Threat Database Trojans Trojan.MSIL.Agent.XSK

Trojan.MSIL.Agent.XSK

By CagedTech in Trojans

Threat Scorecard

Popularity Rank: 27,111
Threat Level: 80 % (High)
Infected Computers: 1
First Seen: September 25, 2025
Last Seen: April 24, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Trojan.MSIL.Agent.XSK
Signature status: No Signature

Known Samples

MD5: 6081f0f8159238f6b5359f442f58a156
SHA1: cb8a7c76032d9fa1f428c64f73a34577a1c6e2f0
SHA256: 6CEFBE04781676463380A17A427B4C11B7F2F510713EB53C53C8F4F0F4B464E1
File Size: 6.78 MB, 6777904 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is .NET application
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 4.0.0.0
Comments The Multi Tool is designed to perform multiple tasks in one application in order to improve scheduling performance.
Company Name Falcon Tweaks
File Description Falcon's MultiTool
File Version 4.0.0.0
Internal Name Falcon's MultiTool.exe
Legal Copyright Copyright © 2026 Falcon Tweaks.
Legal Trademarks ™ Falcon Tweaks. All rights reserved.
Original Filename Falcon's MultiTool.exe
Product Name Falcon's MultiTool
Product Version 4.0.0.0

File Traits

  • .NET
  • 2+ executable sections
  • HighEntropy
  • RijndaelManaged
  • x64

Block Information

Total Blocks: 872
Potentially Malicious Blocks: 162
Whitelisted Blocks: 147
Unknown Blocks: 563

Visual Map

? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 x 0 x 0 0 0 x ? ? x x 0 0 0 0 0 0 ? 0 x 0 0 0 0 0 0 x ? ? x 0 0 ? 0 0 ? x ? ? ? 0 0 0 0 ? ? x x x ? 0 x x x ? x x x x x x ? 0 0 0 ? 0 ? ? 0 ? 0 ? 0 0 ? 0 0 0 0 ? 0 0 0 0 x ? ? 0 0 x ? x x x x x ? x x ? x x ? ? x x ? x x x ? ? x x x ? ? ? ? ? x ? x ? 0 0 x x ? ? ? ? ? 0 0 ? ? ? x ? x ? 0 0 ? x ? 0 0 ? 0 0 ? ? x ? ? ? 0 0 ? ? x 0 0 ? ? x ? x ? 0 0 ? 0 0 0 0 0 0 ? ? ? 0 0 ? x ? ? ? ? 0 0 x ? 0 0 ? ? x 0 0 ? ? x x x 0 0 x 0 0 0 0 ? x x 0 0 ? ? 0 0 ? x x x 0 0 ? ? ? x ? 0 0 x 0 0 0 0 0 0 0 0 0 0 x x x x x x ? ? ? x ? ? 0 ? x ? x 0 0 0 0 ? 0 x x ? x x ? ? ? x ? ? ? 0 ? ? ? 0 0 ? 0 0 x x 0 ? ? ? ? 0 ? 0 0 x 0 0 x x x ? x ? ? ? ? x x x x 0 0 0 x x ? ? 0 x ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? x x x x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x 0 0 0 x ? ? ? ? ? ? ? ? ? ? ? x x ? 0 ? ? x ? ? ? x ? x ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? x x ? ? x ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? 0 0 0 ? 0 0 0 0 ? 0 ? ? 0 0 ? 0 ? ? 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? x x x x ? ? ? ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? ? x x ? x ? ? 0 ? ? ? ? ? ? ? ? x x ? ? x ? x ? x x ? ? x ? ? ? x x ? ? x ? ? ? ? ? ? ? ? ? ? ? x x ? x x x x ? x ? ? ? x x x ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? x ? x ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? x x ? x ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? x ? ? ? ? x x ? ? ? ? ? ? ? ? ? ? ? ? ? x x ? ? x x ? ? ? ? x ? ? ? ? x ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\2e8999ad-36a8-451f-9f70-f4efd3e73549.dll Generic Write,Read Attributes

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
Show More
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFlushProcessWriteBuffers
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtGetWriteWatch
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtResetWriteWatch
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtYieldExecution
  • UNKNOWN
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Encryption Used
  • BCryptOpenAlgorithmProvider
Other Suspicious
  • AdjustTokenPrivileges
Process Manipulation Evasion
  • ReadProcessMemory

Trending

Most Viewed

Loading...