2013-06-04 08:42:23
e8e771a6af2684c43e1bb25b455085f1
| UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser |
| Name | Virtual Address | Virtual Size | Size of Raw Data | Entropy |
|---|---|---|---|---|
| UPX0 | 0x00001000 | 0x0000d000 | 0x00000000 | 0.0 |
| UPX1 | 0x0000e000 | 0x00009000 | 0x00008400 | 7.87557843845 |
| .rsrc | 0x00017000 | 0x00002000 | 0x00001800 | 3.87331943462 |
| Name | Offset | Size | Language | Sub-language | File type |
|---|---|---|---|---|---|
| RT_CURSOR | 0x000125c8 | 0x00000134 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_BITMAP | 0x00012bbc | 0x000000d8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_BITMAP | 0x00012bbc | 0x000000d8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_BITMAP | 0x00012bbc | 0x000000d8 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_ICON | 0x00017e78 | 0x00000128 | LANG_HEBREW | SUBLANG_DEFAULT | Device independent bitmap graphic, 16 x 32 x 4, image size 192 |
| RT_ICON | 0x00017e78 | 0x00000128 | LANG_HEBREW | SUBLANG_DEFAULT | Device independent bitmap graphic, 16 x 32 x 4, image size 192 |
| RT_MENU | 0x0001397c | 0x000001c4 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_MENU | 0x0001397c | 0x000001c4 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_DIALOG | 0x00014174 | 0x00000336 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_DIALOG | 0x00014174 | 0x00000336 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_DIALOG | 0x00014174 | 0x00000336 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_DIALOG | 0x00014174 | 0x00000336 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_DIALOG | 0x00014174 | 0x00000336 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_STRING | 0x00014860 | 0x00000068 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_ACCELERATOR | 0x000148c8 | 0x00000048 | LANG_HEBREW | SUBLANG_DEFAULT | data |
| RT_GROUP_CURSOR | 0x00014910 | 0x00000014 | LANG_ENGLISH | SUBLANG_ENGLISH_US | data |
| RT_GROUP_ICON | 0x00017fbc | 0x00000014 | LANG_HEBREW | SUBLANG_DEFAULT | data |
| RT_GROUP_ICON | 0x00017fbc | 0x00000014 | LANG_HEBREW | SUBLANG_DEFAULT | data |
| RT_VERSION | 0x00017fd4 | 0x000002d8 | LANG_HEBREW | SUBLANG_DEFAULT | data |
| RT_MANIFEST | 0x000182b0 | 0x0000016a | LANG_ENGLISH | SUBLANG_ENGLISH_US | ASCII text, with CRLF line terminators |
| Antivirus | Result |
|---|---|
| Bkav | None |
| Lionic | None |
| Elastic | Malicious (Moderate Confidence) |
| ClamAV | None |
| CMC | None |
| CAT-QuickHeal | Hacktool.Operapass.Sd4 |
| Skyhigh | Htool-Passview |
| ALYac | None |
| Cylance | Unsafe |
| Zillya | Tool.Netpass.Win32.2488 |
| Sangfor | Pup.Win32.Netpass.V2ov |
| CrowdStrike | Win/Grayware_Confidence_100% (W) |
| Alibaba | None |
| K7GW | Password-Stealer ( 005d76c01 ) |
| K7AntiVirus | Password-Stealer ( 005d76c01 ) |
| huorong | Hacktool/Operapassview.A |
| Baidu | None |
| VirIT | None |
| Paloalto | Generic.Ml |
| Symantec | Passwordrevealer |
| tehtris | None |
| ESET-NOD32 | Win32/Pswtool.Operapassview Potentially Unsafe Application |
| APEX | Malicious |
| Avast | Win32:Pswtool-Ao [Pup] |
| Cynet | Malicious (Score: 99) |
| Kaspersky | Not-A-Virus:Pswtool.Win32.Netpass.Bsd |
| BitDefender | Gen:Application.Heur.Cmkfkw5!5wfo |
| NANO-Antivirus | None |
| ViRobot | Pswtool.Netpass.40960.E |
| MicroWorld-eScan | Gen:Application.Heur.Cmkfkw5!5wfo |
| Tencent | None |
| Sophos | Nirsoft Opera Password Viewer (Pua) |
| F-Secure | None |
| DrWeb | Tool.Passview.793 |
| VIPRE | Gen:Application.Heur.Cmkfkw5!5wfo |
| TrendMicro | Hktl_Passview |
| McAfeeD | Ti!8e4b218bdbd8 |
| Trapmine | None |
| CTX | Exe.Hacktool.Netpass |
| Emsisoft | Gen:Application.Heur.Cmkfkw5!5wfo (B) |
| Ikarus | None |
| GData | Gen:Application.Heur.Cmkfkw5!5wfo |
| Jiangmin | Pswtool.Netpass.Pc |
| Webroot | None |
| Varist | W32/S-2d44635c!Eldorado |
| Avira | None |
| Antiy-AVL | Hacktool/Win32.Paasview |
| Kingsoft | None |
| Gridinsoft | Trojan.Win32.Agent.Dg |
| Xcitium | Malware@#30lfngyqlknqz |
| Arcabit | Application.Heur.Cmkfkw5!5wfo |
| SUPERAntiSpyware | None |
| ZoneAlarm | None |
| Microsoft | Hacktool:Win32/Netpass!Msr |
| Detected | |
| AhnLab-V3 | Unwanted/Win.Operapassview.C5794269 |
| Acronis | None |
| VBA32 | None |
| TACHYON | None |
| Malwarebytes | Pup.Optional.Operapasswordtool |
| Panda | None |
| Zoner | None |
| TrendMicro-HouseCall | Hktl_Passview |
| Rising | Trojan.Win32.Generic.1902f819 (C64:Yzy0oohqjzgonkyo) |
| Yandex | Trojan.Igent.Buwz54.9 |
| TrellixENS | Htool-Passview |
| SentinelOne | None |
| MaxSecure | Trojan.Malware.73379609.Susgen |
| Fortinet | Riskware/Netpass |
| AVG | Win32:Pswtool-Ao [Pup] |
| DeepInstinct | Malicious |
| alibabacloud | Hacktool:Win/Pswtool.Operapassview |
| IRMA | Signature |
|---|---|
| Trend Micro SProtect (Linux) | Clean |
| Avast Core Security (Linux) | Win32:PSWtool-AO [PUP] |
| C4S ClamAV (Linux) | YARA.UPX.UNOFFICIAL |
| Trellix (Linux) | Clean |
| Sophos Anti-Virus (Linux) | Clean |
| Bitdefender Antivirus (Linux) | Gen:Application.Heur.cmKfkW5!5WfO |
| G Data Antivirus (Windows) | Virus: Gen:Application.Heur.cmKfkW5!5WfO (Engine A) |
| WithSecure (Linux) | PotentiallyUnwanted:W32/App.cab798294b!Online |
| ESET Security (Windows) | Clean |
| DrWeb Antivirus (Linux) | Clean |
| ClamAV (Linux) | Clean |
| eScan Antivirus (Linux) | Gen:Application.Heur.cmKfkW5!5WfO(DB) |
| Kaspersky Standard (Windows) | Clean |
| Emsisoft Commandline Scanner (Windows) | Clean |