| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2016-Jan-30 00:31:12 |
| Detected languages |
English - United States
|
| Debug artifacts |
E:\Data\My Projects\Troy Source Code\tcp1st\rifle\Release\rifle.pdb
|
| CompanyName | Initech (C) Co, Ltd |
| FileDescription | Initech Client |
| FileVersion | 5.5.5.5 |
| InternalName | Initech Client |
| LegalCopyright | Copyright (C) 2016 |
| OriginalFilename | Initech Client |
| ProductName | Initech Client |
| ProductVersion | 1.0.0.24 |
| Info | Matching compiler(s): | Microsoft Visual C++ 6.0 - 8.0 |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Suspicious | The file contains overlay data. | 732 bytes of data starting at offset 0x13300. |
| Info | The PE is digitally signed. |
Signer: Initech
Issuer: VeriSign Class 3 Code Signing 2010 CA |
| Malicious | VirusTotal score: 59/71 (Scanned on 2020-10-14 19:10:26) |
Bkav:
W32.AIDetectVM.malware1
Elastic: malicious (high confidence) MicroWorld-eScan: Trojan.Agent.BQRG FireEye: Generic.mg.323ec4e03f16cc9d CAT-QuickHeal: Trojan.Mauvaise.SL1 McAfee: GenericRXGV-SU!323EC4E03F16 Cylance: Unsafe Zillya: Trojan.GenericKDCRTD.Win32.9160 Sangfor: Malware K7AntiVirus: Riskware ( 0040eff71 ) K7GW: Riskware ( 0040eff71 ) Cybereason: malicious.03f16c Invincea: Mal/Generic-R + Mal/Agent-ARR BitDefenderTheta: Gen:NN.ZexaF.34566.eu1@a4t0kKpi Cyren: W32/Rifdoor.A.gen!Eldorado Symantec: Backdoor.Trojan APEX: Malicious Avast: Win32:Trojan-gen ClamAV: Win.Malware.Johnnie-6840509-0 Kaspersky: Trojan-Dropper.Win32.Agent.sbni BitDefender: Trojan.Agent.BQRG NANO-Antivirus: Trojan.Win32.Dwn.ealytx Rising: Backdoor.Rifdoor!8.107C7 (TFE:5:ZTCeJskxeoE) Ad-Aware: Trojan.Agent.BQRG Emsisoft: Trojan.Agent.BQRG (B) Comodo: TrojWare.Win32.Rifbu.RTC@7sjdj9 F-Secure: Trojan.TR/Agent.fjnu DrWeb: Trojan.DownLoader19.30399 VIPRE: Trojan.Win32.Generic!BT TrendMicro: TROJ_GEN.R011C0CJE20 McAfee-GW-Edition: BehavesLike.Win32.Generic.lh Sophos: Mal/Agent-ARR SentinelOne: DFI - Suspicious PE GData: Trojan.Agent.BQRG Jiangmin: Trojan.Generic.ohkb eGambit: Unsafe.AI_Score_96% Avira: TR/Agent.fjnu MAX: malware (ai score=86) Antiy-AVL: Trojan[Dropper]/Win32.Agent.sbni Arcabit: Trojan.Agent.BQRG ViRobot: Backdoor.Win32.Rifle.Gen ZoneAlarm: Trojan-Dropper.Win32.Agent.sbni Microsoft: Backdoor:Win32/Rifdoor.A!bit Cynet: Malicious (score: 100) AhnLab-V3: Win-Trojan/Rifdoor.78592 Acronis: suspicious VBA32: BScope.Trojan.Downloader ALYac: Trojan.Agent.223232 Malwarebytes: Backdoor.Agent Zoner: Trojan.Win32.87138 ESET-NOD32: Win32/Agent.RTC TrendMicro-HouseCall: TROJ_GEN.R011C0CJE20 Tencent: Malware.Win32.Gencirc.10b9cc27 Yandex: Trojan.Agent!cqGvJGdAr58 Ikarus: Backdoor.Win32.Rifdoor Fortinet: W32/Agent.RTC!tr AVG: Win32:Trojan-gen Panda: Trj/Genetic.gen CrowdStrike: win/malicious_confidence_100% (D) |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xf0 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 5 |
| TimeDateStamp | 2016-Jan-30 00:31:12 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 10.0 |
| SizeOfCode | 0xae00 |
| SizeOfInitializedData | 0x6800 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000367F (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0xc000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 5.1 |
| ImageVersion | 0.0 |
| SubsystemVersion | 5.1 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x17000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x14886 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| SHLWAPI.dll |
StrToIntA
StrChrA StrStrA |
|---|---|
| WS2_32.dll |
connect
WSAStartup gethostname WSAIoctl htons setsockopt WSACleanup recv socket closesocket gethostbyname send WSAGetLastError |
| WININET.dll |
DeleteUrlCacheEntry
|
| ADVAPI32.dll |
RegCloseKey
GetUserNameA RegOpenKeyExA RegCreateKeyA RegQueryValueExA RegSetValueExA |
| urlmon.dll |
URLOpenBlockingStreamA
|
| SHELL32.dll |
ShellExecuteA
|
| USER32.dll |
wsprintfA
|
| IPHLPAPI.DLL |
GetAdaptersInfo
|
| KERNEL32.dll |
IsProcessorFeaturePresent
GetStringTypeW LoadLibraryW HeapSize RtlUnwind SetStdHandle WriteConsoleW CreateFileW FlushFileBuffers CompareStringW SetEnvironmentVariableA LeaveCriticalSection EnterCriticalSection GetConsoleMode GetConsoleCP SetFilePointer HeapReAlloc ExitProcess GetComputerNameA CreateFileA GetFileSize lstrcmpA lstrlenA HeapAlloc HeapFree WaitForSingleObject GetTickCount GetProcessHeap WriteFile GetCommandLineA GlobalAlloc Sleep GetExitCodeProcess CreateProcessA TerminateProcess ReadFile lstrcatA CreateDirectoryA SetCurrentDirectoryA GetLastError OpenMutexA CreatePipe GetModuleFileNameA CreateMutexA GetVersionExA WinExec CloseHandle GetTempPathA lstrcpyA GetSystemTimeAsFileTime HeapSetInformation GetStartupInfoW GetCurrentProcess UnhandledExceptionFilter SetUnhandledExceptionFilter IsDebuggerPresent DecodePointer EncodePointer HeapCreate GetProcAddress GetModuleHandleW GetStdHandle GetModuleFileNameW GetCPInfo InterlockedIncrement InterlockedDecrement GetACP GetOEMCP IsValidCodePage TlsAlloc TlsGetValue TlsSetValue TlsFree SetLastError GetCurrentThreadId WideCharToMultiByte LCMapStringW MultiByteToWideChar GetTimeZoneInformation RaiseException FreeEnvironmentStringsW GetEnvironmentStringsW SetHandleCount InitializeCriticalSectionAndSpinCount GetFileType DeleteCriticalSection QueryPerformanceCounter GetCurrentProcessId |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 5.5.5.5 |
| ProductVersion | 1.0.0.24 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| CompanyName | Initech (C) Co, Ltd |
| FileDescription | Initech Client |
| FileVersion (#2) | 5.5.5.5 |
| InternalName | Initech Client |
| LegalCopyright | Copyright (C) 2016 |
| OriginalFilename | Initech Client |
| ProductName | Initech Client |
| ProductVersion (#2) | 1.0.0.24 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2016-Jan-30 00:31:12 |
| Version | 0.0 |
| SizeofData | 92 |
| AddressOfRawData | 0xe540 |
| PointerToRawData | 0xd740 |
| Referenced File | E:\Data\My Projects\Troy Source Code\tcp1st\rifle\Release\rifle.pdb |
| Size | 0x48 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x41003c |
| SEHandlerTable | 0x40e680 |
| SEHandlerCount | 3 |
| XOR Key | 0x536db74b |
|---|---|
| Unmarked objects | 0 |
| C++ objects (VS2010 build 30319) | 34 |
| ASM objects (VS2010 build 30319) | 18 |
| C objects (VS2010 build 30319) | 102 |
| Imports (VS2008 SP1 build 30729) | 19 |
| Total imports | 126 |
| 175 (VS2010 build 30319) | 1 |
| Resource objects (VS2010 build 30319) | 1 |
| Linker (VS2010 build 30319) | 1 |