File Name | cls-lolly_x86.exe |
File Type |
PE32 executable (console) Intel 80386, for MS Windows
|
Scanner Version | 1.0.171.174 |
Database Version | 2024-04-14 02:00:30 UTC |
Malware family: Agent
Hash Type | Value | Action |
---|---|---|
MD5 |
9a993745face8b99d0c3b873a0b7627a
|
|
SHA1 |
cb1897db519fa5613f3f8fe2b13a012f7df0df7d
|
|
SHA256 |
97359790449fc59577d9d5d0ebcefd289d1cf95bb632ef58286f39b744c5313e
|
|
SHA512 |
25388a09f1f9b276b0b1506733cb422cb7bb0ccefa6be383a68cecda12e290d0555ac2891e214115df1ce964654a6c42af7c11c69422b09fa59e1e5d9d45f6c9
|
|
ImpHash |
cc5a8881d6ade13a551a33d1afa7de58
|
Image Base | 0x00400000 |
Entry Point | 0x00407ce0 |
Compilation Time | 2017-09-09 09:24:18 |
Checksum | 0x00000000 (Actual: 0x0002b740) |
OS Version | 5.1 |
PEiD Signatures |
PE32 executable (console) Intel 80386, for MS Windows
|
Digital Signature | The PE file does not contain a certificate table. |
Imports |
3 libraries
KERNEL32, USER32, ADVAPI32 |
Exports | 0 functions |
Resources | 0 Resources |
Sections | 2 Sections |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
137,380 bytes | 137,728 bytes | 6.76 (Compressed) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
F5ED79B130A2FE0E6C44E0072B921051 |
.idata |
0x00023000 |
1,370 bytes | 1,536 bytes | 4.90 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
E88F8E9335535C48C504C71531DF9A36 |
1 section(s) with elevated entropy (≥6.5) - possible compression
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Win32.Agent.oa without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system