8bb6e144acf7e444d7afcc46c0c014fe9ad2361ecd9c831bbf28c55fc19dafb0

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1992-Jun-19 22:22:17
Detected languages English - United States
CompanyName H Hayat
FileDescription 4K Products [x64] - Patch
FileVersion 1.1.0.0
InternalName Patch [x64].exe
LegalCopyright © 2021, H Hayat
LegalTrademarks
OriginalFilename Patch [x64].exe
ProductName 4K Products [x64] - Patch
ProductVersion 1.1.0.0
Comments

Plugin Output

Suspicious PEiD Signature: PECompact v2.xx
Suspicious The PE is possibly packed. Section CODE is both writable and executable.
Section .rsrc is both writable and executable.
Info The PE contains common functions which appear in legitimate applications. [!] The program may be hiding some of its imports:
  • LoadLibraryA
  • GetProcAddress
Can access the registry:
  • RegSetValueExA
Malicious VirusTotal score: 47/70 (Scanned on 2021-05-16 09:55:24) Bkav: W32.AIDetect.malware2
Elastic: malicious (high confidence)
MicroWorld-eScan: Gen:Variant.Bulz.330158
CAT-QuickHeal: Trojan.Wacatac
McAfee: Artemis!FD9E805EBC50
Cylance: Unsafe
Zillya: Tool.Patcher.Win32.35145
Sangfor: Riskware.Win32.Wacapew.C
K7AntiVirus: Unwanted-Program ( 0054d0751 )
Alibaba: HackTool:Win32/Patcher.947ca582
K7GW: Unwanted-Program ( 0054d0751 )
Cybereason: malicious.ebc50e
Cyren: W32/Trojan.QCQH-1688
Symantec: ML.Attribute.HighConfidence
ESET-NOD32: a variant of Win32/HackTool.Patcher.ED potentially unsafe
APEX: Malicious
Paloalto: generic.ml
BitDefender: Gen:Variant.Bulz.330158
NANO-Antivirus: Riskware.Win32.Patcher.hyzywe
Ad-Aware: Gen:Variant.Bulz.330158
Emsisoft: Gen:Variant.Bulz.330158 (B)
Comodo: Malware@#26vnama0wl3q5
VIPRE: Trojan.Win32.Generic!BT
McAfee-GW-Edition: GenericRXEJ-BF!DB197D517F1A
FireEye: Generic.mg.fd9e805ebc50ee6e
Sophos: Generic PUA CM (PUA)
GData: Gen:Variant.Bulz.330158
Webroot: W32.Hax.Gen
Antiy-AVL: Trojan/Generic.ASMalwS.2196BAA
Gridinsoft: Trojan.Win32.Agent.ns
Arcabit: Trojan.Bulz.D509AE
AegisLab: Trojan.Win32.Patcher.4!c
Microsoft: Trojan:Win32/Wacatac.A!ml
Cynet: Malicious (score: 100)
ALYac: Gen:Variant.Bulz.330158
MAX: malware (ai score=86)
Malwarebytes: Malware.AI.4036402309
Panda: Trj/CI.A
Rising: PUA.Puasson!8.11126 (CLOUD)
Yandex: Trojan.Igent.bVASr7.3
Ikarus: possible-Threat.Hacktool.Patcher
eGambit: Unsafe.AI_Score_54%
Fortinet: Riskware/Generic_PUA_CM
BitDefenderTheta: AI:Packer.274FC81821
AVG: Win32:Malware-gen
Avast: Win32:Malware-gen
MaxSecure: Trojan.Malware.113660661.susgen

Hashes

MD5 fd9e805ebc50ee6e77bd3af2c0be1c04
SHA1 2cd62b4d013429063a2a9ae17f50a33f88fa84b5
SHA256 8bb6e144acf7e444d7afcc46c0c014fe9ad2361ecd9c831bbf28c55fc19dafb0
SHA3 13304844ddbb163b7eeb6bbeb06c07cfb6ed02db0fe4b433eb262c77508dc43c
SSDeep 3072:Ng6lDN0VUQmhq8DAMJAezKdaZND4pCiFDVk:Ng6QVUQmDD4JaDDg95
Imports Hash 88760cdb093b2de36b6d33781ba5abe4

DOS Header

e_magic MZ
e_cblp 0x50
e_cp 0x2
e_crlc 0
e_cparhdr 0x4
e_minalloc 0xf
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0x1a
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 2
TimeDateStamp 1992-Jun-19 22:22:17
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED

Image Optional Header

Magic PE32
LinkerVersion 2.0
SizeOfCode 0x1e200
SizeOfInitializedData 0x1d400
SizeOfUninitializedData 0
AddressOfEntryPoint 0x00001000 (Section: CODE)
BaseOfCode 0x1000
BaseOfData 0x20000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0x46000
SizeOfHeaders 0x400
Checksum 0x1d955
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
SizeofStackReserve 0x100000
SizeofStackCommit 0x4000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

CODE

MD5 04c4478cd28b97aeb24f4016a5549575
SHA1 dd2cb00a443fa2b8c23a53494451ec1c32358289
SHA256 11ac6261a2c485994ab6de4b5c3160bb3c4c5186e6a3692c39c517a9c44d44da
SHA3 0a8414c3eb9c445ee371fb7302eaa189c28aff7e307e72dd344d8bb62a30ff08
VirtualSize 0x41000
VirtualAddress 0x1000
SizeOfRawData 0x17e00
PointerToRawData 0x400
PointerToRelocations 0x32434550
PointerToLineNumbers 0x4f80
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 7.99765

.rsrc

MD5 0ec418efb04516349f8e5c3548e09da4
SHA1 62d3413c1e05ef7422d98bb39ecebb7fbe599480
SHA256 50cf5ea0228d4f13e22af1c35e6d114ea0aea6fac47efaa0d5e17026881e5db6
SHA3 d56132a198ed38adc7059cd0b3a0217ebdef1b5de68b469fc256fe21e9dfd945
VirtualSize 0x4000
VirtualAddress 0x42000
SizeOfRawData 0x4000
PointerToRawData 0x18200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 5.89207

Imports

kernel32.dll LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32.dll CharNextA
oleaut32.dll SysFreeString
advapi32.dll RegSetValueExA
version.dll VerQueryValueA
gdi32.dll SetTextColor
msimg32.dll AlphaBlend
ole32.dll CoTaskMemFree
shell32.dll SHGetPathFromIDListA
comdlg32.dll GetSaveFileNameA
IMAGEHLP.DLL CheckSumMappedFile
winmm.dll sndPlaySoundA

Delayed Imports

50

Type RT_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.83519
MD5 63ff6e8094e490d7fee026318148f78f
SHA1 b4428075b9270ecd79930a7c1398a0deb055f334
SHA256 23a97570070c467d388bdcf0389d6114e1c60ed5cce1fe8fc52695c0d0398a88
SHA3 ed97894b3c2f1dfbe61123b415df61b7693563cf6daca4521e5fcb917d1db5ac

MAIN

Type RT_DIALOG
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x358
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a

DATA

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x527
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a

INFO

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0xeb
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a

MODULE

Type RT_RCDATA
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x1158a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 0
MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA3 a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a

MAINICON

Type RT_GROUP_ICON
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x14
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.1815
Detected Filetype Icon file
MD5 91ef203c9cc4e7a45a70a4dedb7650da
SHA1 8ae83e3e5366f1d1a3f2d487020605a1d6e87aea
SHA256 75aa56a388b13bf113257da7b383c592ccb101f84127e3d54c1ef9ae9eec5462
SHA3 3b63899bec791be3a200bac6715f71c4a4a462f62ddcd00aa169fd5e61e85e47

1

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x334
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.37343
MD5 bf5e998227250df4f363b23dfe6776ef
SHA1 6a09639578401ed60da4e366a8b575ccd6d6ab83
SHA256 3219b8bc885cba02a6fb698e66a44b8f076bdc5c40d4c8e6abe31e5540317e75
SHA3 74bf2a46156e88eba68fcb3f25ff45d48d75aba18a706a32310dfaf74f62f653

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x2f3
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.09702
MD5 fd0c12f2d34a5f292be6d7b56131bb0f
SHA1 5689323b65b21961ab3328cdd9f9f1646120c72e
SHA256 ef5e3f966d8dac170f799988ae04be725703d99a83a27dbe51e9379484ea5756
SHA3 9ac6158c775dcf0eebdab0a3a6a9fadfea2936969459eeb7416b86b858506576

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 1.1.0.0
ProductVersion 1.1.0.0
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
CompanyName H Hayat
FileDescription 4K Products [x64] - Patch
FileVersion (#2) 1.1.0.0
InternalName Patch [x64].exe
LegalCopyright © 2021, H Hayat
LegalTrademarks
OriginalFilename Patch [x64].exe
ProductName 4K Products [x64] - Patch
ProductVersion (#2) 1.1.0.0
Comments
Resource LangID English - United States

TLS Callbacks

StartAddressOfRawData 0x445f08
EndAddressOfRawData 0x445f10
AddressOfIndex 0x445f00
AddressOfCallbacks 0x445f04
SizeOfZeroFill 0
Characteristics IMAGE_SCN_TYPE_REG
Callbacks (EMPTY)

Load Configuration

RICH Header

Errors

[*] Warning: Resource MAIN is empty! [*] Warning: Resource DATA is empty! [*] Warning: Resource INFO is empty! [*] Warning: Resource MODULE is empty!
Leave a comment

No comments yet.