| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1992-Jun-19 22:22:17 |
| Detected languages |
English - United States
Russian - Russia |
| Comments | |
| CompanyName | IK Multimedia Keygen |
| FileDescription | IK Multimedia Keygen 1.0 Installation |
| FileVersion | 1.0 |
| LegalCopyright | IK Multimedia Keygen |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
| Malicious | This program may be a miner. |
Contains a valid Monero address:
|
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Suspicious | The PE header may have been manually modified. |
The resource timestamps differ from the PE header:
|
| Suspicious | The file contains overlay data. |
6094545 bytes of data starting at offset 0x4d400.
The overlay data has an entropy of 7.95323 and is possibly compressed or encrypted. Overlay data amounts for 95.0645% of the executable. |
| Malicious | VirusTotal score: 50/73 (Scanned on 2024-10-16 03:12:00) |
ALYac:
Application.Generic.3581793
APEX: Malicious AVG: Win64:Evo-gen [Trj] AhnLab-V3: HackTool/Win.KeyGen.C5148143 Antiy-AVL: Trojan/Win32.SGeneric Arcabit: Application.Generic.D36A761 Avast: Win64:Evo-gen [Trj] Avira: HEUR/AGEN.1367726 BitDefender: Application.Generic.3581793 Bkav: W32.AIDetectMalware CTX: exe.trojan.generic ClamAV: Win.Trojan.Miner-10015797-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 99) DeepInstinct: MALICIOUS DrWeb: Tool.Nssm.6 ESET-NOD32: multiple detections Elastic: malicious (high confidence) Emsisoft: Application.Generic.3581793 (B) F-Secure: Heuristic.HEUR/AGEN.1367726 FireEye: Generic.mg.ec62911acb15f667 Fortinet: W32/CoinMiner.FQ!tr GData: Application.Generic.3581793 Google: Detected Ikarus: Trojan.Win64.CoinMiner K7AntiVirus: CryptoMiner ( 0051b4fe1 ) K7GW: CryptoMiner ( 0051b4fe1 ) Kaspersky: Trojan.Win32.PowerShell.hey Kingsoft: malware.kb.a.764 Lionic: Trojan.Win32.PowerShell.4!c Malwarebytes: Generic.Malware.AI.DDS MaxSecure: Trojan-Ransom.Win32.Crypmod.zfq McAfee: Artemis!EC62911ACB15 McAfeeD: ti!60E3BA4F7439 MicroWorld-eScan: Application.Generic.3581793 Microsoft: Trojan:Win32/Chir!pz NANO-Antivirus: Riskware.Win64.CoinMiner.kiviwu Paloalto: generic.ml Panda: Trj/CI.A Rising: Hacktool.Keygen!8.B29 (CLOUD) Sangfor: Trojan.Win32.Agent.Vkda SentinelOne: Static AI - Malicious PE Skyhigh: BehavesLike.Win32.Dropper.vc Sophos: Mal/FakeMS-X Symantec: ML.Attribute.HighConfidence VIPRE: Application.Generic.3581793 Varist: W64/ABMiner.YFLQ-7538 ZoneAlarm: Trojan.Win32.PowerShell.hey huorong: HEUR:Trojan/FakeMsApp.c |
| e_magic | MZ |
|---|---|
| e_cblp | 0x50 |
| e_cp | 0x2 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0xf |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0x1a |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x100 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 8 |
| TimeDateStamp | 1992-Jun-19 22:22:17 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 2.0 |
| SizeOfCode | 0x24600 |
| SizeOfInitializedData | 0x28a00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00025468 (Section: CODE) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0x26000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x54000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x5b023 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x4000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| kernel32.dll |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
|---|---|
| user32.dll |
GetKeyboardType
MessageBoxA |
| advapi32.dll |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
| oleaut32.dll |
SysFreeString
SysReAllocStringLen |
| kernel32.dll (#2) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
| advapi32.dll (#2) |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
| kernel32.dll (#3) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
| gdi32.dll |
StretchDIBits
StretchBlt SetWindowOrgEx SetTextColor SetStretchBltMode SetRectRgn SetROP2 SetPixel SetDIBits SetBrushOrgEx SetBkMode SetBkColor SelectObject SaveDC RestoreDC OffsetRgn MoveToEx IntersectClipRect GetStockObject GetPixel GetDIBits ExtSelectClipRgn ExcludeClipRect DeleteObject DeleteDC CreateSolidBrush CreateRectRgn CreateDIBitmap CreateDIBSection CreateCompatibleDC CreateCompatibleBitmap CreateBrushIndirect CreateBitmap CombineRgn BitBlt |
| user32.dll (#2) |
GetKeyboardType
MessageBoxA |
| advapi32.dll (#3) |
RegQueryValueExA
RegOpenKeyExA RegCloseKey |
| kernel32.dll (#4) |
DeleteCriticalSection
LeaveCriticalSection EnterCriticalSection InitializeCriticalSection VirtualFree VirtualAlloc LocalFree LocalAlloc GetVersion GetCurrentThreadId WideCharToMultiByte GetThreadLocale GetStartupInfoA GetLocaleInfoA GetCommandLineA FreeLibrary ExitProcess WriteFile UnhandledExceptionFilter RtlUnwind RaiseException GetStdHandle |
| gdi32.dll (#2) |
StretchDIBits
StretchBlt SetWindowOrgEx SetTextColor SetStretchBltMode SetRectRgn SetROP2 SetPixel SetDIBits SetBrushOrgEx SetBkMode SetBkColor SelectObject SaveDC RestoreDC OffsetRgn MoveToEx IntersectClipRect GetStockObject GetPixel GetDIBits ExtSelectClipRgn ExcludeClipRect DeleteObject DeleteDC CreateSolidBrush CreateRectRgn CreateDIBitmap CreateDIBSection CreateCompatibleDC CreateCompatibleBitmap CreateBrushIndirect CreateBitmap CombineRgn BitBlt |
| user32.dll (#3) |
GetKeyboardType
MessageBoxA |
| shell32.dll |
SHGetFileInfoA
|
| comctl32.dll |
ImageList_Draw
ImageList_SetBkColor ImageList_Create InitCommonControls |
| ole32.dll |
OleInitialize
|
| oleaut32.dll (#2) |
SysFreeString
SysReAllocStringLen |
| winmm.dll |
timeKillEvent
timeSetEvent |
| shell32.dll (#2) |
SHGetFileInfoA
|
| cabinet.dll |
FDIDestroy
FDICopy FDICreate |
| ole32.dll (#2) |
OleInitialize
|
| shell32.dll (#3) |
SHGetFileInfoA
|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 0.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | English - United States |
| Comments | |
| CompanyName | IK Multimedia Keygen |
| FileDescription | IK Multimedia Keygen 1.0 Installation |
| FileVersion (#2) | 1.0 |
| LegalCopyright | IK Multimedia Keygen |
| Resource LangID | Russian - Russia |
|---|
| StartAddressOfRawData | 0x42d000 |
|---|---|
| EndAddressOfRawData | 0x42d008 |
| AddressOfIndex | 0x42608c |
| AddressOfCallbacks | 0x42e010 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_TYPE_REG
|
| Callbacks | (EMPTY) |