| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 1992-Jun-19 22:22:17 |
| Detected languages |
English - United States
|
| Suspicious | PEiD Signature: |
UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser
UPX v2.0 -> Markus, Laszlo & Reiser (h) UPX 2.00-3.0X -> Markus Oberhumer & Laszlo Molnar & John Reiser UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser UPX 2.00-3.0X -> Markus Oberhumer & Laszlo Molnar & John Reiser |
| Suspicious | The PE is possibly packed. |
Unusual section name found: .dosx
Section .dosx is both writable and executable. Unusual section name found: .fish Section .fish is both writable and executable. |
| Info | The PE contains common functions which appear in legitimate applications. |
[!] The program may be hiding some of its imports:
|
| Suspicious | The PE header may have been manually modified. |
Resource BATCLEN is possibly compressed or encrypted.
Resource CLEAN is possibly compressed or encrypted. Resource EXTRATYPE is possibly compressed or encrypted. Resource HEAD is possibly compressed or encrypted. Resource IDMSPD is possibly compressed or encrypted. Resource MASAIO is possibly compressed or encrypted. Resource UPDT is possibly compressed or encrypted. Resource WININF is possibly compressed or encrypted. The resource timestamps differ from the PE header:
|
| Malicious | VirusTotal score: 49/70 (Scanned on 2026-05-07 15:32:20) |
ALYac:
Gen:Variant.Application.Keygen-Crack-Patcher.3
APEX: Malicious AVG: Win32:UnwantedX-gen [PUP] AhnLab-V3: Unwanted/Win.Crack.C5610628 Antiy-AVL: HackTool/Win32.Crack Arcabit: Trojan.Application.Keygen-Crack-Patcher.3 Avast: Win32:UnwantedX-gen [PUP] Avira: TR/Crypt.ULPM.Gen BitDefender: Gen:Variant.Application.Keygen-Crack-Patcher.3 Bkav: W32.Malware.CF702B7C CTX: exe.trojan.crack CrowdStrike: win/grayware_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Trojan.MulDrop36.2467 ESET-NOD32: Win32/HackTool.Crack.FO potentially unsafe application Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Application.Keygen-Crack-Patcher.3 (B) F-Secure: Trojan.TR/Crypt.ULPM.Gen Fortinet: W32/Agent.EXH!tr GData: Gen:Variant.Application.Keygen-Crack-Patcher.3 Gridinsoft: Trojan.Heur!.032125E1 Ikarus: PUA.HackTool.Crack K7AntiVirus: Trojan ( 0051918e1 ) K7GW: Trojan ( 0051918e1 ) Kingsoft: Win32.Troj.Unknown.a Lionic: Trojan.Win32.CodecPack.lpcy Malwarebytes: HackTool.Crack MaxSecure: Trojan.Malware.509485587.susgen MicroWorld-eScan: Gen:Variant.Application.Keygen-Crack-Patcher.3 Microsoft: HackTool:Win32/Crack.AVN!MTB Paloalto: generic.ml Panda: PUP/Crack Sangfor: Suspicious.Win32.Save.a SentinelOne: Static AI - Suspicious PE Skyhigh: BehavesLike.Win32.Dropper.kc Sophos: Generic Reputation PUA (PUA) Symantec: ML.Attribute.HighConfidence Trapmine: malicious.moderate.ml.score TrellixENS: Artemis!99E93F400964 VBA32: Trojan.Hide.Heur VIPRE: Gen:Variant.Application.Keygen-Crack-Patcher.3 Varist: W32/ABApplication.LZGZ-4366 Webroot: Win.Trojan.Gen Xcitium: Packed.Win32.MUPX.Gen@24tbus Yandex: PUP.Crack!nKg+nMahp4M Zillya: Tool.Crack.Win32.6494 alibabacloud: HackTool:Win/Crack.FP |
| e_magic | MZ |
|---|---|
| e_cblp | 0x50 |
| e_cp | 0x2 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0xf |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0x1a |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x100 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 1992-Jun-19 22:22:17 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 2.0 |
| SizeOfCode | 0x10000 |
| SizeOfInitializedData | 0x2000 |
| SizeOfUninitializedData | 0x2f000 |
| AddressOfEntryPoint | 0x0003EE70 (Section: .fish) |
| BaseOfCode | 0x30000 |
| BaseOfData | 0x40000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x42000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x4000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| advapi32.dll |
RegCloseKey
|
|---|---|
| gdi32.dll |
SetBkColor
|
| IMAGEHLP.DLL |
ImageRemoveCertificate
|
| KERNEL32.DLL |
LoadLibraryA
CopyContext GetProcAddress VirtualProtect |
| oleaut32.dll |
SysFreeString
|
| shell32.dll |
ShellExecuteW
|
| user32.dll |
SetFocus
|
| version.dll |
VerQueryValueW
|
| winmm.dll |
waveOutOpen
|
No comments yet.