× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0614084c4ebde7084dba2166395e084b508beae341b83bdcb1cfe36a5d36a717
File name: .
Detection ratio: 35 / 70
Analysis date: 2019-01-03 16:42:07 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKDZ.51903 20190103
AhnLab-V3 Trojan/Win32.Azden.R247451 20190103
ALYac Trojan.GenericKDZ.51903 20190103
Antiy-AVL Trojan[Banker]/Win32.IcedID 20190103
Arcabit Trojan.Generic.DCABF 20190103
Avast Win32:Trojan-gen 20190103
AVG Win32:Trojan-gen 20190103
BitDefender Trojan.GenericKDZ.51903 20190103
Cylance Unsafe 20190103
DrWeb Trojan.IcedID.15 20190103
Emsisoft Trojan.GenericKDZ.51903 (B) 20190103
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNPE 20190103
F-Secure Trojan.GenericKDZ.51903 20190103
Fortinet W32/Kryptik.GNPE!tr 20190103
GData Trojan.GenericKDZ.51903 20190103
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.IcedID.ef 20190103
Kaspersky HEUR:Trojan.Win32.Generic 20190103
Malwarebytes Trojan.MalPack.RV 20190103
MAX malware (ai score=88) 20190103
McAfee GenericRXGQ-JV!E3C45049A3F2 20190103
McAfee-GW-Edition GenericRXGQ-JV!E3C45049A3F2 20190103
Microsoft Trojan:Win32/Fuerboos.E!cl 20190103
eScan Trojan.GenericKDZ.51903 20190103
NANO-Antivirus Trojan.Win32.IcedID.fkvlep 20190103
Panda Trj/GdSda.A 20190102
Rising Trojan.GenKryptik!8.AA55 (RDM+:cmRtazo7z+hEsOFCB0LEK0h0i3K3) 20190103
Sophos AV Mal/Agent-ATR 20190103
SUPERAntiSpyware Trojan.Agent/Gen-MalPack 20190102
VBA32 BScope.TrojanDownloader.Upatre 20181229
Webroot W32.Trojan.Gen 20190103
Yandex Trojan.PWS.IcedID! 20181229
Zillya Trojan.Generic.Win32.399797 20190103
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20190103
Acronis 20181227
AegisLab 20190103
Alibaba 20180921
Avast-Mobile 20190103
Avira (no cloud) 20190103
Babable 20180918
Baidu 20190102
Bkav 20190103
CAT-QuickHeal 20190103
ClamAV 20190103
CMC 20190102
Comodo 20190103
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cyren 20190103
eGambit 20190103
F-Prot 20190103
Ikarus 20190103
K7AntiVirus 20190103
K7GW 20190103
Kingsoft 20190103
Palo Alto Networks (Known Signatures) 20190103
Qihoo-360 20190103
SentinelOne (Static ML) 20181223
Symantec 20190103
TACHYON 20190103
Tencent 20190103
TheHacker 20181230
TotalDefense 20190103
Trapmine 20190103
TrendMicro 20190103
TrendMicro-HouseCall 20190103
Trustlook 20190103
ViRobot 20190103
Zoner 20190103
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2003 Logic Solutions Loud. All rights reserved.

Product Dictionarythrough
Internal name Dictionarythrough
File version 10.7.95.74
Description Dictionarythrough
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-12-03 11:53:52
Entry Point 0x00001593
Number of sections 4
PE sections
PE imports
RegCreateKeyA
RegQueryValueExA
RegCloseKey
RestoreDC
StartDocA
CreateFontIndirectA
ExtTextOutA
StartPage
Rectangle
GetLastError
InterlockedDecrement
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
VirtualProtect
GetVersionExA
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetEnvironmentStrings
GetFileType
GetLocaleInfoA
GetCurrentProcessId
GetWindowsDirectoryA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
TlsFree
GetProcessHeap
InitializeCriticalSection
GetCPInfo
GetStringTypeA
GetModuleHandleA
SetSystemPowerState
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
TerminateProcess
QueryPerformanceCounter
WideCharToMultiByte
GetEnvironmentVariableA
HeapCreate
VirtualFree
GetEnvironmentStringsW
HeapDestroy
Sleep
FormatMessageA
GetTickCount
TlsSetValue
ExitProcess
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
SetLastError
LeaveCriticalSection
AppendMenuA
TrackPopupMenu
SetWindowsHookExA
DispatchMessageA
FillRect
PostMessageA
DrawIcon
LoadImageA
GetClassNameA
GetActiveWindow
IsWindowEnabled
CheckMenuRadioItem
DrawFrameControl
IsDialogMessageA
Number of PE resources by type
RT_ICON 9
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 10
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
528384

ImageVersion
0.0

ProductName
Dictionarythrough

FileVersionNumber
10.7.95.74

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
10.7.95.74

TimeStamp
2007:12:03 03:53:52-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
Dictionarythrough

ProductVersion
10.7.95.74

FileDescription
Dictionarythrough

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright 2003 Logic Solutions Loud. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Logic Solutions Loud

CodeSize
135168

FileSubtype
0

ProductVersionNumber
10.7.95.74

EntryPoint
0x1593

ObjectFileType
Executable application

File identification
MD5 e3c45049a3f25342cf365a006136b50f
SHA1 79de3be88f3b099b4906d99461a4877f5ff5d9bc
SHA256 0614084c4ebde7084dba2166395e084b508beae341b83bdcb1cfe36a5d36a717
ssdeep
6144:vZZu+6A9/abOFdGqCAFRmMgmFc2sU7c1:vZZu89/tAxAF4Mg32sU

authentihash 4a72b596b54c0e0da6c2b6ce513079cf72d78b830d6207fc07181f205c6710dd
imphash e22386be0b59ee417537238b65263968
File size 572.0 KB ( 585728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-03 16:42:07 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-03 16:42:07 UTC ( 1 month, 2 weeks ago )
File names Dictionarythrough
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.