| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1970-Jan-01 00:00:00 |
| Suspicious | PEiD Signature: |
UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser
UPX -> www.upx.sourceforge.net UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser UPX 2.00-3.0X -> Markus Oberhumer & Laszlo Molnar & John Reiser |
| Suspicious | The PE is packed with UPX |
Unusual section name found: UPX0
Section UPX0 is both writable and executable. Unusual section name found: UPX1 Section UPX1 is both writable and executable. Unusual section name found: UPX2 The PE only has 4 import(s). |
| Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 26/54 (Scanned on 2026-02-21 09:25:28) |
APEX:
Malicious
AhnLab-V3: Trojan/Win.Lazy.R740239 Bkav: W32.AIDetectMalware CrowdStrike: win/malicious_confidence_100% (D) Cylance: Unsafe Cynet: Malicious (score: 100) DrWeb: Trojan.PWS.Salat.332 ESET-NOD32: WinGo/Agent_AGen.OW trojan Elastic: malicious (moderate confidence) Google: Detected Ikarus: Trojan.WinGo.Agent K7AntiVirus: Trojan ( 005ce1d91 ) K7GW: Trojan ( 005ce1d91 ) Kingsoft: malware.kb.b.787 Malwarebytes: Trojan.Injector.UPX McAfeeD: Real Protect-LS!704F0C9C0AC4 Microsoft: Trojan:Win32/Wacatac.B!ml SentinelOne: Static AI - Malicious PE Sophos: Troj/Salat-B Tencent: Trojan.Win32.Stealer.16001830 Trapmine: malicious.high.ml.score VBA32: BScope.TrojanDownloader.Ajent Varist: W32/Agent.KKL.gen!Eldorado Webroot: W32.Trojan.Gen ZoneAlarm: Troj/Salat-B huorong: Trojan/Agent.e!crit |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0x8b |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| PointerToSymbolTable | 0xb21600 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 3.0 |
| SizeOfCode | 0x325000 |
| SizeOfInitializedData | 0x1000 |
| SizeOfUninitializedData | 0x867000 |
| AddressOfEntryPoint | 0x00B8BF30 (Section: UPX1) |
| BaseOfCode | 0x868000 |
| BaseOfData | 0xb8d000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.1 |
| ImageVersion | 1.0 |
| SubsystemVersion | 6.1 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xb8e000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.DLL |
LoadLibraryA
ExitProcess GetProcAddress VirtualProtect |
|---|