5a47100424e87547abb95c80227874ad77699f523c87cf3b064c4e135967caa3

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2091-Jun-12 07:30:58
Comments
CompanyName
FileDescription Client
FileVersion 1.0.0.0
InternalName Client.exe
LegalCopyright Copyright © 2026
LegalTrademarks
OriginalFilename Client.exe
ProductName Client
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Suspicious Strings found in the binary may indicate undesirable behavior: Contains references to system / monitoring tools:
  • schtask
May have dropper capabilities:
  • CurrentVersion\Run
Contains domain names:
  • https://t.me
Malicious VirusTotal score: 39/72 (Scanned on 2026-04-15 16:04:03) ALYac: Gen:Variant.Application.Strictor.240530
APEX: Malicious
AVG: MalwareX-gen [Trj]
AhnLab-V3: Trojan/Win.Generic.C5864478
Antiy-AVL: Trojan/MSIL.AsyncRAT
Arcabit: Trojan.Application.Strictor.D3AB92
Avast: MalwareX-gen [Trj]
BitDefender: Gen:Variant.Application.Strictor.240530
CTX: exe.unknown.strictor
CrowdStrike: win/malicious_confidence_90% (D)
Cylance: Unsafe
DeepInstinct: MALICIOUS
DrWeb: Trojan.DownLoader49.34723
ESET-NOD32: MSIL/Agent.FQI trojan
Elastic: malicious (high confidence)
Emsisoft: Gen:Variant.Application.Strictor.240530 (B)
Fortinet: MSIL/Agent.FQI!tr
GData: Gen:Variant.Application.Strictor.240530
Google: Detected
Ikarus: Trojan-Spy.StormKitty
K7AntiVirus: Trojan ( 700000201 )
K7GW: Trojan ( 700000201 )
Kaspersky: HEUR:Trojan.MSIL.Agent.gen
Malwarebytes: Malware.AI.3906453076
McAfeeD: Real Protect-LS!31F9649A49BE
MicroWorld-eScan: Gen:Variant.Application.Strictor.240530
Microsoft: Trojan:MSIL/AsyncRAT!atmn
Panda: Trj/GdSda.A
Sangfor: Suspicious.Win32.Save.a
SentinelOne: Static AI - Malicious PE
Sophos: Troj/MSIL-TKP
Symantec: ML.Attribute.HighConfidence
Tencent: Backdoor.Msil.DcRat.16003533
TrendMicro-HouseCall: Trojan.Win32.VSX.PE04C9z
VIPRE: Gen:Variant.Application.Strictor.240530
Varist: W32/MSIL_Agent.KXB.gen!Eldorado
VirIT: Trojan.Win32.MSIL_Heur.A
ZoneAlarm: Troj/MSIL-TKP
huorong: Backdoor/MSIL.DcRat.a

Hashes

MD5 31f9649a49be6d3af9ed8f5db1778db0
SHA1 e82dad746b5483f4d0144562058695e9138caeaa
SHA256 5a47100424e87547abb95c80227874ad77699f523c87cf3b064c4e135967caa3
SHA3 95d070efbc84c60170dc2124e05d543abd9c4cce244a22687382801323b20c08
SSDeep 12288:P4TR3374rIkzE7tnXknXQaBFJi4RkTAJ0MK86WoLb66OPfD9piIoEX3X3uO:eL4kkA7lXkXDDuAOFhWSApiE3X3N
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 2091-Jun-12 07:30:58
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32
LinkerVersion 48.0
SizeOfCode 0x93600
SizeOfInitializedData 0x29e00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0009556E (Section: .text)
BaseOfCode 0x2000
BaseOfData 0x96000
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xc2000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 1c115b7eb1cdeae5a23f6a4206048e57
SHA1 579141c848761b64c6999d78f93c4dd37c6b1a2c
SHA256 b98356938f64846bcaf109d41e1acf106183ef7c28bbdd6c4d97dc421307f92e
SHA3 9f1c32a7ef6331b6d6f5c7b5a4bf3ee7bcf6c1eba50e6a09934c743f11ab25ae
VirtualSize 0x93574
VirtualAddress 0x2000
SizeOfRawData 0x93600
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.91433

.rsrc

MD5 42242e9b75876635bcb4cada1ba7b033
SHA1 6066d3bb0cf53dd35733f2da2d0a655e81bcd4fe
SHA256 cfefb29b268bb4942dd97bd1fa2fa124460bf6f127441bff53b118369fea697d
SHA3 7eefea4fba48f4bf660c1148126449e6964aa70983e5d4503cda8158b6ed9515
VirtualSize 0x29a08
VirtualAddress 0x96000
SizeOfRawData 0x29c00
PointerToRawData 0x93800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 7.09562

.reloc

MD5 d954f79655bf2ad494b3327649e29961
SHA1 a2d45f91c297c67eecfc2a1768ec8551befcbb71
SHA256 b8418fb46cb2dea9d0cfff3adb2a205d677f8b2e4ddbef241666a64e7f8d0188
SHA3 bff9226917955742d49cabefbcb85f20024191581a4a88ffd4e1d681d3590502
VirtualSize 0xc
VirtualAddress 0xc0000
SizeOfRawData 0x200
PointerToRawData 0xbd400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.10191

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10d8b
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 7.99352
Detected Filetype PNG graphic file
MD5 b0568908ac8c5861e6f7df216a8b42a8
SHA1 f988edfa2e2298ca3b55d2cde5209552feadc608
SHA256 4d830c2921ca9d1408dd409571f74a072c9bfb473f7d03bfb1a83a79ec1d9a63
SHA3 697b696a72540c2412b0cdba93b497488df067a4c1ed8d1444f8ab277989772b

2

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10828
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.01747
MD5 a6ed339e3c78a7b070d3e7ed72fd9442
SHA1 e13a9c271d1da2415b3852b579f420daeb2d1a03
SHA256 75d7ccc6693173789fd513b9d6dbb305e167db94fa61b8dcc99ce9a4cb1b20cf
SHA3 f3b79c090a16dad5d5b76192504cff67d9a5451f673c6fd66938462431197ead

3

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x4228
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.14075
MD5 50fedfc331bad2dd7aecfb1661042fe1
SHA1 1185074e3a824dd0c55e0565648b6665f086473a
SHA256 d0a936ea4ce6f0f0c721a548cd339eacbfccb45c93a9eb0a580b48481c975920
SHA3 4974cfb787dc39e7b731c845bf7287f62948bdc943490fd04b56a2528342fd8d

4

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.12104
MD5 5ac02b41d6723cddb061809bf6b25103
SHA1 46896d57a7c86d6b1e89dd5ee6e852f7b3a42edc
SHA256 a95eb4b47b413f1432d58984ecdcef8336b12da44f4a08ede61f8fabb4c210b2
SHA3 31dfe633b905dd831cd17cb227df2128dd4b4c21d9666f8968e934241378e660

5

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.23602
MD5 83e90441e8fc948782cdf338ba8994ae
SHA1 9444b66e694f54c88b051e12155d56b312955459
SHA256 359bc075aaf7bd1b552fdf0c58503c64ac288a8008e4076764274b6642138c73
SHA3 4d25e8479722cd6ce9f46b52ddaf7d58fad122a1a9a2fe98c2445bdc55584bf9

6

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.05052
MD5 82de52db2a195f71e4bcda03452239ee
SHA1 3e010b0d87d2f99e287c6e238ca5a0031c3d1206
SHA256 8e1f8c5a101c9676207b43e0a9e868c9cca2f9a6df9fc5a8a34aacad991f26d8
SHA3 446622efb69c3d40bf0974c5a6088ac39e42ed2c41b95bd60b3194b45c878372

1 (#2)

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x5a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.39721
Detected Filetype Icon file
MD5 ed82c7f8a9d1b96099043c44ca5195f0
SHA1 648a6cc70ca3b0205d514ae45aadfc50061a1c62
SHA256 d783e6e3cb6122235b314475ffdc9d749e60113f75622f99ff871d9843656a3f
SHA3 8a4ee1707bd450994358e771265d43f7959939a710544f8e53197b5b7321ca58

1 (#3)

Type RT_VERSION
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x30c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.21061
MD5 1103acfef56df3a9dca07821259426bf
SHA1 e70d77b24a4318e56fae7a447aef22ea1290946d
SHA256 5fbaf3e8bdf15de5429596d0974b729a17de04aa5cb0441581cb4233705816eb
SHA3 213cce4895ef9fca32de338bbbe0ee05bee2d712cbfd981a952a8ea7fbb075e8

1 (#4)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.0.0.0
ProductVersion 1.0.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments
CompanyName
FileDescription Client
FileVersion (#2) 1.0.0.0
InternalName Client.exe
LegalCopyright Copyright © 2026
LegalTrademarks
OriginalFilename Client.exe
ProductName Client
ProductVersion (#2) 1.0.0.0
Assembly Version 1.0.0.0
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

Leave a comment

No comments yet.