f22b1b9d0df15475a59cb606e7731e4b1a4308c90d6cf4bbc568c82dee9cb155

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2026-Mar-06 20:38:56
Detected languages English - United States

Plugin Output

Info Libraries used to perform cryptographic operations: Microsoft's Cryptography API
Suspicious The PE is possibly packed. Unusual section name found: .B~)
Unusual section name found: .vD'
Unusual section name found: .cfr
Suspicious The PE contains functions most legitimate programs don't use. Possibly launches other programs:
  • ShellExecuteW
Uses Microsoft's cryptographic API:
  • CryptDestroyKey
Leverages the raw socket API to access the Internet:
  • bind
Interacts with the certificate store:
  • CertOpenStore
Malicious VirusTotal score: 39/72 (Scanned on 2026-04-21 00:50:49) ALYac: Trojan.GenericKD.79664980
APEX: Malicious
AVG: Win64:MalwareX-gen [Misc]
Alibaba: Trojan:Win64/VMProtect.5b048595
Antiy-AVL: Trojan[Packed]/Win64.VMProtect
Arcabit: Trojan.Generic.D4BF9754
Avast: Win64:MalwareX-gen [Misc]
BitDefender: Trojan.GenericKD.79664980
Bkav: W64.AIDetectMalware
CTX: exe.trojan.vmprotect
CrowdStrike: win/malicious_confidence_100% (W)
Cylance: Unsafe
Cynet: Malicious (score: 100)
DeepInstinct: MALICIOUS
ESET-NOD32: Win64/Packed.VMProtect.AC suspicious application
Elastic: malicious (high confidence)
Emsisoft: Trojan.GenericKD.79664980 (B)
GData: Trojan.GenericKD.79664980
Google: Detected
Gridinsoft: Trojan.Heur!.02212023
K7AntiVirus: Unwanted-Program ( 005ce12a1 )
K7GW: Unwanted-Program ( 005ce12a1 )
Kingsoft: Win32.Troj.kepavll.v
Lionic: Trojan.Win32.VMProtect.4!c
Malwarebytes: Malware.AI.3525714383
MaxSecure: Trojan.Malware.328690006.susgen
McAfeeD: Real Protect-LS!5280327B641A
MicroWorld-eScan: Trojan.GenericKD.79664980
Microsoft: Trojan:Win32/Kepavll!rfn
Paloalto: generic.ml
Sangfor: Trojan.Win32.Save.a
SentinelOne: Static AI - Malicious PE
Sophos: Mal/Generic-S
Symantec: ML.Attribute.HighConfidence
TrellixENS: Artemis!5280327B641A
TrendMicro-HouseCall: TROJ_GEN.R002H01CB26
VIPRE: Trojan.GenericKD.79664980
Varist: W64/ABApplication.TAVD-8106
alibabacloud: VirTool:Win/Wacatac.B9nj

Hashes

MD5 5280327b641a4af13331306a5e063fd9
SHA1 855fad541e5f6c35b12d42a237b9a93db7c5dad0
SHA256 f22b1b9d0df15475a59cb606e7731e4b1a4308c90d6cf4bbc568c82dee9cb155
SHA3 dc3853786395bd7626afd389340fddacf9e2c48489407a7e731c539d4ee91ca6
SSDeep 98304:QaEf68C5RT8h9FSC9PsfftrPCurItBZU239xLy7Rp6p90uMHgikwAGJnjNdjc:QaEA3IXQNP/ktBH391gpg9hxwAGJnf
Imports Hash bb0a20ae4df7250985c9909e7a4c6aa5

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 8
TimeDateStamp 2026-Mar-06 20:38:56
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_RELOCS_STRIPPED

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x16be00
SizeOfInitializedData 0x292a00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00000000008A6E88 (Section: .cfr)
BaseOfCode 0x1000
ImageBase 0x140000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0xec7000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x16bcf7
VirtualAddress 0x1000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.rdata

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x6b7f2
VirtualAddress 0x16d000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.data

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x213ca0
VirtualAddress 0x1d9000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE

.pdata

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x10c08
VirtualAddress 0x3ed000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ

.B~)

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a
VirtualSize 0x3fef09
VirtualAddress 0x3fe000
SizeOfRawData 0
PointerToRawData 0
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ

.vD'

MD5 51f5d6798585519d9d934127e28c49a2
SHA1 0e4334ee2dce51a7ff1286493a9227ed4a76fbeb
SHA256 3c972e8d019f374917d837c869e0f37970620436b80957a18764e47831154ff8
SHA3 b72271f442d7fe38fcafc326bc996ca7d6bdf1231903a474158fab010aba8c89
VirtualSize 0x240
VirtualAddress 0x7fd000
SizeOfRawData 0x400
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.999077

.cfr

MD5 10ea34e7a524f33004e4b9c80c46909b
SHA1 96bdc840576c2b68680cd41acf0084764d642440
SHA256 6d7ac268a300b24124f80af2b6239d83d41ecab0f13221ae8d7a1579bf7c5bf7
SHA3 d0918c8850d7e1445fe598bee050acfd60782bb3026e7e2d4c8c12b83a6c3446
VirtualSize 0x6c7bfc
VirtualAddress 0x7fe000
SizeOfRawData 0x6c7c00
PointerToRawData 0x800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 7.98467

.rsrc

MD5 9a91d2c0164a53c4912afb6d3b47ac3d
SHA1 973644af17a51731cd57ff737e2fe650f8243044
SHA256 3dc65a76cc1e985a852aa8a121cbcf7fc13a502688c3190c5057c8fd7249c732
SHA3 e9c54abcede87a99c030f7db5c8bf2cb30a7f77c15391e1e385d475e330636e0
VirtualSize 0x1e0
VirtualAddress 0xec6000
SizeOfRawData 0x200
PointerToRawData 0x6c8400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.77204

Imports

d3d11.dll D3D11CreateDeviceAndSwapChain
d3dx11_43.dll D3DX11CreateShaderResourceViewFromMemory
D3DCOMPILER_43.dll D3DCompile
KERNEL32.dll SleepConditionVariableSRW
USER32.dll ShowWindow
GDI32.dll CreateRoundRectRgn
ADVAPI32.dll CryptDestroyKey
SHELL32.dll ShellExecuteW
ole32.dll CoCreateInstance
OLEAUT32.dll SysAllocString
MSVCP140.dll ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
IPHLPAPI.DLL GetAdaptersInfo
WS2_32.dll bind
WLDAP32.dll #26
CRYPT32.dll CertOpenStore
Normaliz.dll IdnToAscii
ntdll.dll RtlCaptureContext
IMM32.dll ImmSetCandidateWindow
dwmapi.dll DwmExtendFrameIntoClientArea
VCRUNTIME140_1.dll __CxxFrameHandler4
VCRUNTIME140.dll __intrinsic_setjmp
api-ms-win-crt-runtime-l1-1-0.dll __sys_nerr
api-ms-win-crt-stdio-l1-1-0.dll _close
api-ms-win-crt-heap-l1-1-0.dll _set_new_mode
api-ms-win-crt-convert-l1-1-0.dll strtod
api-ms-win-crt-time-l1-1-0.dll _gmtime64
api-ms-win-crt-math-l1-1-0.dll sinf
api-ms-win-crt-string-l1-1-0.dll strncmp
api-ms-win-crt-filesystem-l1-1-0.dll remove
api-ms-win-crt-utility-l1-1-0.dll rand
api-ms-win-crt-locale-l1-1-0.dll _configthreadlocale
api-ms-win-crt-environment-l1-1-0.dll getenv

Delayed Imports

1

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x188
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.89623
MD5 b8e76ddb52d0eb41e972599ff3ca431b
SHA1 fc12d7ad112ddabfcd8f82f290d84e637a4d62f8
SHA256 165c5c883fd4fd36758bcba6baf2faffb77d2f4872ffd5ee918a16f91de5a8a8
SHA3 37f83338b28cb102b1b14f27280ba1aa3fffb17f7bf165cb7b675b7e8eb7cddd

Version Info

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1401d9200

RICH Header

Errors

[!] Error: Could not reach the TLS callback table. [*] Warning: Section .text has a size of 0! [*] Warning: Section .rdata has a size of 0! [*] Warning: Section .data has a size of 0! [*] Warning: Section .pdata has a size of 0! [*] Warning: Section .B~) has a size of 0!
Leave a comment

No comments yet.