| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2016-Sep-03 10:28:04 |
| TLS Callbacks | 2 callback(s) detected. |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to AES
Microsoft's Cryptography API |
| Info | The PE contains common functions which appear in legitimate applications. |
Uses Microsoft's cryptographic API:
|
| Malicious | VirusTotal score: 38/70 (Scanned on 2023-04-17 21:15:39) |
Lionic:
Hacktool.Win32.KMSAuto.3!c
MicroWorld-eScan: Application.Hacktool.KMSAuto.BP CAT-QuickHeal: Hacktool.Hacktool McAfee: GenericRXPA-ZN!CC470D06E9AF Malwarebytes: HackTool.AutoKMS Zillya: Tool.KMSAuto.Win32.1562 Sangfor: Hacktool.Win32.KMSAuto.V1dn K7GW: Unwanted-Program ( 0055fea61 ) K7AntiVirus: Unwanted-Program ( 0055fea61 ) ESET-NOD32: Win32/HackKMS.AQ potentially unsafe Kaspersky: HEUR:HackTool.Win32.KMSAuto.gen BitDefender: Application.Hacktool.KMSAuto.BP NANO-Antivirus: Riskware.Win32.KMSAuto.inferm Avast: FileRepPup [PUP] Emsisoft: Application.Hacktool.KMSAuto.BP (B) VIPRE: Application.Hacktool.KMSAuto.BP TrendMicro: HackTool.Win32.AutoKMS.AUSZP McAfee-GW-Edition: GenericRXPA-ZN!CC470D06E9AF FireEye: Application.Hacktool.KMSAuto.BP Sophos: Generic Reputation PUA (PUA) GData: Application.Hacktool.KMSAuto.BP Jiangmin: HackTool.KMSAuto.ga Webroot: W32.Hacktool.Kms Antiy-AVL: HackTool/Win32.KMSAuto Gridinsoft: Hack.Win32.HackKMS.vb Xcitium: Malware@#wl6k05o3bayb Arcabit: Application.Hacktool.KMSAuto.BP ZoneAlarm: HEUR:HackTool.Win32.KMSAuto.gen AhnLab-V3: Unwanted/Win.KMSAuto.C5385382 ALYac: Application.Hacktool.KMSAuto.BP MAX: malware (ai score=100) Cylance: unsafe TrendMicro-HouseCall: HackTool.Win32.AutoKMS.AUSZP Rising: PUA.HackKMS!8.185 (CLOUD) Ikarus: PUA.HackKMS MaxSecure: Trojan.Malware.74832183.susgen AVG: FileRepPup [PUP] DeepInstinct: MALICIOUS |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 8 |
| TimeDateStamp | 2016-Sep-03 10:28:04 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 2.0 |
| SizeOfCode | 0x7400 |
| SizeOfInitializedData | 0xe400 |
| SizeOfUninitializedData | 0x600 |
| AddressOfEntryPoint | 0x000014E0 (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x9000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 1.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x15000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x1bae0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x200000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| ADVAPI32.dll |
CryptAcquireContextW
CryptCreateHash CryptDestroyHash CryptDestroyKey CryptGetHashParam CryptHashData CryptImportKey CryptSetHashParam |
|---|---|
| DNSAPI.DLL |
DnsQuery_UTF8
DnsRecordListFree |
| KERNEL32.dll |
DeleteCriticalSection
EnterCriticalSection FormatMessageA GetComputerNameExA GetConsoleScreenBufferInfo GetCurrentProcess GetCurrentProcessId GetCurrentThreadId GetLastError GetModuleHandleA GetProcAddress GetStartupInfoA GetStdHandle GetSystemTimeAsFileTime GetTickCount GetTimeZoneInformation InitializeCriticalSection LeaveCriticalSection QueryPerformanceCounter SetUnhandledExceptionFilter Sleep TerminateProcess TlsGetValue UnhandledExceptionFilter VirtualProtect VirtualQuery |
| msvcrt.dll |
__argv
__dllonexit __getmainargs __initenv _cexit __lconv_init __set_app_type __setusermatherr _acmdln _amsg_exit _errno _fmode _initterm _iob _lock _onexit _setjmp3 _stat _stricmp _strnicmp _unlink _unlock _vsnprintf time localtime gmtime isupper abort calloc exit fclose ferror fflush fgets fopen fprintf fputc fputs free fwrite getenv islower isspace longjmp malloc memcmp memcpy memmove printf putchar puts qsort rand rename signal sprintf srand strcat strchr strcmp strcpy strerror strftime strlen strncat strncmp strncpy strrchr strtol toupper vfprintf |
| RPCRT4.dll |
NdrClientCall2
RpcBindingFree RpcBindingFromStringBindingA RpcStringBindingComposeA RpcStringFreeA |
| StartAddressOfRawData | 0x413000 |
|---|---|
| EndAddressOfRawData | 0x41301c |
| AddressOfIndex | 0x4103d0 |
| AddressOfCallbacks | 0x412020 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_TYPE_REG
|
| Callbacks |
0x004018B0
0x00401860 |
No comments yet.