× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0b3c5df5dfc1a0ade8dc764caf999c64f24d8d4ea6bd7d0bdfcfc22c40e88035
File name: c4c8207cb84bde59fca790da73fd9a3434b410a1
Detection ratio: 45 / 66
Analysis date: 2018-05-24 17:40:31 UTC ( 9 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30854330 20180524
AegisLab Ml.Attribute.Gen!c 20180524
ALYac Trojan.GenericKD.30854330 20180524
Antiy-AVL Trojan/Win32.Agent 20180524
Arcabit Trojan.Generic.D1D6CCBA 20180524
Avast Win32:Malware-gen 20180524
AVG Win32:Malware-gen 20180524
Avira (no cloud) TR/AD.Emotet.muasl 20180524
AVware Trojan.Win32.Generic!BT 20180524
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180524
BitDefender Trojan.GenericKD.30854330 20180524
Cylance Unsafe 20180524
Cyren W32/Trojan.EVVK-2059 20180524
Emsisoft Trojan.GenericKD.30854330 (B) 20180524
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GGZH 20180524
F-Secure Trojan.GenericKD.30854330 20180524
Fortinet W32/GenKryptik.CALT!tr 20180524
GData Win32.Trojan-Spy.Emotet.QM 20180524
Ikarus Trojan.Win32.Crypt 20180524
Sophos ML heuristic 20180503
K7AntiVirus Trojan ( 0053231b1 ) 20180524
K7GW Trojan ( 0053231b1 ) 20180524
Kaspersky Trojan.Win32.Agent.qwgoig 20180524
Malwarebytes Trojan.Emotet 20180524
MAX malware (ai score=94) 20180524
McAfee Emotet-FDM!A8E3FEDF90FB 20180524
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20180524
Microsoft Trojan:Win32/Tiggre!plock 20180524
eScan Trojan.GenericKD.30854330 20180524
NANO-Antivirus Trojan.Win32.Kryptik.fcnhue 20180524
Palo Alto Networks (Known Signatures) generic.ml 20180524
Panda Trj/GdSda.A 20180524
Qihoo-360 HEUR/QVM20.1.5641.Malware.Gen 20180524
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANX 20180524
Symantec Trojan.Emotet 20180524
TrendMicro TROJ_GEN.F0C2C00EN18 20180524
TrendMicro-HouseCall TROJ_GEN.F0C2C00EN18 20180524
VBA32 BScope.Trojan.Cloxer 20180524
VIPRE Trojan.Win32.Generic!BT 20180524
ViRobot Trojan.Win32.Z.Highconfidence.184320.B 20180524
Webroot W32.Trojan.Emotet 20180524
Yandex Trojan.Agent!pRIQSdD1CaA 20180524
ZoneAlarm by Check Point Trojan.Win32.Agent.qwgoig 20180524
AhnLab-V3 20180524
Alibaba 20180524
Avast-Mobile 20180524
Babable 20180406
Bkav 20180524
CAT-QuickHeal 20180524
ClamAV 20180521
CMC 20180524
Comodo 20180524
CrowdStrike Falcon (ML) 20180202
Cybereason None
DrWeb 20180524
eGambit 20180524
F-Prot 20180524
Jiangmin 20180524
Kingsoft 20180524
nProtect 20180524
Rising 20180524
SUPERAntiSpyware 20180524
Symantec Mobile Insight 20180522
Tencent 20180524
TheHacker 20180524
TotalDefense 20180524
Trustlook 20180524
Zillya 20180524
Zoner 20180524
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name Wwapi.dll
Internal name Wwapi.dll
File version 08.01.02.00 (win7_rtm.090713-1255)
Description WWAN API
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-23 00:45:21
Entry Point 0x000021B8
Number of sections 7
PE sections
PE imports
CryptEncrypt
PropertySheetW
ImageList_AddMasked
CryptAcquireCertificatePrivateKey
JetIndexRecordCount
GetArcDirection
OffsetViewportOrgEx
GetCurrentProcess
DnsHostnameToComputerNameW
lstrlenA
GetSystemDefaultUILanguage
GetConsoleCursorInfo
GetProfileSectionW
GetExitCodeProcess
ExitProcess
GetHandleInformation
HeapReAlloc
FlsFree
LZSeek
SafeArrayDestroyData
RpcBindingSetAuthInfoExA
I_RpcNsBindingSetEntryNameW
SetupDiGetINFClassW
PathCreateFromUrlW
StrCmpIW
GetDesktopWindow
IsIconic
GetWindowRect
GetInputState
IsDlgButtonChecked
DlgDirListW
GetSysColorBrush
ChangeDisplaySettingsExW
GetFocus
SetMenuItemInfoW
DragDetect
SetCursor
midiOutGetVolume
DocumentPropertiesA
CryptCATStoreFromHandle
SCardListReaderGroupsW
Ord(29)
strtol
CoQueryProxyBlanket
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
163840

ImageVersion
0.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
8.1.2.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
12.59

FileTypeExtension
exe

OriginalFileName
Wwapi.dll

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
08.01.02.00 (win7_rtm.090713-1255)

TimeStamp
2018:05:23 01:45:21+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Wwapi.dll

ProductVersion
08.01.02.00

FileDescription
WWAN API

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
16384

FileSubtype
0

ProductVersionNumber
8.1.2.0

EntryPoint
0x21b8

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 a8e3fedf90fb08ad402b58d9f0c0e358
SHA1 e683003ffa37963c78a929eca8227f2b59a32c1d
SHA256 0b3c5df5dfc1a0ade8dc764caf999c64f24d8d4ea6bd7d0bdfcfc22c40e88035
ssdeep
1536:Lu48WzO6Ml9WD2jkY3vVr0z2dJbl1g1T/yKT1br9Z8JzYgmjPP/PL:Lu48WBMl9WIVvG2dZl1gdr9WHiL

authentihash 9a8013f8128202569836bee32a1d837926d84b1f2173d05fe1a60be9cd44e2d2
imphash 8355f44853d1a086530b65a03328cf1c
File size 180.0 KB ( 184320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-22 17:55:41 UTC ( 9 months ago )
Last submission 2018-05-27 17:40:17 UTC ( 8 months, 4 weeks ago )
File names Wwapi.dll
34864192.exe
WSDMARKERS.EXE
c4c8207cb84bde59fca790da73fd9a3434b410a1
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!