× Бисквитките са забранени! Този сайт изисква бисквитките да бъдат разрешени, за да работи правилно.
SHA256: 6fde50df298fb6391aaff03fd40e853f632816f1b9a98cd84530f642e6df65ae
Име на файла: PATRICK18MARCH_outputF84DC0.exe
Съотношение на разпознаване: 24 / 66
Дата на анализиране: 2018-03-19 04:40:04 UTC (преди 1 година, 2 месеци) Преглед на последния
Антивирусен софтуер Резултат Версия на обновление
Ad-Aware Gen:Variant.Razy.277402 20180319
ALYac Gen:Variant.Razy.277402 20180319
Arcabit Trojan.Razy.D43B9A 20180319
Avast Win32:Malware-gen 20180319
AVG Win32:Malware-gen 20180319
BitDefender Gen:Variant.Razy.277402 20180319
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20170201
Cylance Unsafe 20180319
Emsisoft Gen:Variant.Razy.277402 (B) 20180319
Endgame malicious (high confidence) 20180316
F-Secure Gen:Variant.Razy.277402 20180319
Fortinet W32/Injector.DSOV!tr 20180319
GData Gen:Variant.Razy.277402 20180319
Ikarus Win32.Outbreak 20180318
Sophos ML heuristic 20180121
Kaspersky UDS:DangerousObject.Multi.Generic 20180319
MAX malware (ai score=85) 20180319
McAfee Artemis!92C2C5BCBEA7 20180319
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.fm 20180319
eScan Gen:Variant.Razy.277402 20180319
Palo Alto Networks (Known Signatures) generic.ml 20180319
Qihoo-360 HEUR/QVM03.0.EB81.Malware.Gen 20180319
SentinelOne (Static ML) static engine - malicious 20180225
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180319
AegisLab 20180319
AhnLab-V3 20180318
Alibaba 20180319
Antiy-AVL 20180319
Avast-Mobile 20180318
Avira (no cloud) 20180318
AVware 20180319
Baidu 20180317
Bkav 20180317
CAT-QuickHeal 20180318
ClamAV 20180319
CMC 20180319
Comodo 20180319
Cybereason None
Cyren 20180319
DrWeb 20180319
eGambit 20180319
ESET-NOD32 20180318
F-Prot 20180319
Jiangmin 20180319
K7AntiVirus 20180319
K7GW 20180319
Kingsoft 20180319
Malwarebytes 20180318
Microsoft 20180319
NANO-Antivirus 20180319
nProtect 20180319
Panda 20180318
Rising 20180319
Sophos AV 20180319
SUPERAntiSpyware 20180318
Symantec 20180319
Symantec Mobile Insight 20180311
Tencent 20180319
TheHacker 20180316
TrendMicro 20180319
TrendMicro-HouseCall 20180319
Trustlook 20180319
VBA32 20180316
VIPRE 20180319
ViRobot 20180319
Webroot 20180319
WhiteArmor 20180223
Yandex 20180316
Zillya 20180316
Zoner 20180319
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
YIVUSbLOCada ltd.

Product IKARUS SEcUrItY SOFtwaRe GmbH
Original name Nonglazed6.exe
Internal name Nonglazed6
File version 6.00.0002
Description PURiNamI
Comments VEEEEGEEEEEEEE
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-18 23:19:23
Entry Point 0x000011C0
Number of sections 3
PE sections
PE imports
_adj_fdiv_m32
__vbaChkstk
_CIcos
EVENT_SINK_QueryInterface
_allmul
_adj_fdivr_m64
_adj_fprem
_adj_fpatan
EVENT_SINK_AddRef
_adj_fdiv_m32i
__vbaExceptHandler
__vbaSetSystemError
DllFunctionCall
__vbaFPException
_adj_fdivr_m16i
_adj_fdiv_r
Ord(100)
__vbaFreeVar
__vbaI2Str
_adj_fdiv_m64
__vbaStrCmp
__vbaFreeObj
__vbaHresultCheckObj
_CIsqrt
_CIsin
_CIlog
EVENT_SINK_Release
_adj_fptan
__vbaI4Var
_CIatan
__vbaNew2
__vbaLateIdCallLd
_adj_fdivr_m32i
_CIexp
_adj_fprem1
_adj_fdivr_m32
_CItan
__vbaFpI4
__vbaFreeStr
_adj_fdiv_m16i
Number of PE resources by type
RT_ICON 8
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 10
PE resources
ExifTool file metadata
CodeSize
282624

SubsystemVersion
4.0

Comments
VEEEEGEEEEEEEE

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
6.0.0.2

LanguageCode
Neutral

FileFlagsMask
0x0000

FileDescription
PURiNamI

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
32768

EntryPoint
0x11c0

OriginalFileName
Nonglazed6.exe

MIMEType
application/octet-stream

LegalCopyright
YIVUSbLOCada ltd.

FileVersion
6.00.0002

TimeStamp
2018:03:19 00:19:23+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Nonglazed6

ProductVersion
6.00.0002

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
FOVi-TEK

LegalTrademarks
TOShiYUKi MASUi

ProductName
IKARUS SEcUrItY SOFtwaRe GmbH

ProductVersionNumber
6.0.0.2

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 92c2c5bcbea708427bcb68116def91b5
SHA1 c7186dc0054a5508208273382f80c01a99598062
SHA256 6fde50df298fb6391aaff03fd40e853f632816f1b9a98cd84530f642e6df65ae
ssdeep
3072:TiFmpimU4c67ryAdxvRNI4vxN6psZ0kSbpQwS:+EpL5PyAde8HdZSS

authentihash 2c88f464119de1248b2873b8965ae17a88f207da743095c1c6b73cd1cd6f6bae
imphash b9f607d0baa10597d8f024c77135f6e1
File size 312.0 KB ( 319488 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (88.6%)
Win32 Executable (generic) (4.8%)
OS/2 Executable (generic) (2.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-19 04:17:51 UTC (преди 1 година, 2 месеци)
Last submission 2018-03-20 05:53:32 UTC (преди 1 година, 2 месеци)
Имена на файла Nonglazed6.exe
PATRICK18MARCH_outputF84DC0.exe
PATRICK18MARCH_outputF84DC0.exe
Nonglazed6
Няма коментари. Никой не е коментирал това, бъдете първи!

Оставете своя коментар…

?
Публикуване

Не сте влезли в акаунта си. Само регистрирани потребители могат да коментират. Влезте и оставете своя коментар!

Няма гласове. Никой не е гласувал за това все още, бъдете първи!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
TCP connections