Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2018-Jan-30 03:57:38 |
Detected languages |
English - United States
|
Info | Interesting strings found in the binary: |
Contains domain names:
|
Suspicious | The PE is an NSIS installer | Unusual section name found: .ndata |
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Suspicious | The file contains overlay data. |
985846 bytes of data starting at offset 0x2a800.
The overlay data has an entropy of 7.84308 and is possibly compressed or encrypted. Overlay data amounts for 84.9921% of the executable. |
Malicious | VirusTotal score: 49/67 (Scanned on 2022-01-18 20:50:22) |
Lionic:
Riskware.Win32.Malicious.1!c
Elastic: malicious (high confidence) Cynet: Malicious (score: 100) CAT-QuickHeal: Trojan.Keygen ALYac: Application.Generic.3093812 Cylance: Unsafe VIPRE: Trojan.Win32.Generic!BT Sangfor: PUP.Win32.Keygen.mt K7AntiVirus: Unwanted-Program ( 0052f55b1 ) BitDefender: Application.Generic.3093812 K7GW: Unwanted-Program ( 0052f55b1 ) CrowdStrike: win/malicious_confidence_70% (D) Cyren: W32/Trojan.EGVA-6075 ESET-NOD32: Win32/Keygen.ACE potentially unsafe APEX: Malicious Paloalto: generic.ml ClamAV: Win.Malware.Score-6997747-0 MicroWorld-eScan: Application.Generic.3093812 Avast: Win32:Malware-gen Ad-Aware: Application.Generic.3093812 Sophos: Generic PUA CK (PUA) Comodo: Malware@#1xonnageqvj72 DrWeb: Trojan.Siggen8.9905 Zillya: Backdoor.Tofsee.Win32.1885 TrendMicro: TROJ_GEN.F0CBC0UCB21 McAfee-GW-Edition: BehavesLike.Win32.Exploit.tc FireEye: Generic.mg.5137f6c1b6fec54e Emsisoft: Application.Generic.3093812 (B) Ikarus: not-a-virus:Keygen.Ableton GData: Application.Generic.3093812 Webroot: W32.Adware.Gen Antiy-AVL: Trojan/Generic.ASMalwS.30F9C3B Gridinsoft: PUP.Win32.Keygen.oa Arcabit: Application.Generic.D2F3534 SUPERAntiSpyware: Hack.Tool/Gen-KeyGen Microsoft: PUA:Win32/Keygen AhnLab-V3: Unwanted/Win32.KeyGen.C2198504 McAfee: Artemis!5137F6C1B6FE MAX: malware (ai score=100) VBA32: BScope.Trojan.OutBrowse Malwarebytes: CrackTool.Agent.Keygen TrendMicro-HouseCall: TROJ_GEN.F0CBC0UCB21 Yandex: Trojan.Igent.bVSWxy.2 SentinelOne: Static AI - Suspicious PE Fortinet: Riskware/Generic_PUA_CK BitDefenderTheta: Gen:NN.ZedlaF.34160.Rq4@a8IcBkk AVG: Win32:Malware-gen Cybereason: malicious.1b6fec Panda: Trj/CI.A |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xd8 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 5 |
TimeDateStamp | 2018-Jan-30 03:57:38 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 6.0 |
SizeOfCode | 0x6200 |
SizeOfInitializedData | 0x1d000 |
SizeOfUninitializedData | 0x400 |
AddressOfEntryPoint | 0x00003328 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x8000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 6.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x50000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
SetEnvironmentVariableA
CreateFileA GetFileSize GetModuleFileNameA ReadFile GetCurrentProcess CopyFileA Sleep GetTickCount GetWindowsDirectoryA GetTempPathA GetCommandLineA lstrlenA GetVersion SetErrorMode lstrcpynA ExitProcess SetCurrentDirectoryA GlobalLock CreateThread GetLastError CreateDirectoryA CreateProcessA RemoveDirectoryA GetTempFileNameA WriteFile lstrcpyA MoveFileExA lstrcatA GetSystemDirectoryA GetProcAddress GetExitCodeProcess WaitForSingleObject CompareFileTime SetFileAttributesA GetFileAttributesA GetShortPathNameA MoveFileA GetFullPathNameA SetFileTime SearchPathA CloseHandle lstrcmpiA GlobalUnlock GetDiskFreeSpaceA lstrcmpA FindFirstFileA FindNextFileA DeleteFileA SetFilePointer GetPrivateProfileStringA FindClose MultiByteToWideChar FreeLibrary MulDiv WritePrivateProfileStringA LoadLibraryExA GetModuleHandleA GlobalAlloc GlobalFree ExpandEnvironmentStringsA |
---|---|
USER32.dll |
ScreenToClient
GetSystemMenu SetClassLongA IsWindowEnabled SetWindowPos GetSysColor GetWindowLongA SetCursor LoadCursorA CheckDlgButton GetMessagePos LoadBitmapA CallWindowProcA IsWindowVisible CloseClipboard SetClipboardData EmptyClipboard PostQuitMessage GetWindowRect EnableMenuItem CreatePopupMenu GetSystemMetrics SetDlgItemTextA GetDlgItemTextA MessageBoxIndirectA CharPrevA DispatchMessageA PeekMessageA ReleaseDC EnableWindow InvalidateRect SendMessageA DefWindowProcA BeginPaint GetClientRect FillRect DrawTextA EndDialog RegisterClassA SystemParametersInfoA CreateWindowExA GetClassInfoA DialogBoxParamA CharNextA ExitWindowsEx GetDC CreateDialogParamA SetTimer GetDlgItem SetWindowLongA SetForegroundWindow LoadImageA IsWindow SendMessageTimeoutA FindWindowExA OpenClipboard TrackPopupMenu AppendMenuA EndPaint DestroyWindow wsprintfA ShowWindow SetWindowTextA |
GDI32.dll |
SelectObject
SetBkMode CreateFontIndirectA SetTextColor DeleteObject GetDeviceCaps CreateBrushIndirect SetBkColor |
SHELL32.dll |
SHGetSpecialFolderLocation
ShellExecuteExA SHGetPathFromIDListA SHBrowseForFolderA SHGetFileInfoA SHFileOperationA |
ADVAPI32.dll |
AdjustTokenPrivileges
RegCreateKeyExA RegOpenKeyExA SetFileSecurityA OpenProcessToken LookupPrivilegeValueA RegEnumValueA RegDeleteKeyA RegDeleteValueA RegCloseKey RegSetValueExA RegQueryValueExA RegEnumKeyA |
COMCTL32.dll |
ImageList_Create
ImageList_AddMasked ImageList_Destroy #17 |
ole32.dll |
OleUninitialize
OleInitialize CoTaskMemFree CoCreateInstance |
XOR Key | 0xd246d0e9 |
---|---|
Unmarked objects | 0 |
C objects (VS2003 (.NET) build 4035) | 2 |
Total imports | 159 |
Imports (VS2003 (.NET) build 4035) | 15 |
48 (9044) | 10 |
Resource objects (VS98 SP6 cvtres build 1736) | 1 |