× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5
Dateiname: hidden-tear.exe
Erkennungsrate: 31 / 61
Analyse-Datum: 2017-06-06 21:33:17 UTC ( vor 1 Jahr, 10 Monate ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Ad-Aware Gen:Heur.Ransom.HiddenTears.1 20170606
AhnLab-V3 Trojan/Win32.Agent.R170959 20170606
ALYac Gen:Heur.Ransom.HiddenTears.1 20170606
Arcabit Trojan.Ransom.HiddenTears.1 20170606
Avast Win32:Evo-gen [Susp] 20170606
AVG Ransom.HiddenTear 20170606
BitDefender Gen:Heur.Ransom.HiddenTears.1 20170606
CAT-QuickHeal Ransom.Ryzerlo.S4 20170606
Comodo TrojWare.MSIL.Ransom.Ryzerlo.A 20170606
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170420
Cyren W32/S-9f9d40c6!Eldorado 20170606
DrWeb Trojan.Encoder.10598 20170606
Emsisoft Gen:Heur.Ransom.HiddenTears.1 (B) 20170606
ESET-NOD32 a variant of MSIL/Filecoder.Y 20170606
F-Prot W32/S-9f9d40c6!Eldorado 20170606
F-Secure Gen:Heur.Ransom.HiddenTears.1 20170606
Fortinet MSIL/Filecoder.Y!tr 20170606
GData MSIL.Trojan-Ransom.Cryptear.X 20170606
Ikarus Trojan-Ransom.HiddenTear 20170606
Sophos ML ransom.msil.ryzerlo.a 20170604
Kaspersky HEUR:Trojan.Win32.Generic 20170606
Malwarebytes Ransom.HiddenTear 20170606
Microsoft Ransom:MSIL/Ryzerlo.A 20170606
eScan Gen:Heur.Ransom.HiddenTears.1 20170606
SentinelOne (Static ML) static engine - malicious 20170516
Sophos AV Mal/Cryptear-A 20170606
Symantec Ransom.HiddenTear 20170606
TrendMicro Ransom_CRYPTEAR.SM 20170606
TrendMicro-HouseCall Ransom_CRYPTEAR.SM 20170606
Webroot W32.Trojan.Gen 20170606
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20170606
AegisLab 20170606
Alibaba 20170606
Antiy-AVL 20170606
Avira (no cloud) 20170606
AVware 20170606
Baidu 20170601
Bkav 20170606
ClamAV 20170606
CMC 20170606
Endgame 20170515
Jiangmin 20170606
K7AntiVirus 20170606
K7GW 20170606
Kingsoft 20170606
McAfee 20170606
McAfee-GW-Edition 20170606
NANO-Antivirus 20170606
nProtect 20170606
Palo Alto Networks (Known Signatures) 20170606
Panda 20170606
Qihoo-360 20170606
Rising 20170606
SUPERAntiSpyware 20170606
Symantec Mobile Insight 20170605
Tencent 20170606
TheHacker 20170605
Trustlook 20170606
VBA32 20170606
VIPRE 20170606
ViRobot 20170606
WhiteArmor 20170601
Yandex 20170606
Zillya 20170606
Zoner 20170606
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2015

Product hidden-tear
Original name hidden-tear.exe
Internal name hidden-tear.exe
File version 1.0.0.0
Description hidden-tear
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-06-04 21:22:13
Entry Point 0x0001CB9A
Number of sections 3
.NET details
Module Version ID 99917c52-f348-405d-ba6d-d1b1a6a410ad
TypeLib ID 7ab0dd04-43e0-4d89-be59-60a30b766467
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 5
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 8
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

LinkerVersion
48.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
102400

EntryPoint
0x1cb9a

OriginalFileName
hidden-tear.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015

FileVersion
1.0.0.0

TimeStamp
2017:06:04 22:22:13+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
hidden-tear.exe

ProductVersion
1.0.0.0

FileDescription
hidden-tear

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
109568

ProductName
hidden-tear

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 9856fd639232ffec3fb3ed658a14bdc5
SHA1 8221164cb79d53c444b64e5e9cfe5c65d8254c5e
SHA256 2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5
ssdeep
3072:P1+M+lmsolAIrRuw+mqv9j1MWLQwMTmmsolNIrRuw+mqv9j1MWLQA:PX+lDAA6TmDAN

authentihash 8282706dfe5397dcaaeff8cc1be4aebca631ed5b0adf46dd6ce1970552d34618
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 207.5 KB ( 212480 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (62.0%)
Win64 Executable (generic) (23.3%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.8%)
Win16/32 Executable Delphi generic (1.7%)
Tags
peexe assembly

VirusTotal metadata
First submission 2017-06-06 21:33:17 UTC ( vor 1 Jahr, 10 Monate )
Last submission 2017-07-03 13:45:09 UTC ( vor 1 Jahr, 9 Monate )
Dateinamen 2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5.exe
hidden-tear.exe
MSIL.Trojan-Ransom.Cryptear.X.exe
2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5.exe
2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5.exe
2c0e21f49d35e86ba566d8359a064b30a8dcbe52cf99be2ae29308ac29209ed5.exe
Behaviour characterization
Zemana
dll-injection

Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!