× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0b7a4816aae619aa5c0e04a93505f2b1b6d354308ccaf8b4c53a5b03fadf0ebc
File name: MOkzB70vNr4tp1pQ0.exe
Detection ratio: 20 / 71
Analysis date: 2019-02-06 03:10:30 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
Ad-Aware Gen:Variant.Razy.460155 20190205
Arcabit Trojan.Razy.D7057B 20190205
AVG FileRepMalware 20190205
BitDefender Gen:Variant.Razy.460155 20190205
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.0f3278 20190109
Cylance Unsafe 20190205
Emsisoft Gen:Variant.Razy.460155 (B) 20190205
Endgame malicious (high confidence) 20181108
GData Gen:Variant.Razy.460155 20190205
Sophos ML heuristic 20181128
MAX malware (ai score=80) 20190205
Microsoft Trojan:Win32/Fuerboos.A!cl 20190205
eScan Gen:Variant.Razy.460155 20190205
Qihoo-360 HEUR/QVM20.1.09B3.Malware.Gen 20190205
Rising Malware.Heuristic.MLite(100%) (AI-LITE:exAKFLc0/QtZN6RkI5e7bA) 20190205
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ML.Attribute.HighConfidence 20190205
Trapmine malicious.high.ml.score 20190123
AegisLab 20190205
AhnLab-V3 20190205
Alibaba 20180921
ALYac 20190205
Antiy-AVL 20190205
Avast 20190205
Avast-Mobile 20190205
Avira (no cloud) 20190205
Babable 20180917
Baidu 20190201
Bkav 20190201
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190205
Cyren 20190205
DrWeb 20190205
eGambit 20190205
ESET-NOD32 20190205
F-Prot 20190205
F-Secure 20190205
Fortinet 20190205
Ikarus 20190205
Jiangmin 20190205
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190205
Kingsoft 20190205
Malwarebytes 20190205
McAfee 20190205
McAfee-GW-Edition 20190205
NANO-Antivirus 20190205
Palo Alto Networks (Known Signatures) 20190205
Panda 20190205
Sophos AV 20190205
SUPERAntiSpyware 20190130
TACHYON 20190205
Tencent 20190205
TheHacker 20190203
TotalDefense 20190205
TrendMicro 20190205
TrendMicro-HouseCall 20190205
Trustlook 20190205
VBA32 20190205
VIPRE 20190205
ViRobot 20190205
Webroot 20190205
Yandex 20190204
Zillya 20190204
ZoneAlarm by Check Point 20190205
Zoner 20190205
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserv

Product Microsoft® Windows® Operating S
Original name extractr.exe
Internal name extractr.exe
File version 6.1.7601.17514 (win7sp1_rtm.101119-1
Description Wimfltr v2 extractor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-06 11:03:22
Entry Point 0x00003304
Number of sections 4
PE sections
PE imports
ImpersonateSelf
GetAclInformation
IsTokenRestricted
CreatePropertySheetPageA
JetIntersectIndexes
RestoreDC
PatBlt
OffsetRgn
CreatePalette
GetViewportExtEx
GdiSetBatchLimit
CopyMetaFileW
GetFontUnicodeRanges
EnumResourceTypesA
LocalFree
FlushProcessWriteBuffers
FindCloseChangeNotification
GetCurrentProcessorNumber
ApplicationRecoveryInProgress
GetFileSizeEx
GetOverlappedResult
GetConsoleCP
SleepEx
GetOEMCP
WriteFile
GetCurrentProcess
Sleep
VirtualFree
IsProcessorFeaturePresent
GetVersion
GetModuleHandleW
GetBinaryTypeA
ResumeThread
LZSeek
LZInit
MprInfoBlockAdd
SafeArrayCreateEx
VarCyMul
VarCyAdd
CM_Set_DevNode_Registry_PropertyW
FreeCredentialsHandle
RegisterWindowMessageW
GetParent
FindWindowW
LockSetForegroundWindow
SetWindowPos
EnableWindow
DdeSetUserHandle
TranslateMessage
LoadKeyboardLayoutA
GetMenuItemID
CreateDialogParamW
GetDlgCtrlID
GetMenu
SendDlgItemMessageW
SetWindowTextW
InvalidateRect
wsprintfA
CharNextW
UnhookWinEvent
LoadCursorW
GetSystemMenu
CreateWindowExW
LoadAcceleratorsW
LogicalToPhysicalPoint
OpenClipboard
DestroyWindow
InternetInitializeAutoProxyDll
GetUrlCacheEntryInfoA
SCardBeginTransaction
SCardListReadersW
fputc
fopen
fclose
_time64
_localtime64
towupper
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Wimfltr v2 extractor

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
389120

EntryPoint
0x3304

OriginalFileName
extractr.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserv

FileVersion
6.1.7601.17514 (win7sp1_rtm.101119-1

TimeStamp
2019:02:06 03:03:22-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
extractr.exe

ProductVersion
6.1.7600.163

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
28672

ProductName
Microsoft Windows Operating S

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 61cb9e0dcb001817ccc1ce8413d6c0e3
SHA1 aba4af50f32780ccc43bea713da970e8262750f2
SHA256 0b7a4816aae619aa5c0e04a93505f2b1b6d354308ccaf8b4c53a5b03fadf0ebc
ssdeep
3072:eZwOX3g1Anm4fLCin9rQ7W6RRRbOXbQ1kYTVumnhDmQ48k:eFgAm4ui90K6RDCM1lRumnh6Q4

authentihash 90c833b51c00176e74057702bc3d83e6e44f814ecf72a7bb13edd07ee177fc8f
imphash c1cf892d95020c127d7213279ef28024
File size 404.0 KB ( 413696 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-06 03:10:30 UTC ( 3 months, 1 week ago )
Last submission 2019-02-06 04:40:10 UTC ( 3 months, 1 week ago )
File names hefQV7nvc1foJYQ_2C.exe
extractr.exe
emotet_e2_0b7a4816aae619aa5c0e04a93505f2b1b6d354308ccaf8b4c53a5b03fadf0ebc_2019-02-06__031502.exe_
MOkzB70vNr4tp1pQ0.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!