| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1970-Jan-01 00:00:00 |
| Debug artifacts |
Embedded COFF debugging symbols
|
| Suspicious | PEiD Signature: | HQR data file |
| Suspicious | The PE is possibly packed. |
Unusual section name found: .xdata
Unusual section name found: .symtab |
| Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
| Info | The PE is digitally signed. |
Signer: *.rottentomatoes.com
Issuer: DigiCert Global G3 TLS ECC SHA384 2020 CA1 |
| Malicious | VirusTotal score: 15/70 (Scanned on 2026-05-02 15:16:50) |
AVG:
FileRepMalware [Trj]
AhnLab-V3: Trojan/Win.Evo-gen.R771208 Avast: FileRepMalware [Trj] Bkav: W64.AIDetectMalware CrowdStrike: win/malicious_confidence_70% (D) Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS ESET-NOD32: a variant of Win64/GenKryptik_AGen.CKZ Elastic: malicious (high confidence) Kaspersky: UDS:Trojan.Win64.Agent Kingsoft: Win64.Trojan.Agent.a Malwarebytes: Trojan.Dropper.DMSI Microsoft: Trojan:Win32/Wacatac.B!ml Rising: Malware.Undefined!8.C (TFE:dGZlOin9nJf0VCQrrw) Symantec: ML.Attribute.HighConfidence |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0x8b |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 8 |
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| PointerToSymbolTable | 0x302e00 |
| NumberOfSymbols | 2449 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 3.0 |
| SizeOfCode | 0x140c00 |
| SizeOfInitializedData | 0x7200 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000006C400 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.1 |
| ImageVersion | 1.0 |
| SubsystemVersion | 6.1 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x36b000 |
| SizeOfHeaders | 0x600 |
| Checksum | 0x32270a |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x200000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| kernel32.dll |
WriteFile
WriteConsoleW WerSetFlags WerGetFlags WaitForMultipleObjects WaitForSingleObject VirtualQuery VirtualFree VirtualAlloc TlsAlloc SwitchToThread SuspendThread SetWaitableTimer SetProcessPriorityBoost SetEvent SetErrorMode SetConsoleCtrlHandler RtlVirtualUnwind RtlLookupFunctionEntry ResumeThread RaiseFailFastException PostQueuedCompletionStatus LoadLibraryW LoadLibraryExW SetThreadContext GetThreadContext GetSystemInfo GetSystemDirectoryA GetStdHandle GetQueuedCompletionStatusEx GetProcessAffinityMask GetProcAddress GetErrorMode GetEnvironmentStringsW GetCurrentThreadId GetConsoleMode FreeEnvironmentStringsW ExitProcess DuplicateHandle CreateWaitableTimerExW CreateThread CreateIoCompletionPort CreateEventA CloseHandle AddVectoredExceptionHandler AddVectoredContinueHandler |
|---|
No comments yet.