Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2008-Oct-22 16:47:10 |
Detected languages |
English - United States
|
Suspicious | The PE contains functions most legitimate programs don't use. |
Manipulates other processes:
|
Info | The PE's resources present abnormal characteristics. | Resource ncekmmqb is possibly compressed or encrypted. |
Malicious | VirusTotal score: 33/41 (Scanned on 2009-04-29 16:45:50) |
McAfee+Artemis:
DNSChanger.gen
nProtect: Trojan/W32.DNSChanger.69120.E CAT-QuickHeal: Trojan.DNSChanger.kpx McAfee: DNSChanger.gen K7AntiVirus: Trojan.Win32.Malware.1 VirusBuster: Trojan.FakeAlert.Gen!Pac.2 NOD32: a variant of Win32/TrojanDownloader.Zlob.BXN F-Prot: W32/FakeAlert.3!Maximus Symantec: Packed.Generic.200 Norman: W32/FakeAlert.ADC Avast: Win32:Fasec eSafe: Suspicious File Kaspersky: Trojan.Win32.DNSChanger.kpx BitDefender: MemScan:Trojan.Agent.AKUL F-Secure: Trojan.Win32.DNSChanger.kpx DrWeb: Trojan.Packed.365 NOD32Beta: a variant of Win32/TrojanDownloader.Zlob.BXN AntiVir: TR/Dropper.Gen McAfee-GW-Edition: Trojan.Dropper.Gen Sophos: Troj/DNSChan-MN eTrust-Vet: Win32/Alureon.TL Authentium: W32/FakeAlert.3!Maximus Prevx1: High Risk Fraudulent Security Program a-squared: Trojan.TDss.1!IK Microsoft: Trojan:Win32/Alureon.gen GData: MemScan:Trojan.Agent.AKUL AhnLab-V3: Win-Trojan/Fakeav.69120.F VBA32: Trojan.Win32.DNSChanger.kpx Sunbelt: Trojan.FakeAV.1.Gen Ikarus: Trojan.TDss.1 Fortinet: W32/DNSChanger!tr AVG: Generic12.BGV Panda: Malicious Packer |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 5 |
TimeDateStamp | 2008-Oct-22 16:47:10 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 6.0 |
SizeOfCode | 0x13600 |
SizeOfInitializedData | 0x1c00 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x000016A8 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x15000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x2b000 |
SizeOfHeaders | 0x400 |
Checksum | 0x20a73 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
SizeofStackReserve | 0x10000 |
SizeofStackCommit | 0x10000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
kernel32.dll |
ReadProcessMemory
SetConsoleMaximumWindowSize VerifyConsoleIoHandle PeekNamedPipe GetNamedPipeHandleStateA ConnectNamedPipe SetConsoleOS2OemFormat TryEnterCriticalSection GetCommandLineA ExitProcess GetStartupInfoA |
---|---|
user32.dll |
RegisterDeviceNotificationA
PostQuitMessage ScrollWindow PostQuitMessage |
gdi32.dll |
GdiSetPixelFormat
GdiEntry1 EngGetDriverName CreatePolyPolygonRgn EnumFontFamiliesA GetEnhMetaFileHeader cGetTTFFromFOT SetBrushOrgEx ColorMatchToTarget GdiConvertDC RemoveFontResourceExA PlayMetaFileRecord PolyBezierTo ScaleViewportExtEx InvertRgn GdiAddGlsBounds EngTransparentBlt EnumFontsA GdiGetSpoolFileHandle IntersectClipRect |
Ordinal | 1 |
---|---|
Address | 0x1566 |