| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2023-Sep-23 14:39:06 |
| Detected languages |
English - United States
|
| CompanyName | Microsoft Corporation |
| FileDescription | DiskPart |
| FileVersion | 10.0.19041.964 (WinBuild.160101.0800) |
| InternalName | diskpart.exe |
| LegalCopyright | © Microsoft Corporation. All rights reserved. |
| OriginalFilename | diskpart.exe |
| ProductName | Microsoft® Windows® Operating System |
| ProductVersion | 10.0.19041.964 |
| Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | The PE's digital signature is invalid. |
Signer: Akeo Consulting
Issuer: Sectigo Public Code Signing CA EV R36 The file was modified after it was signed. |
| Malicious | VirusTotal score: 53/70 (Scanned on 2025-03-11 05:13:04) |
ALYac:
Gen:Variant.Tedy.600889
APEX: Malicious AVG: Win32:Agent-BDOJ [Trj] AhnLab-V3: Trojan/Win.Evo-gen.R609691 Alibaba: Packed:Win64/PyInstaller.1df4b6f9 Arcabit: Trojan.Tedy.D92B39 Avast: Win32:Agent-BDOJ [Trj] Avira: TR/Crypt.FKM.Gen BitDefender: Gen:Variant.Tedy.600889 Bkav: W64.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.1738663137184bca CTX: exe.trojan.generic CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Python.Muldrop.18 ESET-NOD32: a variant of Win64/Packed.PyInstaller.L Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Tedy.600889 (B) F-Secure: Trojan.TR/Crypt.FKM.Gen FireEye: Gen:Variant.Tedy.600889 Fortinet: W64/PackedPyInstaller.L!tr GData: Gen:Variant.Tedy.600889 Google: Detected Gridinsoft: Ransom.Win64.Sabsik.sa Ikarus: Trojan.Python.SLoader Jiangmin: Trojan.PSW.Python.kf K7AntiVirus: Trojan ( 005aadfa1 ) K7GW: Trojan ( 005aadfa1 ) Kaspersky: Trojan-Spy.Win32.Agent.dffz Kingsoft: Win32.Trojan-Spy.Agent.dffz Lionic: Trojan.Win32.Agent.tssE Malwarebytes: Generic.Malware.Agent.DDS MaxSecure: Trojan.Malware.209835899.susgen McAfeeD: ti!7FBBEFDAE9AD MicroWorld-eScan: Gen:Variant.Tedy.600889 Microsoft: Trojan:Win64/Lazy.AME!MTB NANO-Antivirus: Trojan.Win64.Mlw.kbmlvw Paloalto: generic.ml Panda: Trj/Chgt.AD Rising: Spyware.Agent/PYC!1.EA8F (CLASSIC) SentinelOne: Static AI - Malicious PE Sophos: Mal/Generic-S Symantec: Scr.Malcode!gen129 Tencent: Win32.Trojan.FalseSign.Cujl VIPRE: Gen:Variant.Tedy.600889 Varist: W64/S-a298a06b!Eldorado Xcitium: Malware@#16wgxr17czoxu Yandex: Trojan.PyInstaller!RhlJs00MQ5A Zillya: Trojan.Agent.Script.1739068 alibabacloud: Trojan[spy]:Win/Lazy.AZM2XJC huorong: TrojanSpy/Python.Stealer.d |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xf8 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2023-Sep-23 14:39:06 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x29c00 |
| SizeOfInitializedData | 0x17200 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000000C260 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 5.2 |
| ImageVersion | 0.0 |
| SubsystemVersion | 5.2 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x48000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x752560 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x1e8480 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| USER32.dll |
CreateWindowExW
MessageBoxW MessageBoxA SystemParametersInfoW DestroyIcon SetWindowLongPtrW GetWindowLongPtrW GetClientRect InvalidateRect ReleaseDC GetDC DrawTextW GetDialogBaseUnits EndDialog DialogBoxIndirectParamW MoveWindow SendMessageW |
|---|---|
| COMCTL32.dll |
#380
|
| KERNEL32.dll |
GetStringTypeW
GetFileAttributesExW HeapReAlloc FlushFileBuffers GetCurrentDirectoryW IsValidCodePage GetACP GetModuleHandleW MulDiv GetLastError SetDllDirectoryW GetModuleFileNameW CreateSymbolicLinkW GetProcAddress GetCommandLineW GetEnvironmentVariableW GetOEMCP ExpandEnvironmentStringsW CreateDirectoryW GetTempPathW WaitForSingleObject Sleep GetExitCodeProcess CreateProcessW GetStartupInfoW FreeLibrary LoadLibraryExW SetConsoleCtrlHandler FindClose FindFirstFileExW CloseHandle GetCurrentProcess LocalFree FormatMessageW MultiByteToWideChar WideCharToMultiByte GetCPInfo GetEnvironmentStringsW FreeEnvironmentStringsW GetProcessHeap GetTimeZoneInformation HeapSize WriteConsoleW SetEnvironmentVariableW RtlUnwindEx RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind UnhandledExceptionFilter SetUnhandledExceptionFilter TerminateProcess IsProcessorFeaturePresent QueryPerformanceCounter GetCurrentProcessId GetCurrentThreadId GetSystemTimeAsFileTime InitializeSListHead IsDebuggerPresent SetEndOfFile SetLastError EnterCriticalSection LeaveCriticalSection DeleteCriticalSection InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree EncodePointer RaiseException RtlPcToFileHeader GetCommandLineA CreateFileW GetDriveTypeW GetFileInformationByHandle GetFileType PeekNamedPipe SystemTimeToTzSpecificLocalTime FileTimeToSystemTime GetFullPathNameW RemoveDirectoryW FindNextFileW SetStdHandle DeleteFileW ReadFile GetStdHandle WriteFile ExitProcess GetModuleHandleExW HeapFree GetConsoleMode ReadConsoleW SetFilePointerEx GetConsoleOutputCP GetFileSizeEx HeapAlloc FlsAlloc FlsGetValue FlsSetValue FlsFree CompareStringW LCMapStringW |
| ADVAPI32.dll |
OpenProcessToken
GetTokenInformation ConvertStringSecurityDescriptorToSecurityDescriptorW ConvertSidToStringSidW |
| GDI32.dll |
SelectObject
DeleteObject CreateFontIndirectW |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 10.0.19041.964 |
| ProductVersion | 10.0.19041.964 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
|
| FileType |
VFT_DLL
|
| Language | English - United States |
| CompanyName | Microsoft Corporation |
| FileDescription | DiskPart |
| FileVersion (#2) | 10.0.19041.964 (WinBuild.160101.0800) |
| InternalName | diskpart.exe |
| LegalCopyright | © Microsoft Corporation. All rights reserved. |
| OriginalFilename | diskpart.exe |
| ProductName | Microsoft® Windows® Operating System |
| ProductVersion (#2) | 10.0.19041.964 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2023-Sep-23 14:39:06 |
| Version | 0.0 |
| SizeofData | 772 |
| AddressOfRawData | 0x3a7e0 |
| PointerToRawData | 0x397e0 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x14003e018 |
| GuardCFCheckFunctionPointer | 5368886304 |
| GuardCFDispatchFunctionPointer | 0 |
| GuardCFFunctionTable | 0 |
| GuardCFFunctionCount | 0 |
| GuardFlags | (EMPTY) |
| CodeIntegrity.Flags | 0 |
| CodeIntegrity.Catalog | 0 |
| CodeIntegrity.CatalogOffset | 0 |
| CodeIntegrity.Reserved | 0 |
| GuardAddressTakenIatEntryTable | 0 |
| GuardAddressTakenIatEntryCount | 0 |
| GuardLongJumpTargetTable | 0 |
| GuardLongJumpTargetCount | 0 |
| XOR Key | 0xdc64562c |
|---|---|
| Unmarked objects | 0 |
| ASM objects (30795) | 8 |
| C++ objects (30795) | 187 |
| C objects (30795) | 10 |
| 253 (VS2022 Update 4 (17.4.2) compiler 31935) | 4 |
| C++ objects (VS2022 Update 4 (17.4.2) compiler 31935) | 40 |
| C objects (VS2022 Update 4 (17.4.2) compiler 31935) | 17 |
| ASM objects (VS2022 Update 4 (17.4.2) compiler 31935) | 9 |
| Imports (30795) | 11 |
| Total imports | 139 |
| C objects (VS2022 Update 5 (17.5.4) compiler 32217) | 21 |
| Linker (VS2022 Update 5 (17.5.4) compiler 32217) | 1 |