0046af85765f8f513fde39b06b19f8520074224ee4e2fde4aa438229a96779f2

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1999-Nov-29 19:11:11
Comments
CompanyName
FileDescription SslReq Application
FileVersion 1.0.0.3
InternalName SslReq.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename SslReq.exe
ProductName SslReq
ProductVersion 1.0.0.3
Assembly Version 1.0.0.3

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • rundll32.exe
Miscellaneous malware strings:
  • cmd.exe
Malicious VirusTotal score: 55/72 (Scanned on 2026-02-22 12:06:14) ALYac: Gen:Variant.Bulz.270506
APEX: Malicious
AVG: Win32:MalwareX-gen [Spy]
AhnLab-V3: Malware/Win.Generic.C5576880
Alibaba: Backdoor:MSIL/JSSLoader.ea593b9a
Antiy-AVL: Trojan[Spy]/MSIL.JSSLoader
Arcabit: Trojan.Bulz.D420AA
Avast: Win32:MalwareX-gen [Spy]
BitDefender: Gen:Variant.Bulz.270506
Bkav: W32.AIDetectMalware.CS
CAT-QuickHeal: Trojan.Ghanarava.17717115179d150f
CTX: exe.trojan.msil
ClamAV: Win.Trojan.JSSLoader-9939412-1
CrowdStrike: win/malicious_confidence_100% (W)
Cylance: Unsafe
DeepInstinct: MALICIOUS
ESET-NOD32: MSIL/Spy.Agent.CJI trojan
Elastic: malicious (high confidence)
Emsisoft: Gen:Variant.Bulz.270506 (B)
Fortinet: MSIL/Agent.CJI!tr
GData: Gen:Variant.Bulz.270506
Google: Detected
Gridinsoft: Spy.Win32.Keylogger.dd!n
Ikarus: Trojan-Spy.MSIL.Agent
K7AntiVirus: Trojan ( 700000201 )
K7GW: Trojan ( 700000201 )
Kaspersky: HEUR:Backdoor.MSIL.Agent.gen
Kingsoft: MSIL.Backdoor.Agent.gen
Lionic: Trojan.Win32.JSSLoader.m!c
Malwarebytes: Malware.AI.3056670792
McAfeeD: ti!0046AF85765F
MicroWorld-eScan: Gen:Variant.Bulz.270506
Microsoft: TrojanSpy:MSIL/JSSLoader.B
Paloalto: generic.ml
Panda: Trj/GdSda.A
Rising: Spyware.Agent!8.C6 (TFE:C:djn3sHc5wuF)
Sangfor: Spyware.Msil.Jssloader.V4c7
SentinelOne: Static AI - Malicious PE
Skyhigh: Agent-FMR!265F524FF9C0
Sophos: Mal/Generic-S
Symantec: ML.Attribute.HighConfidence
TACHYON: Backdoor/W32.DN-Agent.30208.C
Tencent: Malware.Win32.Gencirc.13fdf789
TrellixENS: Agent-FMR!265F524FF9C0
TrendMicro: Trojan.MSIL.JSSLOADER.SMYXDJL
TrendMicro-HouseCall: Trojan.MSIL.JSSLOADER.SMYXDJL
VBA32: TScope.Trojan.MSIL
VIPRE: Gen:Variant.Bulz.270506
Varist: W32/ABTrojan.PFHP-8883
ViRobot: Trojan.Win.Z.Agent.30208.DQV
VirIT: Trojan.Win32.MSIL_Heur.A
Webroot: W32.Trojan.Gen
Zillya: Trojan.Agent.Win32.3850289
alibabacloud: Trojan[spy]:MSIL/JSSLoader.B
huorong: TrojanSpy/MSIL.Agent.bw

Hashes

MD5 265f524ff9c0fc9e16a8bfda199d150f
SHA1 7395763e27c09ecae7f296e8a969a53a544df2b0
SHA256 0046af85765f8f513fde39b06b19f8520074224ee4e2fde4aa438229a96779f2
SHA3 00be615e24410bee73470993c949c1507e9b73ab1480548af05f75cfc43a8a85
SSDeep 768:G1zytrGO7EKDSrJSF8yayArwXtGPgRaunU:GWKO7E6a0WrwXXaunU
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 1999-Nov-29 19:11:11
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x6c00
SizeOfInitializedData 0x800
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00008BAE (Section: .text)
BaseOfCode 0x2000
BaseOfData 0xa000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0xe000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 29472455d68827e1d1cdba8f0ac4616f
SHA1 c3862d86808de80edcfed50cc4169cdb5227dd6d
SHA256 47e873825832ffefe49e099c3eaa74388fcaaf4efbc02ecd69cfba0f14ad92bf
SHA3 2d047f2baac105c7a4bdfed496958605e24387953c80dce7be093499948f9566
VirtualSize 0x6bb4
VirtualAddress 0x2000
SizeOfRawData 0x6c00
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.7335

.rsrc

MD5 d6070ebaba7dc41fd2bb3ee001526eb0
SHA1 597647900cba59426a7abce57792777d27d758a0
SHA256 8b0a8410754463fc07a7b6937214486cd7b0c140508d53ecbba249bb84f224e1
SHA3 3eb176dfc687e2f9fec36b636b9737b792aedbabc92a3e908670631f20948cc0
VirtualSize 0x5ae
VirtualAddress 0xa000
SizeOfRawData 0x600
PointerToRawData 0x6e00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.0926

.reloc

MD5 4d2eb1fc2cc61728f236f8dc5656b9f3
SHA1 ac9456113ec98f59420151df668c924f7f494305
SHA256 b2539b7e910f46703d18ea527ec05725861e2f9732b9a8c1c17ac2ddc70dca86
SHA3 14908df4bd8c4098ccb4bfed6b68831bf428d9ac847fb7f3e97abe7ffcafcfb7
VirtualSize 0xc
VirtualAddress 0xc000
SizeOfRawData 0x200
PointerToRawData 0x7400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.0815394

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage UNKNOWN
Size 0x324
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.29545
MD5 70e1f16c40811a3fe59c748157379cd0
SHA1 2d42efbcb6d132d1b79c1982762e247e882a1c0f
SHA256 306c90b3b6d4af6669f8a820e2a73507114e4ebc19eba391acde71c64570994f
SHA3 b2a22a8f1b457bad277318a23b6f07867ce8d62da036728f638a04fc154c228e

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage UNKNOWN
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.3
ProductVersion 1.0.0.3
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription SslReq Application
FileVersion (#2) 1.0.0.3
InternalName SslReq.exe
LegalCopyright Copyright © 2020
LegalTrademarks
OriginalFilename SslReq.exe
ProductName SslReq
ProductVersion (#2) 1.0.0.3
Assembly Version 1.0.0.3
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

Leave a comment

No comments yet.