| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1992-Jun-19 22:22:17 |
| Suspicious | PEiD Signature: | PECompact v2.xx |
| Suspicious | The PE is possibly packed. |
Section CODE is both writable and executable.
Section .rsrc is both writable and executable. |
| Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
| Info | The PE's resources present abnormal characteristics. |
Resource MAIN is possibly compressed or encrypted.
Resource DATA is possibly compressed or encrypted. |
| Malicious | VirusTotal score: 39/72 (Scanned on 2026-04-20 16:12:25) |
APEX:
Malicious
AVG: Win32:MalwareX-gen [Misc] Antiy-AVL: HackTool/Win32.Patcher Avast: Win32:MalwareX-gen [Misc] Avira: TR/AVI.Agent.ysjtt Bkav: W32.AIDetectMalware CTX: exe.trojan.patcher CrowdStrike: win/grayware_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS ESET-NOD32: Win32/HackTool.Patcher.ED potentially unsafe application Elastic: malicious (high confidence) F-Secure: Trojan.TR/AVI.Agent.ysjtt Fortinet: Riskware/Patcher GData: Win32.Trojan.Agent.MXW77Q Google: Detected K7AntiVirus: Hacktool ( 005d69e71 ) K7GW: Hacktool ( 005d69e71 ) Lionic: Hacktool.Win32.Patcher.3!c Malwarebytes: Patcher.Trojan.HackTool.DDS MaxSecure: Trojan.Malware.109195707.susgen McAfeeD: ti!D1AA5F250483 Microsoft: PUA:Win32/Presenoker Paloalto: generic.ml Rising: HackTool.Patcher!8.2DD (TFE:4:3hvB3tiJqZS) Sangfor: PUP.Win32.Patcher.Vkap SentinelOne: Static AI - Suspicious PE Skyhigh: BehavesLike.Win32.Dropper.tc Sophos: Mal/Generic-S Symantec: Trojan Horse TrellixENS: Artemis!D1283216EE4C VBA32: TrojanBanker.Convagent Varist: W32/ABTrojan.ORNK-6010 Xcitium: Malware@#tdbsi4c3nr4k Yandex: Trojan.Igent.bVcXjm.30 Zillya: Tool.Patcher.Win32.34555 alibabacloud: Hacktool:Win/Patcher tehtris: Generic.Malware |
| e_magic | MZ |
|---|---|
| e_cblp | 0x50 |
| e_cp | 0x2 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0xf |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0x1a |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x100 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 2 |
| TimeDateStamp | 1992-Jun-19 22:22:17 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 2.0 |
| SizeOfCode | 0x1e200 |
| SizeOfInitializedData | 0x1bf400 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0001E7B4 (Section: CODE) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x20000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x1ea000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x111a6f |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x4000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| kernel32.dll |
LoadLibraryA
GetProcAddress VirtualAlloc VirtualFree |
|---|---|
| user32.dll |
CharNextA
|
| oleaut32.dll |
SysFreeString
|
| advapi32.dll |
RegSetValueExA
|
| version.dll |
VerQueryValueA
|
| gdi32.dll |
SetTextColor
|
| msimg32.dll |
AlphaBlend
|
| ole32.dll |
CoTaskMemFree
|
| shell32.dll |
SHGetPathFromIDListA
|
| comdlg32.dll |
GetSaveFileNameA
|
| IMAGEHLP.DLL |
CheckSumMappedFile
|
| winmm.dll |
sndPlaySoundA
|
| StartAddressOfRawData | 0x5e97fc |
|---|---|
| EndAddressOfRawData | 0x5e9804 |
| AddressOfIndex | 0x5e97f4 |
| AddressOfCallbacks | 0x5e97f8 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_TYPE_REG
|
| Callbacks | (EMPTY) |
No comments yet.