I've been using OpenLP for some time and found it amazing. At work I have been doing a trial of a new type of antivirus from a company called "cylance". Their product made the below comments after analyzing the file. I give this information so the developers will know what the AV is saying about the file and look forward to any comments. Thanks!
<font color="#000099"></font><br>
<font color="#000099">Anomalies (2 of 20)</font><font color="#004b8b"><br>
This PE appears to be lying about when it was written, which is atypical for professionally written software.
This PE has some extra content appended to it, beyond the normal areas of the file. Appended data can frequently be used to embed malicious code or data and is frequently overlooked by protection systems.
Collection (2 of 21)<br>
This object imports functions that are used to gather information about the current operating system. Malware uses this to determine how to better tailor further attacks and to report information back to a controller.
This object imports functions that can be used to determine details about the processor. Malware uses this to tailor attacks and exfiltrate this data to common command and control infrastructure.
DataLoss (0 of 12)<br>
Deception (4 of 22)<br>
This object imports functions that are used to modify the memory of a running process. Malware does this to inject itself into running processes.
This object seems to be looking for common protection systems. Malware does this to initiate an anti-protection action tailored to what is installed on the system.
This object seems to have portions of the code that appear to be compressed. Malware uses these techniques to avoid detection.
This PE appears to run invisibly, but it isn't a background service. It might be designed to remain hidden.
Destruction (2 of 13)<br>
This PE imports functions that can be used to spawn another process. Malware uses this to launch subsequent phases of an infection, typically downloaded from the Internet.
This object imports functions that can be used to stop a running process. Malware uses this to attempt to remove protection systems, or to cause damage to a running system.<strike></strike><br>
<li></li></font><li></li>