File Name | KMT Client v5.0.EXE |
File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Scanner Version | 1.0.214.174 |
Database Version | 2025-04-16 19:00:17 UTC |
Malware family: Generic
Hash Type | Value | Action |
---|---|---|
MD5 |
2bb4fb3758fe37e1516063400ce8f0d7
|
|
SHA1 |
e8f8d6cbf9915e59f79af687a4311ec989e58f8b
|
|
SHA256 |
7a5d16d54dd8b81e4bb829f04a9f0c38508beec30175262fb48f00356ce57449
|
|
SHA512 |
4662da4a1f8fa2ae17c67796b0f74ecd717940dc3c924afa354404de6df3ba7b8857aac61cd26091ab965bbf5d73a138c0188d07d264b7c008eec48cef44c10a
|
|
ImpHash |
8d92fa1956a6a631c642190121740197
|
Icon |
Hash: cf3ec2d8f050958a6e765b227dc28a6f
Fuzzy: 48509d2d743a31fff79454d56c2088e4 dHash: d2a2e8d0f8e8e0e0 |
Image Base | 0x00400000 |
Entry Point | 0x004015eb |
Compilation Time | 2013-06-28 14:45:44 |
Checksum | 0x00011163 (Actual: 0x0082f902) |
OS Version | 5.0 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Digital Signature | No valid SignedData structure was found. |
Imports |
4 libraries
SHLWAPI, KERNEL32, USER32, ADVAPI32 |
Exports | 0 functions |
Resources | 5 Resources |
Sections | 5 Sections |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
36,180 bytes | 36,352 bytes | 6.56 (Compressed) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
40B6C3AD804DB9BC09242ADE61FB6EA3 |
.rdata |
0x0000a000 |
8,468 bytes | 8,704 bytes | 5.44 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
33D023D2D6213E1F615883E5E3160E76 |
.data |
0x0000d000 |
10,972 bytes | 4,096 bytes | 2.10 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
3254D8738887635AC7C58C51F4E91ADF |
.rsrc |
0x00010000 |
8,477,464 bytes | 8,477,696 bytes | 7.99 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D161D33102507DCEA49AC2F6C2A8EEE2 |
.reloc |
0x00826000 |
3,818 bytes | 4,096 bytes | 4.33 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
65AAC020A14AA9271485B36B38AC2718 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
1 section(s) with elevated entropy (≥6.5) - possible compression
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 1 | 67,624 bytes | |
RT_RCDATA | 2 | 8,404,963 bytes | |
RT_GROUP_ICON | 1 | 4,118 bytes | |
RT_MANIFEST | 1 | 357 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
No valid SignedData structure was found.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Malware.Win32.Generic.cld without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system