Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2016-Sep-09 20:05:36 |
Info | Matching compiler(s): |
Microsoft Visual C++ 6.0 DLL (Debug)
Microsoft Visual C++ 6.0 DLL |
Suspicious | The PE is possibly packed. | Unusual section name found: .cdata |
Malicious | VirusTotal score: 45/68 (Scanned on 2019-10-20 10:38:49) |
MicroWorld-eScan:
Trojan.GenericKD.41892134
FireEye: Generic.mg.1f72054db0157652 CAT-QuickHeal: Trojan.Tiggre McAfee: RDN/Generic.dx Cylance: Unsafe K7AntiVirus: Trojan ( 005597681 ) Alibaba: Trojan:Win32/Kryptik.e1dfdeb4 CrowdStrike: win/malicious_confidence_80% (D) Arcabit: Trojan.Generic.D27F3926 Cyren: W32/Trojan.ZOFX-3612 Symantec: Trojan.Gen.MBT ESET-NOD32: a variant of Win32/Kryptik.GXFT APEX: Malicious Kaspersky: Backdoor.Win32.Agent.mytqur BitDefender: Trojan.GenericKD.41892134 NANO-Antivirus: Trojan.Win32.Kryptik.gdrlyo Paloalto: generic.ml AegisLab: Trojan.Win32.Generic.4!c Ad-Aware: Trojan.GenericKD.41892134 Emsisoft: Trojan.GenericKD.41892134 (B) F-Secure: Trojan.TR/AD.MalwareCrypter.arl DrWeb: Trojan.DownLoader30.20316 TrendMicro: TROJ_GEN.R002C0PJE19 McAfee-GW-Edition: RDN/Generic.dx Fortinet: W32/Kryptik.GXFT!tr Sophos: Mal/Generic-S SentinelOne: DFI - Suspicious PE Webroot: W32.Trojan.Gen Avira: TR/AD.MalwareCrypter.arl MAX: malware (ai score=88) Antiy-AVL: GrayWare/Win32.Unwaders Endgame: malicious (high confidence) Microsoft: Trojan:Win32/Casdet!rfn ZoneAlarm: Backdoor.Win32.Agent.mytqur AhnLab-V3: Trojan/Win32.Reflect.R295123 Acronis: suspicious ALYac: Trojan.Agent.Carpcdl VBA32: BScope.Backdoor.Agent TrendMicro-HouseCall: TROJ_GEN.R002C0PJE19 Rising: Trojan.Kryptik!1.BDB8 (CLASSIC) Ikarus: Trojan.Win32.Crypt GData: Trojan.GenericKD.41892134 AVG: FileRepMalware Panda: Trj/GdSda.A Qihoo-360: HEUR/QVM40.1.7FEB.Malware.Gen |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xf0 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 6 |
TimeDateStamp | 2016-Sep-09 20:05:36 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 7.0 |
SizeOfCode | 0x3000 |
SizeOfInitializedData | 0x44000 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00001E90 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x4000 |
ImageBase | 0x10000000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x1000 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x48000 |
SizeOfHeaders | 0x1000 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
USER32.dll |
ReleaseDC
DefWindowProcW DestroyWindow PostMessageW SetCapture CreateWindowExW SetWindowLongW RegisterClassW DestroyIcon DestroyMenu LoadIconA CreateWindowExA UnregisterClassA LoadStringW OffsetRect SendMessageW SetWindowTextW |
---|---|
ole32.dll |
CoWaitForMultipleHandles
CoInitialize |
msi.dll |
#50
|
KERNEL32.dll |
CloseHandle
GetModuleHandleA ExitProcess SetEvent CreateMutexW GetCommandLineW VirtualAlloc lstrlenA LCMapStringA GetVersionExW |
MSVCRT.dll |
free
_onexit memcpy malloc _adjust_fdiv __dllonexit _initterm |
Ordinal | 1 |
---|---|
Address | 0x2050 |