Architecture |
IMAGE_FILE_MACHINE_I386
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
Compilation Date | 2017-May-15 17:47:25 |
Detected languages |
English - United States
|
CompanyName | Microsoft Corporation |
FileDescription | ApiSet Stub DLL |
FileVersion | 10.0.10586.15 (th2_release.151119-1817) |
InternalName | apisetstub |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | apisetstub |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 10.0.10586.15 |
Info | Matching compiler(s): | MASM/TASM - sig1(h) |
Info | Libraries used to perform cryptographic operations: | Microsoft's Cryptography API |
Suspicious | The PE is possibly packed. | Unusual section name found: .exp |
Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
Malicious | VirusTotal score: 51/68 (Scanned on 2017-11-20 04:31:31) |
MicroWorld-eScan:
Trojan.Agent.CGWS
CAT-QuickHeal: Trojan.Mauvaise.SL1 McAfee: Packed-PN!E6D8E767A407 Malwarebytes: Trojan.FakeMS VIPRE: Trojan.Win32.Generic!BT K7GW: Trojan ( 0050fcc61 ) K7AntiVirus: Trojan ( 0050fcc61 ) Invincea: heuristic Baidu: Win32.Trojan.WisdomEyes.16070401.9500.9999 Cyren: W32/Trojan.UCTI-1681 Symantec: Trojan.Sakurel TrendMicro-HouseCall: TSPY_HPEMOTET.SMDX0 Avast: Win32:Malware-gen Kaspersky: HEUR:Trojan.Win32.Generic BitDefender: Trojan.Agent.CGWS NANO-Antivirus: Trojan.Win32.GenKryptik.epgdps Paloalto: generic.ml AegisLab: Troj.W32.Generic!c Rising: Malware.XPACK-LNR/Heur!1.5594 (CLASSIC) Ad-Aware: Trojan.Agent.CGWS Sophos: Mal/EncPk-ANR F-Secure: Trojan.Agent.CGWS DrWeb: Trojan.Packed.140 Zillya: Trojan.Kryptik.Win32.1250072 TrendMicro: TSPY_HPEMOTET.SMDX0 McAfee-GW-Edition: BehavesLike.Win32.Backdoor.gc Emsisoft: Trojan.Agent.CGWS (B) SentinelOne: static engine - malicious Webroot: W32.Backdoor.Gen Avira: TR/Crypt.ZPACK.lwzue Fortinet: W32/Kryptik.FSGL!tr Antiy-AVL: Trojan/Win32.SGeneric Endgame: malicious (high confidence) Arcabit: Trojan.Agent.CGWS ViRobot: Trojan.Win32.Agent.458752.AC ZoneAlarm: HEUR:Trojan.Win32.Generic AhnLab-V3: Trojan/Win32.Generic.R203206 ALYac: Trojan.Agent.QakBot AVware: Trojan.Win32.Generic!BT MAX: malware (ai score=100) Cylance: Unsafe ESET-NOD32: a variant of Win32/Kryptik.FTKI Tencent: Suspicious.Heuristic.Gen.b.0 Yandex: Trojan.Agent!f7wGDpetOCE Ikarus: Trojan.Win32.Krypt GData: Trojan.Agent.CGWS AVG: Win32:Malware-gen Cybereason: malicious.1b8fb7 Panda: Trj/CI.A CrowdStrike: malicious_confidence_100% (W) Qihoo-360: Win32/Trojan.202 |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0xd0 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_I386
|
NumberofSections | 9 |
TimeDateStamp | 2017-May-15 17:47:25 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xe0 |
Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32 |
---|---|
LinkerVersion | 8.0 |
SizeOfCode | 0x4000 |
SizeOfInitializedData | 0x6e000 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x00001990 (Section: .text) |
BaseOfCode | 0x1000 |
BaseOfData | 0x5000 |
ImageBase | 0x400000 |
SectionAlignment | 0x1000 |
FileAlignment | 0x1000 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x73000 |
SizeOfHeaders | 0x1000 |
Checksum | 0 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
DllCharacteristics |
IMAGE_LIBRARY_PROCESS_INIT
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 16 |
ADVAPI32.dll |
GetServiceDisplayNameW
CryptGetDefaultProviderW GetSecurityDescriptorGroup |
---|---|
KERNEL32.dll |
GetProcAddress
ExitProcess GetModuleHandleA GetStringTypeW GetThreadTimes LocalFree FreeLibrary InterlockedExchange GetLastError LoadLibraryA RaiseException GetSystemTimeAsFileTime ExitThread LocalAlloc |
GDI32.dll |
GetSystemPaletteUse
DeleteEnhMetaFile |
USER32.dll (delay-loaded) |
GetPropA
GetClassNameA |
Attributes | 0x1 |
---|---|
Name | USER32.dll |
ModuleHandle | 0x950c |
DelayImportAddressTable | 0x6a10 |
DelayImportNameTable | 0x520c |
BoundDelayImportTable | 0x5234 |
UnloadDelayImportTable | 0 |
TimeStamp | 1970-Jan-01 00:00:00 |
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 10.0.10586.15 |
ProductVersion | 10.0.10586.15 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
FileType |
VFT_DLL
|
Language | English - United States |
CompanyName | Microsoft Corporation |
FileDescription | ApiSet Stub DLL |
FileVersion (#2) | 10.0.10586.15 (th2_release.151119-1817) |
InternalName | apisetstub |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | apisetstub |
ProductName | Microsoft® Windows® Operating System |
ProductVersion (#2) | 10.0.10586.15 |
Resource LangID | English - United States |
---|
XOR Key | 0xcc50a961 |
---|---|
Unmarked objects | 0 |
Imports (VS2012 build 50727 / VS2005 build 50727) | 7 |
C++ objects (VS2012 build 50727 / VS2005 build 50727) | 3 |
Total imports | 21 |
Unmarked objects (#2) | 1 |
Resource objects (VS2013 build 21005) | 1 |
Linker (VS2012 build 50727 / VS2005 build 50727) | 1 |