfe6401e08d51c44e491dedd88519 |
| Size | 4,775 bytes |
| File Type | PE32 executable (DLL) (GUI) Intel 80386, for MS Windows |
| Mime Type | application/x-dosexec |
| Extension | dll |
| TrID | Win32 Dynamic Link Library (generic) (27.1%) Win16 NE executable (generic) (20.8%) Win32 Executable (generic) (18.6%) Windows Icons Library (generic) (8.5%) OS/2 Executable (generic) (8.3%)
|
Detections (60/70) | | ALYac | Gen:Variant.Barys.431082 | | APEX | Malicious | | AVG | Win32:Atraps-PZ [Trj] | | Acronis | suspicious | | AhnLab-V3 | Worm/Win32.Bundpil.R63957 | | Antiy-AVL | Worm/Win32.Bundpil | | Arcabit | Trojan.Barys.D693EA | | Avast | Win32:Atraps-PZ [Trj] | | Avira | TR/Downloader.Gen | | Baidu | Win32.Worm.Bundpil.ah | | BitDefender | Gen:Variant.Barys.431082 | | Bkav | W32.FamVT.DebrisB.Worm | | CAT-QuickHeal | Trojan.Agent.WL | | CTX | dll.unknown.barys | | CrowdStrike | win/malicious_confidence_100% (W) | | Cylance | Unsafe | | Cynet | Malicious (score: 100) | | DeepInstinct | MALICIOUS | | DrWeb | Trojan.MulDrop4.25343 | | ESET-NOD32 | Win32/Bundpil.T | | Elastic | malicious (high confidence) | | Emsisoft | Gen:Variant.Barys.431082 (B) | | F-Secure | Trojan.TR/Downloader.Gen | | Fortinet | W32/Generic!worm | | GData | Gen:Variant.Barys.431082 | | Google | Detected | | Ikarus | Worm.Win32.Gamarue | | Jiangmin | Worm/Generic.aftt | | K7AntiVirus | EmailWorm ( 0040f50c1 ) | | K7GW | EmailWorm ( 0040f50c1 ) | | Kaspersky | Worm.Win32.Debris.b | | Kingsoft | malware.kb.a.958 | | Malwarebytes | Bundpil.Worm.AutoRun.DDS | | McAfee | Downloader-FKP!10FFCA50C865 | | McAfeeD | Real Protect-LS!10FFCA50C865 | | MicroWorld-eScan | Gen:Variant.Barys.431082 | | Microsoft | Worm:Win32/Gamarue.DK!MTB | | NANO-Antivirus | Trojan.Win32.Drop.bqqvjw | | Panda | Trj/Genetic.gen | | Rising | Worm.Bundpil!1.E3E2 (CLASSIC) | | SUPERAntiSpyware | Trojan.Agent/Gen-Downloader | | Sangfor | Suspicious.Win32.Save.a | | SentinelOne | Static AI - Malicious PE | | Skyhigh | BehavesLike.Win32.Worm.xt | | Sophos | W32/Gamarue-BM | | Symantec | Trojan.Dropper | | Tencent | Trojan.Win32.Csyr.A | | Trapmine | suspicious.low.ml.score | | TrendMicro | WORM_GAMARUE.SMB | | TrendMicro-HouseCall | WORM_GAMARUE.SMB | | VBA32 | Worm.Gamarue | | VIPRE | Gen:Variant.Barys.431082 | | Varist | W32/Csyr.A!Eldorado | | VirIT | Trojan.Win32.Small.FAU | | Webroot | W32.Worm.Gen | | Xcitium | Worm.Win32.Bundpil.T@4wizl6 | | Yandex | Trojan.GenAsa!w+9VHPFiOJM | | ZoneAlarm | W32/Gamarue-BM | | alibabacloud | Worm:Win/Bundpil.7aa68aa1 | | huorong | Worm/Gamarue.f | | VirusTotal Report submitted 2025-04-27 06:50:14 UTC |
|
| ExIF Data | | CodeSize | 1024 | | EntryPoint | 0x10ab | | FileSize | 4.7 kB | | FileType | Win32 DLL | | FileTypeExtension | dll | | ImageFileCharacteristics | Executable, 32-bit, DLL | | ImageVersion | 0 | | InitializedDataSize | 2048 | | LinkerVersion | 10 | | MIMEType | application/octet-stream | | MachineType | Intel 386 or later, and compatibles | | OSVersion | 5.1 | | PEType | PE32 | | Subsystem | Windows GUI | | SubsystemVersion | 5.1 | | TimeStamp | 2013:04:07 20:00:59+00:00 | | UninitializedDataSize | 0 |
|