× Бисквитките са забранени! Този сайт изисква бисквитките да бъдат разрешени, за да работи правилно.
SHA256: c87d47452100a797e435a637e4a6330dcb760572519a9468c68920a54b064f06
Име на файла: emotet_e1_c87d47452100a797e435a637e4a6330dcb760572519a9468c68920a...
Съотношение на разпознаване: 42 / 65
Дата на анализиране: 2019-03-21 21:40:01 UTC (преди 1 месец, 4 седмици) Преглед на последния
Антивирусен софтуер Резултат Версия на обновление
Acronis suspicious 20190321
Ad-Aware Trojan.GenericKD.41128768 20190321
AegisLab Trojan.Win32.Emotet.4!c 20190321
AhnLab-V3 Trojan/Win32.Emotet.C3112481 20190321
ALYac Trojan.GenericKD.41128768 20190321
Arcabit Trojan.Generic.D2739340 20190321
Avast Win32:DangerousSig [Trj] 20190321
AVG Win32:DangerousSig [Trj] 20190321
BitDefender Trojan.GenericKD.41128768 20190321
Comodo TrojWare.Win32.Emotet.CF@82z9am 20190321
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cyren W32/Trojan.KQYN-2926 20190321
DrWeb Trojan.Siggen8.18269 20190321
eGambit Unsafe.AI_Score_84% 20190321
Emsisoft Trojan.GenericKD.41128768 (B) 20190321
Endgame malicious (high confidence) 20190321
ESET-NOD32 a variant of Win32/Kryptik.CPES 20190321
Fortinet W32/Kryptik.GMRW!tr 20190321
GData Trojan.GenericKD.41128768 20190321
Ikarus Trojan.Win32.Crypt 20190321
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 004bd3231 ) 20190321
K7GW Trojan ( 004bd3231 ) 20190321
Kaspersky Trojan-Banker.Win32.Emotet.cpvl 20190321
Malwarebytes Trojan.Emotet 20190321
MAX malware (ai score=86) 20190321
McAfee Emotet-FMI!C36F5C50C968 20190321
McAfee-GW-Edition Emotet-FMI!C36F5C50C968 20190321
Microsoft Trojan:Win32/Emotet.AC!bit 20190321
eScan Trojan.GenericKD.41128768 20190321
Palo Alto Networks (Known Signatures) generic.ml 20190321
Panda Generic Malware 20190321
Qihoo-360 HEUR/QVM20.1.F708.Malware.Gen 20190321
Rising Trojan.Kryptik!8.8 (CLOUD) 20190321
SentinelOne (Static ML) DFI - Malicious PE 20190317
Sophos AV Mal/Emotet-Q 20190321
TACHYON Trojan/W32.Emotet.216328 20190321
Tencent Win32.Trojan.Falsesign.Swup 20190321
Trapmine malicious.high.ml.score 20190301
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THCBOAI 20190321
VBA32 BScope.Malware-Cryptor.Emotet 20190321
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cpvl 20190321
Alibaba 20190306
Antiy-AVL 20190321
Avast-Mobile 20190321
Avira (no cloud) 20190321
Babable 20180918
Baidu 20190318
Bkav 20190320
CAT-QuickHeal 20190320
ClamAV 20190321
CMC 20190321
Cybereason 20190109
F-Secure 20190321
Jiangmin 20190321
Kingsoft 20190321
NANO-Antivirus 20190321
SUPERAntiSpyware 20190321
Symantec Mobile Insight 20190220
TheHacker 20190320
TotalDefense 20190318
Trustlook 20190321
ViRobot 20190321
Yandex 20190321
Zillya 20190321
Zoner 20190321
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© 2006 Microsoft Corporation. All rights reserved.

Product Microsoft® Office Visio® 2007
Original name Tlimpt.exe
Internal name Tlimpt.exe
File version 12.0.4518.1014
Description Timeline Wizard command line exe
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 1:10 PM 3/22/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-20 01:52:00
Entry Point 0x0001E820
Number of sections 4
PE sections
Overlays
MD5 276d1cae617932556a919f83ccb84000
File type data
Offset 212992
Size 3336
Entropy 7.33
PE imports
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
RegQueryValueExA
RegCreateKeyW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueW
RegQueryValueExW
RegOpenKeyA
ConvertStringSidToSidW
OpenProcessToken
RegEnumKeyW
SetTokenInformation
RegOpenKeyW
RegQueryValueW
GetTokenInformation
DuplicateTokenEx
RegEnumKeyExW
GetLengthSid
CreateProcessAsUserW
RegDeleteValueW
RegSetValueExW
GetFileTitleW
GetTextMetricsW
SetMapMode
CombineRgn
PlayMetaFile
GetObjectType
CreateMetaFileW
SetColorAdjustment
SetWorldTransform
IntersectClipRect
OffsetWindowOrgEx
SetTextAlign
GetDCOrgEx
StretchDIBits
ScaleViewportExtEx
ArcTo
SetWindowExtEx
SetViewportExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
TextOutW
CreateFontIndirectW
GetClipBox
GetCurrentPositionEx
CreateRectRgnIndirect
EnumFontsA
GetPixel
PolyDraw
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
OffsetClipRgn
BitBlt
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
ExtEscape
Escape
SetArcDirection
DeleteObject
SetGraphicsMode
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
GetCharWidthW
SetStretchBltMode
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
EnumMetaFile
GetObjectW
CreateDCW
CreateHatchBrush
CreateDIBPatternBrushPt
ExtTextOutW
SelectClipPath
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
SelectObject
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreatePatternBrush
PolylineTo
SaveDC
ModifyWorldTransform
RestoreDC
SetMapperFlags
CreateBitmap
SetTextColor
MoveToEx
SetViewportOrgEx
GetDCPenColor
CreateCompatibleDC
PolyBezierTo
CreateFontW
GdiSwapBuffers
CreateRectRgn
GetClipRgn
GetEnhMetaFilePixelFormat
SetPolyFillMode
CopyMetaFileW
SetTextJustification
CreateSolidBrush
DPtoLP
CopyMetaFileA
StartDocW
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
CreateFileMappingA
GetFileAttributesA
WaitForSingleObject
BindIoCompletionCallback
HeapDestroy
DebugBreak
ContinueDebugEvent
GetFileAttributesW
DuplicateHandle
GetLocalTime
CreateJobObjectA
GetAtomNameW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetThreadLocale
GetLocaleInfoA
LocalAlloc
SetTimeZoneInformation
UnhandledExceptionFilter
OpenFileMappingA
ExitProcess
SetErrorMode
_llseek
FreeEnvironmentStringsW
GetEnvironmentStrings
lstrcatW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
WideCharToMultiByte
GetProcAddress
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
OutputDebugStringA
SetLocaleInfoW
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
OpenThread
TlsGetValue
GlobalFindAtomW
WriteProcessMemory
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetSystemDefaultLCID
GetModuleFileNameA
GetStringTypeExW
lstrcmpiW
FoldStringA
EnumSystemLocalesA
EnumResourceLanguagesW
SetConsoleCtrlHandler
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
GetPrivateProfileStringW
GetModuleHandleA
GetFullPathNameW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
FlushFileBuffers
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
GetDateFormatA
ExitThread
SetEnvironmentVariableA
TerminateProcess
FindAtomW
WriteConsoleA
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
CreateEventW
SetEndOfFile
DeleteAtom
GetVersion
InterlockedIncrement
GetNumberFormatW
WriteConsoleW
CloseHandle
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
MoveFileWithProgressW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
FreeLibrary
CopyFileW
GlobalSize
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
LCMapStringW
OpenProcess
CreateDirectoryA
DeleteFileA
CreateTimerQueueTimer
GetStartupInfoW
VirtualAllocEx
SetVolumeMountPointW
DeleteFileW
GlobalLock
GetPrivateProfileIntW
GetConsoleAliasesA
AddAtomW
GetProcessHeap
GetComputerNameW
GetTimeFormatW
lstrcpyW
VerifyVersionInfoA
GetFileSizeEx
GlobalReAlloc
CancelTimerQueueTimer
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
WTSGetActiveConsoleSessionId
CreateDirectoryW
HeapValidate
GetTimeFormatA
GetTempFileNameA
FindResourceW
FindFirstFileW
IsValidLocale
lstrcmpW
WaitForMultipleObjects
GetUserDefaultLCID
SetCommTimeouts
GetTimeZoneInformation
FindFirstVolumeA
EnumTimeFormatsA
SetCommState
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
GetCurrencyFormatW
LeaveCriticalSection
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
GlobalDeleteAtom
GetShortPathNameW
UnmapViewOfFile
lstrlenA
GlobalFree
GetConsoleCP
GetDefaultCommConfigW
LCMapStringA
CompareStringW
GetProcessTimes
SetProcessShutdownParameters
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
LockFile
lstrlenW
GetCPInfo
Process32NextW
CreateProcessW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
InterlockedCompareExchange
Process32FirstW
WritePrivateProfileStringW
SuspendThread
RaiseException
CompareStringA
GetConsoleMode
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GetCommState
GlobalFlags
SetConsoleTitleA
FindFirstFileA
OpenMutexW
lstrcpynA
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
ProcessIdToSessionId
FindResourceExW
GetLongPathNameW
DeviceIoControl
IsValidCodePage
HeapCreate
GetTempPathW
VirtualFree
Sleep
GetCurrentThread
SetThreadPriority
SetComputerNameExW
VirtualAlloc
ResetEvent
SHGetFileInfoA
SHGetFolderPathW
ShellExecuteExA
SHGetFileInfoW
DragQueryFileW
SHQueryRecycleBinW
ExtractIconW
SHInvokePrinterCommandW
ShellHookProc
DragFinish
SHInvokePrinterCommandA
SHGetIconOverlayIndexW
SHGetPathFromIDList
SHGetDesktopFolder
ShellExecuteExW
SHCreateProcessAsUserW
SHGetSpecialFolderPathW
SHGetMalloc
ExtractAssociatedIconA
PathIsUNCW
StrStrIA
StrCmpNA
PathFindFileNameW
PathFileExistsW
PathRemoveFileSpecW
StrRStrIA
PathAddBackslashW
PathAppendW
PathFindExtensionW
StrCmpIW
PathStripToRootW
SHGetValueW
PathRemoveExtensionW
MapWindowPoints
EnumWindowStationsA
GetMessagePos
SetMenuItemBitmaps
LoadBitmapW
SetRectEmpty
DestroyMenu
PostQuitMessage
GetWindowContextHelpId
SetWindowPos
GetClipboardViewer
GetNextDlgTabItem
OemToCharBuffA
GrayStringW
EndPaint
ScrollWindowEx
OpenIcon
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
DdeInitializeA
GetDlgCtrlID
SendMessageW
UnregisterClassA
IsDialogMessageW
EndMenu
UnregisterClassW
GetClientRect
GetDlgItemTextW
SetScrollPos
GetThreadDesktop
CallNextHookEx
ClientToScreen
GetTopWindow
GetWindowTextW
GetAltTabInfo
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
DrawTextW
PtInRect
GetParent
UpdateWindow
GetPropW
EqualRect
GetMenuState
SetProcessDefaultLayout
ShowWindow
SetPropW
ValidateRect
GetClipboardFormatNameA
PeekMessageW
InsertMenuItemW
SetWindowPlacement
CharUpperW
GetClassInfoW
GetSystemMenu
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetWindow
GetDlgItemInt
GetMenuBarInfo
CharNextExA
PaintDesktop
SetParent
RegisterClassW
GetWindowPlacement
LoadStringW
DdeConnect
GetKeyboardLayoutList
DrawMenuBar
IsWindow
IsIconic
TrackPopupMenuEx
GetSubMenu
SetTimer
GetActiveWindow
ShowOwnedPopups
FillRect
CopyRect
GetSysColorBrush
GetDialogBaseUnits
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetWindowInfo
GetMenuItemInfoW
IsChild
SetFocus
RegisterWindowMessageW
DrawAnimatedRects
SetCapture
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
GetGUIThreadInfo
KillTimer
MapVirtualKeyW
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
CreateDialogIndirectParamW
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
SendDlgItemMessageW
PostMessageW
GetKeyNameTextW
EndDialog
DrawTextExW
CreatePopupMenu
CheckDlgButton
GetClassLongW
GetLastActivePopup
GetForegroundWindow
SetWindowTextW
GetDCEx
GetDlgItem
RemovePropW
BringWindowToTop
ScreenToClient
TrackPopupMenu
CheckRadioButton
GetMenuItemCount
IsDlgButtonChecked
BeginDeferWindowPos
SetDlgItemInt
SetWindowsHookExW
LoadCursorW
LoadIconW
ReuseDDElParam
GetDC
InsertMenuW
SetForegroundWindow
GetMenuStringW
EnableWindow
IntersectRect
GetScrollInfo
GetMessageW
GetCapture
RealGetWindowClass
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
MessageBoxW
GetMenu
DestroyIcon
UnhookWindowsHookEx
MoveWindow
DdePostAdvise
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetMenuItemRect
GetSysColor
SetDlgItemTextW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
EnableMenuItem
IsWindowVisible
WinHelpW
GetDesktopWindow
UnpackDDElParam
SystemParametersInfoW
UnionRect
DispatchMessageW
SetRect
DeleteMenu
InvalidateRect
DdeQueryConvInfo
CallWindowProcW
GetClassNameW
DestroyWindow
ModifyMenuW
UnregisterDeviceNotification
IsRectEmpty
CopyAcceleratorTableW
GetFocus
wsprintfW
CheckMenuItem
TranslateAcceleratorW
SetMenu
SetCursor
ReadClassStg
CoInitializeEx
CoUninitialize
OleRegGetUserType
CoTaskMemAlloc
CreateBindCtx
ReleaseStgMedium
CLSIDFromString
SetConvertStg
CoCreateInstance
WriteClassStg
CoInitializeSecurity
StringFromCLSID
ReadFmtUserTypeStg
CoDisconnectObject
CoInitialize
OleDuplicateData
CoTaskMemFree
CoTreatAsClass
StringFromGUID2
WriteFmtUserTypeStg
Number of PE resources by type
RT_ICON 9
RT_VERSION 1
RT_RCDATA 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 12
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
88576

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
12.0.4518.1014

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Timeline Wizard command line exe

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
9.0

EntryPoint
0x1e820

OriginalFileName
Tlimpt.exe

MIMEType
application/octet-stream

LegalCopyright
2006 Microsoft Corporation. All rights reserved.

LegalTrademarks2
Windows is a registered trademark of Microsoft Corporation.

FileVersion
12.0.4518.1014

LegalTrademarks1
Microsoft is a registered trademark of Microsoft Corporation.

TimeStamp
2019:03:20 02:52:00+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Tlimpt.exe

ProductVersion
12.0.4518.1014

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
123392

ProductName
Microsoft Office Visio 2007

ProductVersionNumber
12.0.4518.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 c36f5c50c968d63017ef351f67349446
SHA1 aa6f9c12e5f7ebe50091066137f27907342dfd1d
SHA256 c87d47452100a797e435a637e4a6330dcb760572519a9468c68920a54b064f06
ssdeep
6144:bkLpACxwnnaXYJkp6qp/bNmYvDuZx+bG1NG:QpAXncZRbcXZx+Qs

authentihash 05ba8b13c809d0d293b015f117211793da24a6e7ed7aff8b07fbfda69e658ed1
imphash 0effed9734e66acea03f7c61f2a426f7
File size 211.3 KB ( 216328 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-20 01:58:35 UTC (преди 2 месеци)
Last submission 2019-03-20 05:04:12 UTC (преди 2 месеци)
Имена на файла Tlimpt.exe
emotet_e1_c87d47452100a797e435a637e4a6330dcb760572519a9468c68920a54b064f06_2019-03-20__020002.exe_
Няма коментари. Никой не е коментирал това, бъдете първи!

Оставете своя коментар…

?
Публикуване

Не сте влезли в акаунта си. Само регистрирани потребители могат да коментират. Влезте и оставете своя коментар!

Няма гласове. Никой не е гласувал за това все още, бъдете първи!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections