| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2023-Apr-07 14:30:54 |
| Detected languages |
English - United States
|
| Debug artifacts |
C:\Users\tha8b\OneDrive\Desktop\new injectors\MW2019 AIO DEV LOADER - Copy\x64\Release\zim.pdb
|
| Info | Matching compiler(s): | MASM/TASM - sig1(h) |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
| Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 54/70 (Scanned on 2026-04-07 14:09:36) |
APEX:
Malicious
AVG: Win64:MalwareX-gen [Rat] AhnLab-V3: Trojan/Win.Generic.C5607152 Alibaba: TrojanDropper:Win64/UnwantedX.1d2549c9 Arcabit: Trojan.Generic.D4BF405D Avast: Win64:MalwareX-gen [Rat] Avira: TR/Drop.Agent.oltfr BitDefender: Trojan.GenericKD.79642717 Bkav: W64.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.1732026502593826 CTX: exe.trojan.generic ClamAV: Win.Malware.Lazy-10034378-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Tool.Inject.78 ESET-NOD32: Win64/TrojanDropper.Agent.GD trojan Elastic: Windows.Generic.Threat Emsisoft: Trojan.GenericKD.79642717 (B) F-Secure: Trojan.TR/Drop.Agent.oltfr Fortinet: W64/Agent.GD!tr GData: Trojan.GenericKD.79642717 Google: Detected Ikarus: Trojan-Dropper.Win64.Agent K7AntiVirus: Trojan ( 005ceda41 ) K7GW: Trojan ( 005ceda41 ) Kaspersky: Trojan.Win32.Agent.xaxuqi Kingsoft: Win32.Troj.Unknown.a Lionic: Trojan.Win32.Agent.Y!c Malwarebytes: Malware.AI.4284587977 MaxSecure: Trojan.Malware.208681707.susgen McAfeeD: ti!29BDF43AF7FC MicroWorld-eScan: Trojan.GenericKD.79642717 Microsoft: Trojan:Win32/Phonzy.A!ml NANO-Antivirus: Trojan.Win64.Inject.kfqarg Paloalto: generic.ml Panda: Trj/Chgt.AD Rising: Dropper.Agent!8.2F (TFE:5:8Ivdm0XplEG) Sangfor: Trojan.Win32.Save.a SentinelOne: Static AI - Malicious PE Sophos: Mal/Generic-S Symantec: ML.Attribute.HighConfidence Tencent: HackTool.Win64.KernelDrUtil.16000463 TrellixENS: Artemis!2CA19D0F12D1 TrendMicro-HouseCall: TROJ_GEN.R002H0AC526 VBA32: Trojan.Agent VIPRE: Trojan.GenericKD.79642717 Varist: W64/ABRisk.TFNL-6885 ViRobot: Trojan.Win.Z.Agent.2188288 Yandex: Trojan.Agent!9nzn1VYMaBM Zillya: Dropper.Agent.Win64.8685 alibabacloud: HackTool:Win/KDU.A huorong: HackTool/Injector.f |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x110 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 6 |
| TimeDateStamp | 2023-Apr-07 14:30:54 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x9c00 |
| SizeOfInitializedData | 0x20d000 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000009A90 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x21a000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.dll |
ReadFile
WriteFile Beep GetLastError Sleep GetCurrentProcess GetWindowsDirectoryW VirtualAlloc VirtualFree FreeLibrary GetProcAddress LoadLibraryExA GetFileSize LoadLibraryW CreateToolhelp32Snapshot Process32First Process32Next GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter IsDebuggerPresent IsProcessorFeaturePresent TerminateProcess SetUnhandledExceptionFilter UnhandledExceptionFilter DeleteFileW DeviceIoControl CloseHandle LoadLibraryA CreateFileW GetModuleHandleW CreateEventW WaitForSingleObjectEx ResetEvent SetEvent DeleteCriticalSection InitializeCriticalSectionAndSpinCount LeaveCriticalSection EnterCriticalSection InitializeSListHead |
|---|---|
| USER32.dll |
IsWindowVisible
PostThreadMessageA GetWindowThreadProcessId GetWindow EnumWindows UnhookWindowsHookEx SetWindowsHookExA |
| SHELL32.dll |
ShellExecuteW
|
| MSVCP140.dll |
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A ?uncaught_exception@std@@YA_NXZ ?_Xout_of_range@std@@YAXPEBD@Z ?_Xlength_error@std@@YAXPEBD@Z |
| ntdll.dll |
RtlLookupFunctionEntry
RtlCaptureContext RtlImageNtHeader RtlVirtualUnwind |
| VCRUNTIME140.dll |
__current_exception
__C_specific_handler __std_exception_copy memcmp __std_terminate memset memmove memcpy _CxxThrowException __std_exception_destroy __current_exception_context |
| VCRUNTIME140_1.dll |
__CxxFrameHandler4
|
| api-ms-win-crt-runtime-l1-1-0.dll |
_initialize_onexit_table
_register_onexit_function _crt_atexit _cexit _invalid_parameter_noinfo_noreturn _initialize_narrow_environment _set_app_type _configure_narrow_argv _get_initial_narrow_environment _initterm _initterm_e _exit __p___argc __p___argv _c_exit _register_thread_local_exe_atexit_callback _seh_filter_exe exit terminate |
| api-ms-win-crt-string-l1-1-0.dll |
_stricmp
strcpy_s |
| api-ms-win-crt-heap-l1-1-0.dll |
_set_new_mode
free malloc _callnewh |
| api-ms-win-crt-stdio-l1-1-0.dll |
__p__commode
_set_fmode |
| api-ms-win-crt-utility-l1-1-0.dll |
rand
|
| api-ms-win-crt-math-l1-1-0.dll |
__setusermatherr
|
| api-ms-win-crt-locale-l1-1-0.dll |
_configthreadlocale
|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2023-Apr-07 14:30:54 |
| Version | 0.0 |
| SizeofData | 119 |
| AddressOfRawData | 0x1cbaa4 |
| PointerToRawData | 0x1caaa4 |
| Referenced File | C:\Users\tha8b\OneDrive\Desktop\new injectors\MW2019 AIO DEV LOADER - Copy\x64\Release\zim.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2023-Apr-07 14:30:54 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x1cbb1c |
| PointerToRawData | 0x1cab1c |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2023-Apr-07 14:30:54 |
| Version | 0.0 |
| SizeofData | 932 |
| AddressOfRawData | 0x1cbb30 |
| PointerToRawData | 0x1cab30 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2023-Apr-07 14:30:54 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| StartAddressOfRawData | 0x1401cbef8 |
|---|---|
| EndAddressOfRawData | 0x1401cbf00 |
| AddressOfIndex | 0x1402130b0 |
| AddressOfCallbacks | 0x14000b4c0 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_4BYTES
|
| Callbacks | (EMPTY) |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x140212b08 |
| XOR Key | 0x9b8b3503 |
|---|---|
| Unmarked objects | 0 |
| Imports (VS2008 SP1 build 30729) | 18 |
| Imports (2207) | 2 |
| 253 (VS2022 Update 4 (17.4.2) compiler 31935) | 1 |
| C objects (VS2022 Update 4 (17.4.2) compiler 31935) | 10 |
| ASM objects (VS2022 Update 4 (17.4.2) compiler 31935) | 3 |
| C++ objects (VS2022 Update 4 (17.4.2) compiler 31935) | 31 |
| Imports (VS2022 Update 4 (17.4.2) compiler 31935) | 6 |
| Imports (29395) | 13 |
| Total imports | 194 |
| C++ objects (VS2022 Update 5 (17.5.3) compiler 32216) | 5 |
| Resource objects (VS2022 Update 5 (17.5.3) compiler 32216) | 1 |
| 151 | 1 |
| Linker (VS2022 Update 5 (17.5.3) compiler 32216) | 1 |
No comments yet.