× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 053e30092604ddc50fd7d95f99ee8987652f3b88ff60b6ee74856cabca262cff
File name: KuEQulpjMMac1UrKH.exe
Detection ratio: 16 / 70
Analysis date: 2019-01-20 13:04:31 UTC ( 4 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
CAT-QuickHeal Trojan.Emotet.X4 20190120
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.ea87e1 20190109
Cylance Unsafe 20190120
eGambit Unsafe.AI_Score_99% 20190120
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
K7GW Hacktool ( 700007861 ) 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Fuerboos.C!cl 20190120
Rising Trojan.Fuerboos!8.EFC8 (TFE:dGZlOgNUKZC6Vn1mSA) 20190120
SentinelOne (Static ML) static engine - malicious 20190118
Sophos AV Mal/EncPk-OJ 20190119
Symantec ML.Attribute.HighConfidence 20190119
Trapmine malicious.high.ml.score 20190102
Ad-Aware 20190120
AegisLab 20190120
AhnLab-V3 20190120
Alibaba 20180921
ALYac 20190120
Antiy-AVL 20190120
Arcabit 20190120
Avast 20190120
Avast-Mobile 20190117
AVG 20190120
Avira (no cloud) 20190120
AVware 20180925
Babable 20180917
Baidu 20190117
BitDefender 20190120
Bkav 20190118
ClamAV 20190120
CMC 20190120
Comodo 20190120
Cyren 20190120
DrWeb 20190120
Emsisoft 20190120
ESET-NOD32 20190120
F-Prot 20190120
F-Secure 20190119
Fortinet 20190120
GData 20190120
Jiangmin 20190120
K7AntiVirus 20190119
Kaspersky 20190120
Kingsoft 20190120
Malwarebytes 20190120
MAX 20190120
McAfee 20190120
eScan 20190120
NANO-Antivirus 20190120
Palo Alto Networks (Known Signatures) 20190120
Panda 20190120
Qihoo-360 20190120
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190120
TheHacker 20190118
TotalDefense 20190119
TrendMicro 20190120
TrendMicro-HouseCall 20190120
Trustlook 20190120
VBA32 20190118
ViRobot 20190120
Webroot 20190120
Yandex 20190117
Zillya 20190118
ZoneAlarm by Check Point 20190120
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-20 13:00:33
Entry Point 0x0001BAD3
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetFontLanguageInfo
StrokePath
GetCurrentPositionEx
GetPolyFillMode
GetSystemWindowsDirectoryA
GetOverlappedResult
DeactivateActCtx
GetTapeStatus
GetThreadLocale
FlushFileBuffers
GetLocalTime
GetVolumePathNamesForVolumeNameW
IsWow64Process
GetAtomNameA
GetVolumeInformationA
GetWindowsDirectoryA
GetConsoleMode
WriteProfileStringA
GetConsoleCursorInfo
GetCurrentDirectoryA
GetShortPathNameA
GetLogicalDrives
MapViewOfFile
GetTapePosition
GetPrivateProfileIntW
GetSystemPowerStatus
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
GetModuleFileNameW
GetModuleHandleA
ReadFile
GlobalAddAtomA
FindResourceExW
GetCurrentProcess
GetExitCodeThread
GetComputerNameExW
IsValidLocale
GetPrivateProfileSectionW
LocalFree
GetThreadSelectorEntry
FindAtomW
GetTimeZoneInformation
DebugActiveProcess
GetPrivateProfileStringA
GetFileType
LocalUnlock
FlsGetValue
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
GetMenuPosFromID
SHDeleteValueA
LoadCursorW
FindWindowW
ExcludeUpdateRgn
GetComboBoxInfo
PostQuitMessage
FlashWindowEx
GetMenuState
ReleaseCapture
LookupIconIdFromDirectoryEx
GetWindowRgn
LockWorkStation
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
DeferWindowPos
CreateIconFromResource
GetDialogBaseUnits
GetWindowLongW
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
strcmp
fgetws
fputws
CoTaskMemFree
MkParseDisplayName
CoUninitialize
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:20 05:00:33-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
126976

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1bad3

InitializedDataSize
101376

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 bdf677cc8e63a0d2d630686b26721c68
SHA1 a4f94b8ea87e189ac730f7c85ae273afe0038cbf
SHA256 053e30092604ddc50fd7d95f99ee8987652f3b88ff60b6ee74856cabca262cff
ssdeep
3072:fDYQI28fAtIuRv2bJ39+sLY1Mjinrt5Xou9XyyxorhVnNX3RwWd+ThhS6:fD628fKIuRsJNPUMGnrHoulyX

authentihash 4d771db83d86c883190947685c8ece423aef72ed42ebeee7b95d64d1d58d7da4
imphash 16e2f333204733e0f4984604389f7d09
File size 215.0 KB ( 220160 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-20 13:04:31 UTC ( 4 weeks ago )
Last submission 2019-01-20 13:04:31 UTC ( 4 weeks ago )
File names KuEQulpjMMac1UrKH.exe
MISCUTIL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!