| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2015-Mar-13 10:07:12 |
| Detected languages |
French - France
|
| Info | Matching compiler(s): |
Microsoft Visual C++ v6.0 DLL
Microsoft Visual C++ 6.0 - 8.0 |
| Info | Cryptographic algorithms detected in the binary: |
Uses constants related to SHA1
Uses constants related to SHA256 Uses constants related to SHA512 Uses constants related to AES Microsoft's Cryptography API |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Info | The PE's resources present abnormal characteristics. | Resource 108 is possibly compressed or encrypted. |
| Malicious | VirusTotal score: 49/66 (Scanned on 2026-04-28 23:27:27) |
ALYac:
Trojan.GenericKD.79913173
APEX: Malicious AhnLab-V3: Unwanted/Win32.KeyGen.R268523 Alibaba: Trojan:Win32/Occamy.108 Antiy-AVL: Trojan/Win32.Agent Arcabit: Trojan.Generic.D4C360D5 BitDefender: Trojan.GenericKD.79913173 Bkav: W32.Common.50F22AE5 CAT-QuickHeal: Trojan.IGENERIC CTX: exe.trojan.keygen ClamAV: Win.Malware.Generic-9856094-0 CrowdStrike: win/grayware_confidence_100% (W) Cylance: Unsafe DeepInstinct: MALICIOUS ESET-NOD32: Win32/Keygen.OJ potentially unsafe application Elastic: malicious (high confidence) Emsisoft: Trojan.GenericKD.79913173 (B) Fortinet: Riskware/KeyGen GData: Trojan.GenericKD.79913173 Google: Detected Gridinsoft: Hack.Win32.Patcher.vb Ikarus: PUA.HackTool Jiangmin: Trojan/Generic.bhvlz K7AntiVirus: Unwanted-Program ( 005dcb711 ) K7GW: Unwanted-Program ( 005dcb711 ) Kingsoft: Win32.Riskware.Keygen.f Lionic: Trojan.Win32.Keygen.4!c Malwarebytes: CrackTool.AutoDesk.Keygen McAfeeD: PUP:Win/HTool.KG MicroWorld-eScan: Trojan.GenericKD.79913173 Microsoft: HackTool:Win32/Keygen Paloalto: generic.ml Panda: PUP/Keygen Rising: Trojan.Keygen!8.10243 (RDMK:cmRtazrdHTrlXVmm9WXzWm+lp9eV) SUPERAntiSpyware: Hack.Tool/Gen-Crack SentinelOne: Static AI - Suspicious PE Skyhigh: HTool-Keygen Sophos: Generic Reputation PUA (PUA) Tencent: Win32.Trojan.Malware.Otcz TrendMicro: HKTL_KEYGEN TrendMicro-HouseCall: HKTL_KEYGEN VIPRE: Trojan.GenericKD.79913173 Varist: W32/Keygen.AAKY-4139 ViRobot: Keygen.880128 VirIT: PUP.Win32.GenusC.JBC Webroot: W32.Malware.gen Xcitium: Malware@#rd8lw20mllgq Yandex: Trojan.Igent.bUeKyb.21 Zoner: Trojan.Win32.48381 |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x100 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 4 |
| TimeDateStamp | 2015-Mar-13 10:07:12 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 12.0 |
| SizeOfCode | 0xa1c00 |
| SizeOfInitializedData | 0x80200 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0007FFFB (Section: .text) |
| BaseOfCode | 0x1000 |
| BaseOfData | 0xa3000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x124000 |
| SizeOfHeaders | 0x1000 |
| Checksum | 0xe1fbe |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.DLL |
ReadProcessMemory
CreateFileW WriteConsoleW GetConsoleCP FlushFileBuffers GetStringTypeW SetStdHandle OutputDebugStringW LoadLibraryExW OpenProcess WriteProcessMemory LCMapStringW SetFilePointerEx GetCPInfo GetOEMCP GetACP CreateToolhelp32Snapshot GetModuleHandleA CreateThread ExitProcess Sleep lstrlenA Module32Next Module32First Process32Next Process32First FlushInstructionCache GetCurrentThread GetLastError CloseHandle IsValidCodePage GetModuleHandleW TlsFree TlsSetValue TlsGetValue TlsAlloc TerminateProcess GetCurrentProcess QueryPerformanceCounter EncodePointer DecodePointer RaiseException RtlUnwind HeapFree HeapAlloc GetCommandLineA IsDebuggerPresent IsProcessorFeaturePresent GetSystemTimeAsFileTime EnterCriticalSection LeaveCriticalSection GetModuleHandleExW GetProcAddress MultiByteToWideChar WideCharToMultiByte HeapSize SetLastError GetCurrentThreadId GetProcessHeap GetStdHandle WriteFile GetModuleFileNameW HeapReAlloc GetConsoleMode GetFileType DeleteCriticalSection GetStartupInfoW GetModuleFileNameA GetCurrentProcessId GetEnvironmentStringsW FreeEnvironmentStringsW UnhandledExceptionFilter SetUnhandledExceptionFilter InitializeCriticalSectionAndSpinCount |
|---|---|
| ADVAPI32.dll |
ImpersonateSelf
AdjustTokenPrivileges OpenThreadToken LookupPrivilegeValueA CryptAcquireContextA CryptReleaseContext CryptGenRandom |
| GDI32.dll |
SetTextColor
SetBkMode SetBkColor SelectObject DeleteObject DeleteDC CreateSolidBrush CreateRectRgn CreateFontA CreateCompatibleDC BitBlt GetObjectA |
| USER32.dll |
TranslateMessage
PostMessageA GetMessageA MessageBoxA SendMessageA DispatchMessageA LoadBitmapA SetWindowLongA GetWindowLongA GetWindowRect SetWindowTextA SetWindowRgn GetDC GetSystemMetrics GetDlgItemTextA SetDlgItemTextA GetDlgItem EndDialog CreateDialogParamA SetWindowPos MoveWindow SetLayeredWindowAttributes ShowWindow CreateWindowExA CallWindowProcA PostQuitMessage DefWindowProcA |
| WINMM.dll |
waveOutOpen
waveOutUnprepareHeader waveOutReset waveOutWrite waveOutClose waveOutPrepareHeader |
| Size | 0x48 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x4a39e0 |
| SEHandlerTable | 0x41bcb0 |
| SEHandlerCount | 303 |
| XOR Key | 0x3e6e0738 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (VS2013 build 21005) | 72 |
| ASM objects (VS2013 build 21005) | 38 |
| C objects (VS2013 build 21005) | 207 |
| 19 (8034) | 2 |
| 229 (VS2013 UPD4 build 31101) | 58 |
| Imports (65501) | 11 |
| Total imports | 150 |
| C++ objects (VS2013 UPD4 build 31101) | 5 |
| Resource objects (VS2013 build 21005) | 1 |
| Linker (VS2013 UPD4 build 31101) | 1 |
No comments yet.