| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1999-Nov-29 19:11:11 |
| Comments | |
| CompanyName | |
| FileDescription | SslReq Application |
| FileVersion | 1.0.0.3 |
| InternalName | SslReq.exe |
| LegalCopyright | Copyright © 2020 |
| LegalTrademarks | |
| OriginalFilename | SslReq.exe |
| ProductName | SslReq |
| ProductVersion | 1.0.0.3 |
| Assembly Version | 1.0.0.3 |
| Info | Matching compiler(s): |
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Malicious | VirusTotal score: 55/72 (Scanned on 2026-02-22 12:06:14) |
ALYac:
Gen:Variant.Bulz.270506
APEX: Malicious AVG: Win32:MalwareX-gen [Spy] AhnLab-V3: Malware/Win.Generic.C5576880 Alibaba: Backdoor:MSIL/JSSLoader.ea593b9a Antiy-AVL: Trojan[Spy]/MSIL.JSSLoader Arcabit: Trojan.Bulz.D420AA Avast: Win32:MalwareX-gen [Spy] BitDefender: Gen:Variant.Bulz.270506 Bkav: W32.AIDetectMalware.CS CAT-QuickHeal: Trojan.Ghanarava.17717115179d150f CTX: exe.trojan.msil ClamAV: Win.Trojan.JSSLoader-9939412-1 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe DeepInstinct: MALICIOUS ESET-NOD32: MSIL/Spy.Agent.CJI trojan Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Bulz.270506 (B) Fortinet: MSIL/Agent.CJI!tr GData: Gen:Variant.Bulz.270506 Google: Detected Gridinsoft: Spy.Win32.Keylogger.dd!n Ikarus: Trojan-Spy.MSIL.Agent K7AntiVirus: Trojan ( 700000201 ) K7GW: Trojan ( 700000201 ) Kaspersky: HEUR:Backdoor.MSIL.Agent.gen Kingsoft: MSIL.Backdoor.Agent.gen Lionic: Trojan.Win32.JSSLoader.m!c Malwarebytes: Malware.AI.3056670792 McAfeeD: ti!0046AF85765F MicroWorld-eScan: Gen:Variant.Bulz.270506 Microsoft: TrojanSpy:MSIL/JSSLoader.B Paloalto: generic.ml Panda: Trj/GdSda.A Rising: Spyware.Agent!8.C6 (TFE:C:djn3sHc5wuF) Sangfor: Spyware.Msil.Jssloader.V4c7 SentinelOne: Static AI - Malicious PE Skyhigh: Agent-FMR!265F524FF9C0 Sophos: Mal/Generic-S Symantec: ML.Attribute.HighConfidence TACHYON: Backdoor/W32.DN-Agent.30208.C Tencent: Malware.Win32.Gencirc.13fdf789 TrellixENS: Agent-FMR!265F524FF9C0 TrendMicro: Trojan.MSIL.JSSLOADER.SMYXDJL TrendMicro-HouseCall: Trojan.MSIL.JSSLOADER.SMYXDJL VBA32: TScope.Trojan.MSIL VIPRE: Gen:Variant.Bulz.270506 Varist: W32/ABTrojan.PFHP-8883 ViRobot: Trojan.Win.Z.Agent.30208.DQV VirIT: Trojan.Win32.MSIL_Heur.A Webroot: W32.Trojan.Gen Zillya: Trojan.Agent.Win32.3850289 alibabacloud: Trojan[spy]:MSIL/JSSLoader.B huorong: TrojanSpy/MSIL.Agent.bw |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 1999-Nov-29 19:11:11 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 48.0 |
| SizeOfCode | 0x6c00 |
| SizeOfInitializedData | 0x800 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00008BAE (Section: .text) |
| BaseOfCode | 0x2000 |
| BaseOfData | 0xa000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xe000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| mscoree.dll |
_CorExeMain
|
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.3 |
| ProductVersion | 1.0.0.3 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| Comments | |
| CompanyName | |
| FileDescription | SslReq Application |
| FileVersion (#2) | 1.0.0.3 |
| InternalName | SslReq.exe |
| LegalCopyright | Copyright © 2020 |
| LegalTrademarks | |
| OriginalFilename | SslReq.exe |
| ProductName | SslReq |
| ProductVersion (#2) | 1.0.0.3 |
| Assembly Version | 1.0.0.3 |
| Resource LangID | UNKNOWN |
|---|
No comments yet.