2023-07-02 05:09:43
9dda1a1d1f8a1d13ae0297b47046b26e
Name | Virtual Address | Virtual Size | Size of Raw Data | Entropy |
---|---|---|---|---|
.text | 0x00001000 | 0x000066b7 | 0x00006800 | 6.43786960119 |
.rdata | 0x00008000 | 0x00001358 | 0x00001400 | 5.10335860194 |
.data | 0x0000a000 | 0x0001fb78 | 0x00000600 | 4.12620988839 |
.ndata | 0x0002a000 | 0x00010000 | 0x00000000 | 0.0 |
.rsrc | 0x0003a000 | 0x0002ea78 | 0x0002ec00 | 2.35909605371 |
Name | Offset | Size | Language | Sub-language | File type |
---|---|---|---|---|---|
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_ICON | 0x00067e80 | 0x00000468 | LANG_ENGLISH | SUBLANG_ENGLISH_US | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 |
RT_DIALOG | 0x00068650 | 0x00000060 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
RT_DIALOG | 0x00068650 | 0x00000060 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
RT_DIALOG | 0x00068650 | 0x00000060 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
RT_DIALOG | 0x00068650 | 0x00000060 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
RT_GROUP_ICON | 0x000686b0 | 0x00000084 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
RT_MANIFEST | 0x00068738 | 0x0000033e | LANG_ENGLISH | SUBLANG_ENGLISH_US | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators |
Antivirus | Signature |
---|---|
Bkav | W32.AIDetectMalware |
Lionic | Clean |
Elastic | malicious (high confidence) |
ClamAV | Clean |
CMC | Clean |
CAT-QuickHeal | Trojan.Ghanarava.173260073429729c |
Skyhigh | BehavesLike.Win32.Downloader.tc |
ALYac | Trojan.GenericKD.71268863 |
Cylance | Unsafe |
Zillya | Dropper.Agent.Win32.574899 |
Sangfor | Downloader.Win32.Malgent.Vw3b |
CrowdStrike | win/malicious_confidence_100% (W) |
Alibaba | TrojanPSW:Win32/Malgent.eb026c33 |
K7GW | Trojan-Downloader ( 005b0bce1 ) |
K7AntiVirus | Trojan-Downloader ( 005b0bce1 ) |
huorong | TrojanDownloader/Agent.awp |
Baidu | Clean |
VirIT | Trojan.Win32.Genus.VAO |
Paloalto | generic.ml |
Symantec | Trojan Horse |
tehtris | Clean |
ESET-NOD32 | NSIS/TrojanDownloader.Agent.OBH |
APEX | Malicious |
Avast | NSIS:MalwareX-gen [Pws] |
Cynet | Malicious (score: 99) |
Kaspersky | HEUR:Trojan-Dropper.Win32.Agent.gen |
BitDefender | Trojan.GenericKD.71268863 |
NANO-Antivirus | Trojan.Win32.Drop.hnqzqi |
ViRobot | Clean |
MicroWorld-eScan | Trojan.GenericKD.71268863 |
Tencent | Nsis.Trojan-Downloader.Ader.Vdkl |
Sophos | Mal/Generic-S |
F-Secure | Trojan.TR/Drop.Agent.ojaga |
DrWeb | Trojan.PWS.Stealer.38454 |
VIPRE | Trojan.GenericKD.71268863 |
TrendMicro | TROJ_GEN.R002C0DEP25 |
McAfeeD | ti!8C7C39736CF9 |
Trapmine | Clean |
CTX | exe.trojan.generic |
Emsisoft | Trojan.GenericKD.71268863 (B) |
Ikarus | Trojan-Downloader.MSIL.Taily |
GData | Trojan.GenericKD.71268863 |
Webroot | Clean |
Varist | W32/Trojan.JQQW-9234 |
Avira | TR/AD.Nekark.wtkwl |
Antiy-AVL | Trojan[Dropper]/Win32.Agent |
Kingsoft | Win32.Troj.Undef.a |
Gridinsoft | Clean |
Xcitium | Malware@#2xlx64vw6ur4x |
Arcabit | Trojan.Generic.D43F79FF |
SUPERAntiSpyware | Clean |
ZoneAlarm | Clean |
Microsoft | Trojan:Win32/Malgent!MSR |
Detected | |
AhnLab-V3 | Malware/Win.Generic.C4627833 |
Acronis | Clean |
VBA32 | TrojanDownloader.Ajent |
TACHYON | Clean |
Malwarebytes | Generic.Malware/Suspicious |
Panda | Trj/CI.A |
Zoner | Clean |
TrendMicro-HouseCall | TROJ_GEN.R002C0DEP25 |
Rising | Dropper.Agent!8.2F (CLOUD) |
Yandex | Trojan.DR.Agent!kL0QngalAQE |
TrellixENS | Artemis!C3F84E4D4071 |
SentinelOne | Static AI - Suspicious PE |
MaxSecure | Trojan.Malware.202870010.susgen |
Fortinet | NSIS/Agent.OBH!tr |
AVG | NSIS:MalwareX-gen [Pws] |
DeepInstinct | MALICIOUS |
alibabacloud | Trojan[stealer]:Win/Stealerc.gen |
IRMA | Signature |
---|---|
Trend Micro SProtect (Linux) | Clean |
Avast Core Security (Linux) | Win32:Evo-gen [Trj] |
C4S ClamAV (Linux) | Clean |
Trellix (Linux) | Clean |
Sophos Anti-Virus (Linux) | Mal/Generic-S |
Bitdefender Antivirus (Linux) | Trojan.GenericKD.71268863 |
G Data Antivirus (Windows) | Virus: Trojan.GenericKD.71268863 (Engine A) |
WithSecure (Linux) | Trojan.TR/AD.Nekark.wtkwl |
ESET Security (Windows) | NSIS/TrojanDownloader.Agent.OBH trojan |
DrWeb Antivirus (Linux) | Trojan.PWS.Stealer.38454 |
ClamAV (Linux) | Clean |
eScan Antivirus (Linux) | Trojan.GenericKD.71268863(DB) |
Kaspersky Standard (Windows) | HEUR:Trojan-Dropper.Win32.Agent.gen |
Emsisoft Commandline Scanner (Windows) | Trojan.GenericKD.71268863 (B) |