| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2073-Feb-26 10:07:54 |
| Debug artifacts |
C:\Users\j0k3r\Downloads\Compressed\Crypto CLipper\Clipper\obj\Release\Clipper.pdb
|
| Comments | |
| CompanyName | |
| FileDescription | Host Process for Windows Services |
| FileVersion | 1.0.0.0 |
| InternalName | svchost.exe |
| LegalCopyright | |
| LegalTrademarks | |
| OriginalFilename | svchost.exe |
| ProductName | svchost |
| ProductVersion | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Info | Matching compiler(s): | Microsoft Visual C# v7.0 / Basic .NET |
| Malicious | VirusTotal score: 55/70 (Scanned on 2024-04-08 13:21:36) |
ALYac:
IL:Trojan.MSILZilla.14161
AVG: Win32:BankerX-gen [Trj] AhnLab-V3: Malware/Win32.RL_Generic.C4147215 Alibaba: TrojanBanker:MSIL/ClipBanker.93d899a7 Arcabit: IL:Trojan.MSILZilla.D3751 Avast: Win32:BankerX-gen [Trj] Avira: TR/YAV.Minerva.zbyba BitDefender: IL:Trojan.MSILZilla.14161 BitDefenderTheta: Gen:NN.ZemsilF.36802.am0@aqDwjpd Bkav: W32.AIDetectMalware.CS CAT-QuickHeal: Trojan.YakbeexMSIL.ZZ4 ClamAV: Win.Packed.Clipbanker-9949487-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: unsafe DeepInstinct: MALICIOUS DrWeb: Trojan.ClipBankerNET.27 ESET-NOD32: a variant of MSIL/ClipBanker.PW Elastic: malicious (high confidence) Emsisoft: IL:Trojan.MSILZilla.14161 (B) F-Secure: Trojan.TR/YAV.Minerva.zbyba FireEye: Generic.mg.f83c1904404d2b40 Fortinet: MSIL/ClipBanker.PW!tr GData: IL:Trojan.MSILZilla.14161 Google: Detected Gridinsoft: Trojan.Win32.Gen.sd!n Ikarus: Trojan.MSIL.ClipBanker Jiangmin: Trojan.Banker.MSIL.hpn K7AntiVirus: Trojan ( 00517fbc1 ) K7GW: Trojan ( 00517fbc1 ) Kaspersky: HEUR:Trojan-Banker.MSIL.ClipBanker.gen Kingsoft: MSIL.Trojan-Banker.ClipBanker.gen Lionic: Trojan.Win32.ClipBanker.Z!c MAX: malware (ai score=100) Malwarebytes: Malware.AI.3361548761 MaxSecure: Trojan.Malware.73489558.susgen McAfee: GenericRXVK-YB!F83C1904404D MicroWorld-eScan: IL:Trojan.MSILZilla.14161 Microsoft: Trojan:MSIL/ClipBanker.AI!MTB NANO-Antivirus: Trojan.Win32.YAV.katipc Panda: Trj/Chgt.AD Rising: Spyware.ClipBanker!1.D05B (CLASSIC) Sangfor: Trojan.Win32.Save.a SentinelOne: Static AI - Malicious PE Skyhigh: GenericRXVK-YB!F83C1904404D Sophos: Mal/ClipBank-A Symantec: ML.Attribute.HighConfidence Tencent: Malware.Win32.Gencirc.13ef84f9 TrendMicro: TROJ_GEN.R002C0DIE23 TrendMicro-HouseCall: TROJ_GEN.R002C0DIE23 VBA32: TScope.Trojan.MSIL Varist: W32/Trojan.HJT.gen!Eldorado Yandex: Trojan.ClipBanker!UpJY1jWK1KU Zillya: Trojan.ClipBanker.Win32.20042 ZoneAlarm: HEUR:Trojan-Banker.MSIL.ClipBanker.gen alibabacloud: HackTool:Win/SuperClipper.BZ |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2073-Feb-26 10:07:54 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 48.0 |
| SizeOfCode | 0x1c00 |
| SizeOfInitializedData | 0x800 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00003A76 (Section: .text) |
| BaseOfCode | 0x2000 |
| BaseOfData | 0x4000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x8000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0xdebf |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| mscoree.dll |
_CorExeMain
|
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| Comments | |
| CompanyName | |
| FileDescription | Host Process for Windows Services |
| FileVersion (#2) | 1.0.0.0 |
| InternalName | svchost.exe |
| LegalCopyright | |
| LegalTrademarks | |
| OriginalFilename | svchost.exe |
| ProductName | svchost |
| ProductVersion (#2) | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2103-May-28 13:19:20 |
| Version | 0.0 |
| SizeofData | 107 |
| AddressOfRawData | 0x39b8 |
| PointerToRawData | 0x1bb8 |
| Referenced File | C:\Users\j0k3r\Downloads\Compressed\Crypto CLipper\Clipper\obj\Release\Clipper.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
No comments yet.