Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2019-Jul-09 14:23:33 |
Detected languages |
English - United States
|
CompanyName | Net Framework Svc |
ProductName | Net Framework Svc Service |
ProductVersion | 2, 0, 4, 21 |
InternalName | NetFrameworkSvc.exe |
OriginalFilename | NetFrameworkSvc.exe |
FileVersion | 2, 0, 4, 21 |
FileDescription | Net Framework Svc Service Loader |
LegalCopyright | Net Framework Svc |
LegalTrademarks | Net Framework Svc INC |
Info | Matching compiler(s): | Microsoft Visual C++ 6.0 - 8.0 |
Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
Suspicious | The PE contains functions most legitimate programs don't use. |
[!] The program may be hiding some of its imports:
|
Suspicious | The file contains overlay data. |
1633465 bytes of data starting at offset 0x3d800.
The overlay data has an entropy of 7.99967 and is possibly compressed or encrypted. Overlay data amounts for 86.639% of the executable. |
Malicious | VirusTotal score: 53/71 (Scanned on 2025-02-03 15:45:34) |
ALYac:
Trojan.Autoruns.GenericKD.41938141
APEX: Malicious AVG: Win32:Trojan-gen AhnLab-V3: Malware/Win32.Generic.C3460484 Alibaba: Trojan:Win32/DefenseEvasion.305cc889 Arcabit: Trojan.Autoruns.Generic.D27FECDD Avast: Win32:Trojan-gen Avira: TR/Spy.Gen BitDefender: Trojan.Autoruns.GenericKD.41938141 Bkav: W32.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.17317545787958a8 CTX: exe.trojan.clipbanker CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS DrWeb: Python.ClipBanker.26 ESET-NOD32: Python/ClipBanker.E Elastic: malicious (high confidence) Emsisoft: Trojan.Autoruns.GenericKD.41938141 (B) F-Secure: Trojan.TR/Spy.Gen FireEye: Trojan.Autoruns.GenericKD.41938141 Fortinet: W32/ClipBanker.E!tr GData: Trojan.Autoruns.GenericKD.41938141 Google: Detected Ikarus: Trojan.Python.Clipbanker K7AntiVirus: Trojan ( 005281b21 ) K7GW: Trojan ( 005281b21 ) Kaspersky: Trojan.Win32.Scar.sokv Lionic: Trojan.Win32.ClipBanker.Z!c Malwarebytes: Neshta.Virus.FileInfector.DDS MaxSecure: Trojan.Malware.1728101.susgen McAfee: GenericR-QRZ!A4977A108504 McAfeeD: ti!EE0153AAEC5E MicroWorld-eScan: Trojan.Autoruns.GenericKD.41938141 Microsoft: Trojan:Win32/DefenseEvasion!rfn NANO-Antivirus: Trojan.Win32.Scar.fyqzbt Paloalto: generic.ml Panda: Trj/CI.A SUPERAntiSpyware: Trojan.Agent/Gen-Scar Skyhigh: BehavesLike.Win32.Dropper.tc Sophos: Mal/Generic-S Symantec: ML.Attribute.HighConfidence Tencent: Win32.Trojan.Scar.Fwnw TrendMicro: Trojan.Win32.CLIPBANKER.AC TrendMicro-HouseCall: Trojan.Win32.CLIPBANKER.AC VBA32: Trojan.Bitrep VIPRE: Trojan.Autoruns.GenericKD.41938141 Varist: W32/ABTrojan.QKHQ-2341 VirIT: Trojan.Win32.PSWStealer.QK Xcitium: Malware@#2r4enef8rw3pb Yandex: Trojan.Igent.bYOs3Q.3 alibabacloud: Trojan[spy]:Python/ClipBanker.E |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x108 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 6 |
TimeDateStamp | 2019-Jul-09 14:23:33 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32 |
---|---|
LinkerVersion | 14.0 |
SizeOfCode | 0x1ee00 |
SizeOfInitializedData | 0x1e600 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00007B43 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x20000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 5.1 |
ImageVersion | 0.0 |
SubsystemVersion | 5.1 |
Win32VersionValue | 0 |
SizeOfImage | 0x4f000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
USER32.dll |
MessageBoxW
MessageBoxA |
---|---|
KERNEL32.dll |
SystemTimeToTzSpecificLocalTime
DecodePointer GetLastError SetDllDirectoryW GetModuleFileNameW GetProcAddress GetCommandLineW GetEnvironmentVariableW SetEnvironmentVariableW ExpandEnvironmentStringsW GetTempPathW WaitForSingleObject Sleep GetExitCodeProcess CreateProcessW GetStartupInfoW LoadLibraryExW GetShortPathNameW FormatMessageW LoadLibraryA MultiByteToWideChar WideCharToMultiByte SetEndOfFile HeapReAlloc UnhandledExceptionFilter SetUnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent GetModuleHandleW RtlUnwind SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree FreeLibrary GetCommandLineA ReadFile CreateFileW GetDriveTypeW GetFileType CloseHandle PeekNamedPipe RaiseException FileTimeToSystemTime GetFullPathNameW GetFullPathNameA CreateDirectoryW RemoveDirectoryW FindClose FindFirstFileExW FindNextFileW SetStdHandle SetConsoleCtrlHandler DeleteFileW GetStdHandle WriteFile ExitProcess GetModuleHandleExW GetACP HeapFree HeapAlloc GetConsoleMode ReadConsoleW SetFilePointerEx GetConsoleCP CompareStringW LCMapStringW GetCurrentDirectoryW FlushFileBuffers SetEnvironmentVariableA GetFileAttributesExW IsValidCodePage GetOEMCP GetCPInfo GetEnvironmentStringsW FreeEnvironmentStringsW GetStringTypeW GetProcessHeap WriteConsoleW GetTimeZoneInformation HeapSize |
WS2_32.dll |
ntohl
|
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 1.0.14.1 |
ProductVersion | 1.0.14.1 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | English - United States |
CompanyName | Net Framework Svc |
ProductName | Net Framework Svc Service |
ProductVersion (#2) | 2, 0, 4, 21 |
InternalName | NetFrameworkSvc.exe |
OriginalFilename | NetFrameworkSvc.exe |
FileVersion (#2) | 2, 0, 4, 21 |
FileDescription | Net Framework Svc Service Loader |
LegalCopyright | Net Framework Svc |
LegalTrademarks | Net Framework Svc INC |
Resource LangID | UNKNOWN |
---|
Characteristics |
0
|
---|---|
TimeDateStamp | 2019-Jul-09 14:23:33 |
Version | 0.0 |
SizeofData | 696 |
AddressOfRawData | 0x29f3c |
PointerToRawData | 0x2913c |
Size | 0x5c |
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
GlobalFlagsClear | (EMPTY) |
GlobalFlagsSet | (EMPTY) |
CriticalSectionDefaultTimeout | 0 |
DeCommitFreeBlockThreshold | 0 |
DeCommitTotalFreeThreshold | 0 |
LockPrefixTable | 0 |
MaximumAllocationSize | 0 |
VirtualMemoryThreshold | 0 |
ProcessAffinityMask | 0 |
ProcessHeapFlags | (EMPTY) |
CSDVersion | 0 |
Reserved1 | 0 |
EditList | 0 |
SecurityCookie | 0x42c008 |
SEHandlerTable | 0x429f30 |
SEHandlerCount | 3 |
XOR Key | 0x906c598 |
---|---|
Unmarked objects | 0 |
241 (40116) | 12 |
243 (40116) | 172 |
242 (40116) | 24 |
ASM objects (VS2015 UPD3 build 24123) | 18 |
C++ objects (VS2015 UPD3 build 24123) | 29 |
C objects (VS2015 UPD3 build 24123) | 18 |
Imports (65501) | 7 |
Total imports | 115 |
C objects (VS2015 UPD3 build 24210) | 17 |
Resource objects (VS2015 UPD3 build 24210) | 1 |
Linker (VS2015 UPD3 build 24210) | 1 |