Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2017-Dec-12 17:58:45 |
Detected languages |
Korean - Korea
|
Comments | |
CompanyName | Microsoft Corporation |
FileDescription | Windows Remote Assistance SD Server |
FileVersion | 10.0.10586.0 (th2_release.151029-1700) |
InternalName | sdchange.exe |
LegalCopyright | Microsoft Windows Operating System |
LegalTrademarks | |
OriginalFilename | sdchange.exe.mui |
PrivateBuild | |
ProductName | Microsoft Windows Operating System |
ProductVersion | 10.0.10586.0 |
SpecialBuild |
Info | Matching compiler(s): |
Microsoft Visual C++ 6.0 - 8.0
Microsoft Visual C++ Microsoft Visual C++ v6.0 Microsoft Visual C++ v5.0/v6.0 (MFC) |
Info | Cryptographic algorithms detected in the binary: |
Uses constants related to CRC32
Uses constants related to MD5 Uses constants related to SHA1 |
Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 41/68 (Scanned on 2019-09-09 04:54:21) |
MicroWorld-eScan:
Gen:Variant.Graftor.487501
McAfee: Trojan-FPIA!38FC56965DCC Cylance: Unsafe BitDefender: Gen:Variant.Graftor.487501 K7GW: Trojan ( 0052cf421 ) Cybereason: malicious.65dccd Arcabit: Trojan.Graftor.D7704D TrendMicro: TROJ_FRS.0NA103I819 F-Prot: W32/Trojan3.AOLE ESET-NOD32: a variant of Win32/NukeSped.AU APEX: Malicious Paloalto: generic.ml Kaspersky: HEUR:Trojan.Win32.Generic Alibaba: Trojan:Win32/NukeSped.794a34c5 Avast: Win32:Malware-gen Endgame: malicious (high confidence) Sophos: Mal/Generic-S F-Secure: Trojan.TR/NukeSped.iynke DrWeb: Trojan.HiddenCobra.1 Invincea: heuristic McAfee-GW-Edition: Trojan-FPIA!38FC56965DCC Trapmine: malicious.high.ml.score FireEye: Generic.mg.38fc56965dccd18f Emsisoft: Gen:Variant.Graftor.487501 (B) Cyren: W32/Trojan.ACES-2943 Avira: TR/NukeSped.iynke Antiy-AVL: Trojan/Win32.AGeneric Microsoft: Trojan:Win32/Casdet!rfn AegisLab: Trojan.Win32.Generic.4!c ZoneAlarm: HEUR:Trojan.Win32.Generic GData: Gen:Variant.Graftor.487501 ALYac: Trojan.Nukesped.A MAX: malware (ai score=100) Ad-Aware: Gen:Variant.Graftor.487501 TrendMicro-HouseCall: TROJ_FRS.0NA103I819 Ikarus: Trojan.Win32.NukeSped Fortinet: W32/Trojan.FPIA!tr AVG: Win32:Malware-gen Panda: Trj/CI.A CrowdStrike: win/malicious_confidence_100% (W) Qihoo-360: HEUR/QVM07.1.C157.Malware.Gen |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xf0 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 4 |
TimeDateStamp | 2017-Dec-12 17:58:45 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 6.0 |
SizeOfCode | 0x17000 |
SizeOfInitializedData | 0x9000 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00016F4F (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x18000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x1000 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x21000 |
SizeOfHeaders | 0x1000 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
GetProcAddress
LoadLibraryA GetModuleHandleW Sleep GetVolumeInformationW Module32FirstW CreateToolhelp32Snapshot FileTimeToLocalFileTime GetTickCount GetSystemInfo GetVersionExW WideCharToMultiByte GetACP lstrlenW GetModuleHandleA GetStartupInfoA |
---|---|
USER32.dll |
GetSystemMetrics
|
SHLWAPI.dll |
wnsprintfW
|
MSVCRT.dll |
memset
memmove memcmp malloc free strstr sscanf strlen localtime time __dllonexit _onexit _exit _XcptFilter exit _acmdln __getmainargs _initterm __setusermatherr _adjust_fdiv __p__commode __p__fmode __set_app_type _except_handler3 _controlfp memcpy wcstombs wcsrchr __CxxFrameHandler srand rand wcsncpy swprintf _wtoi wcscat _waccess wcscpy wcslen strncmp ??3@YAXPAX@Z |
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 10.0.10586.0 |
ProductVersion | 10.0.10586.0 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | Korean - Korea |
Comments | |
CompanyName | Microsoft Corporation |
FileDescription | Windows Remote Assistance SD Server |
FileVersion (#2) | 10.0.10586.0 (th2_release.151029-1700) |
InternalName | sdchange.exe |
LegalCopyright | Microsoft Windows Operating System |
LegalTrademarks | |
OriginalFilename | sdchange.exe.mui |
PrivateBuild | |
ProductName | Microsoft Windows Operating System |
ProductVersion (#2) | 10.0.10586.0 |
SpecialBuild |
Resource LangID | Korean - Korea |
---|
XOR Key | 0x3567593c |
---|---|
Unmarked objects | 0 |
14 (7299) | 5 |
Linker (VS98 build 8168) | 2 |
12 (7291) | 2 |
C objects (VS98 build 8168) | 25 |
Imports (VS2003 (.NET) build 4035) | 7 |
Total imports | 111 |
C++ objects (VS98 build 8168) | 10 |
Resource objects (VS98 cvtres build 1720) | 1 |