Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2023-Jan-17 20:20:18 |
Detected languages |
English - United States
|
CompanyName | MrAntiFun.net |
FileDescription | MrAntiFun Loader |
FileVersion | 1.02 |
InternalName | MrAntiFun |
LegalCopyright | Copyrights MrAntiFun.net © 2013-2018 |
LegalTrademarks1 | MrAntiFun |
LegalTrademarks2 | MrAntiFun.net |
OriginalFilename | Trainer.exe |
ProductName | MrAntiFun Loader |
ProductVersion | 1.00 |
Info | Interesting strings found in the binary: |
Contains domain names:
|
Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 18/68 (Scanned on 2023-03-14 22:57:08) |
Lionic:
Trojan.Win32.Agent.Y!c
Cynet: Malicious (score: 100) McAfee: Artemis!DC1926E90476 CrowdStrike: win/malicious_confidence_70% (W) APEX: Malicious Kaspersky: Trojan.Win64.Agent.qwidjl ViRobot: Trojan.Win.Z.Agent.216576.G Rising: Trojan.Agent!8.B1E (CLOUD) Zillya: Trojan.Agent.Win64.24233 McAfee-GW-Edition: BehavesLike.Win64.BadFile.dh Trapmine: suspicious.low.ml.score Antiy-AVL: Trojan/Win64.Agent Gridinsoft: Ransom.Win64.Sabsik.sa ZoneAlarm: Trojan.Win64.Agent.qwidjl Google: Detected MaxSecure: Trojan.Malware.74412563.susgen Fortinet: Malicious_Behavior.SB Panda: Trj/Chgt.AD |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x110 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 7 |
TimeDateStamp | 2023-Jan-17 20:20:18 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
Magic | PE32+ |
---|---|
LinkerVersion | 14.0 |
SizeOfCode | 0xc800 |
SizeOfInitializedData | 0x1f429400 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x0000000000001740 (Section: .text) |
BaseOfCode | 0x1000 |
ImageBase | 0x140000000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 6.0 |
ImageVersion | 0.0 |
SubsystemVersion | 6.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x1f43a000 |
SizeOfHeaders | 0x400 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
KERNEL32.dll |
CreateToolhelp32Snapshot
Sleep Process32NextW Process32FirstW CloseHandle OpenProcess VirtualProtectEx DebugActiveProcess ReadProcessMemory Module32NextW VirtualQueryEx WriteConsoleW DebugActiveProcessStop GetCurrentProcess Module32FirstW WriteProcessMemory RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind UnhandledExceptionFilter SetUnhandledExceptionFilter TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent GetStartupInfoW GetModuleHandleW RtlUnwindEx GetLastError SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree FreeLibrary GetProcAddress LoadLibraryExW RaiseException GetStdHandle WriteFile GetModuleFileNameW ExitProcess GetModuleHandleExW GetCommandLineA GetCommandLineW HeapAlloc HeapFree FindClose FindFirstFileExW FindNextFileW IsValidCodePage GetACP GetOEMCP GetCPInfo MultiByteToWideChar WideCharToMultiByte GetEnvironmentStringsW FreeEnvironmentStringsW SetEnvironmentVariableW SetStdHandle GetFileType GetStringTypeW CompareStringW LCMapStringW GetProcessHeap HeapSize HeapReAlloc FlushFileBuffers GetConsoleOutputCP GetConsoleMode SetFilePointerEx CreateFileW |
---|---|
ADVAPI32.dll |
AdjustTokenPrivileges
OpenProcessToken LookupPrivilegeValueW |
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 1.0.0.0 |
ProductVersion | 1.0.0.0 |
FileFlags |
VS_FF_PRERELEASE
VS_FF_PRIVATEBUILD
|
FileOs | (EMPTY) |
FileType |
VFT_APP
|
Language | English - United States |
CompanyName | MrAntiFun.net |
FileDescription | MrAntiFun Loader |
FileVersion (#2) | 1.02 |
InternalName | MrAntiFun |
LegalCopyright | Copyrights MrAntiFun.net © 2013-2018 |
LegalTrademarks1 | MrAntiFun |
LegalTrademarks2 | MrAntiFun.net |
OriginalFilename | Trainer.exe |
ProductName | MrAntiFun Loader |
ProductVersion (#2) | 1.00 |
Resource LangID | English - United States |
---|
Characteristics |
0
|
---|---|
TimeDateStamp | 2023-Jan-17 20:20:18 |
Version | 0.0 |
SizeofData | 720 |
AddressOfRawData | 0x15948 |
PointerToRawData | 0x14548 |
Characteristics |
0
|
---|---|
TimeDateStamp | 2023-Jan-17 20:20:18 |
Version | 0.0 |
SizeofData | 0 |
AddressOfRawData | 0 |
PointerToRawData | 0 |
Size | 0x140 |
---|---|
TimeDateStamp | 1970-Jan-01 00:00:00 |
Version | 0.0 |
GlobalFlagsClear | (EMPTY) |
GlobalFlagsSet | (EMPTY) |
CriticalSectionDefaultTimeout | 0 |
DeCommitFreeBlockThreshold | 0 |
DeCommitTotalFreeThreshold | 0 |
LockPrefixTable | 0 |
MaximumAllocationSize | 0 |
VirtualMemoryThreshold | 0 |
ProcessAffinityMask | 0 |
ProcessHeapFlags | (EMPTY) |
CSDVersion | 0 |
Reserved1 | 0 |
EditList | 0 |
SecurityCookie | 0x140018000 |
XOR Key | 0xbf1e77c3 |
---|---|
Unmarked objects | 0 |
C objects (27412) | 11 |
ASM objects (27412) | 5 |
C++ objects (27412) | 137 |
C++ objects (VS 2015-2022 runtime 30818) | 38 |
C objects (VS 2015-2022 runtime 30818) | 16 |
ASM objects (VS 2015-2022 runtime 30818) | 9 |
Imports (27412) | 5 |
Total imports | 100 |
C++ objects (LTCG) (VS2022 Update 1 (17.1.6) compiler 31107) | 1 |
Resource objects (VS2022 Update 1 (17.1.6) compiler 31107) | 1 |
151 | 1 |
Linker (VS2022 Update 1 (17.1.6) compiler 31107) | 1 |