× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0e6ca1d86245ca02cd271555d1d776705e7f66fa52e953655eb34653b4f55997
File name: 2018-08-16-Emotet-malwre-binary-1-of-2.exe
Detection ratio: 34 / 67
Analysis date: 2018-08-17 05:30:24 UTC ( 6 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40406281 20180817
AhnLab-V3 Malware/Gen.Generic.C2668206 20180817
Arcabit Trojan.Generic.D2688D09 20180817
Avast FileRepMalware 20180817
AVG FileRepMalware 20180817
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180817
BitDefender Trojan.GenericKD.40406281 20180817
CAT-QuickHeal Trojan.Emotet.X4 20180816
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180817
Emsisoft Trojan.GenericKD.40406281 (B) 20180817
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GJXG 20180817
F-Secure Trojan.GenericKD.40406281 20180817
Fortinet Malicious_Behavior.SB 20180817
GData Trojan.GenericKD.40406281 20180817
Ikarus Win32.Outbreak 20180816
Sophos ML heuristic 20180717
Kaspersky Trojan-Banker.Win32.Emotet.baws 20180817
McAfee RDN/Generic.hra 20180817
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20180817
Microsoft Trojan:Win32/Emotet.AC!bit 20180817
eScan Trojan.GenericKD.40406281 20180817
NANO-Antivirus Virus.Win32.Gen.ccmw 20180817
Palo Alto Networks (Known Signatures) generic.ml 20180817
Qihoo-360 HEUR/QVM19.1.3A03.Malware.Gen 20180817
Rising Trojan.Cloxer!8.F54F (CLOUD) 20180817
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/Generic-S 20180817
Symantec ML.Attribute.HighConfidence 20180816
TrendMicro TROJ_GEN.USHG18 20180817
TrendMicro-HouseCall TROJ_GEN.USHG18 20180817
Webroot W32.Trojan.Emotet 20180817
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.baws 20180817
AegisLab 20180817
Alibaba 20180713
ALYac 20180817
Antiy-AVL 20180816
Avast-Mobile 20180817
Avira (no cloud) 20180816
AVware 20180817
Babable 20180725
Bkav 20180816
ClamAV 20180817
CMC 20180812
Comodo 20180817
Cyren 20180817
DrWeb 20180817
eGambit 20180817
F-Prot 20180817
Jiangmin 20180817
K7AntiVirus 20180816
K7GW 20180817
Kingsoft 20180817
Malwarebytes 20180817
MAX 20180817
Panda 20180816
SUPERAntiSpyware 20180817
Symantec Mobile Insight 20180814
TACHYON 20180817
Tencent 20180817
TheHacker 20180815
TotalDefense 20180816
Trustlook 20180817
VBA32 20180816
VIPRE 20180817
ViRobot 20180816
Yandex 20180816
Zillya 20180816
Zoner 20180816
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2007 - 2015 Nir Sofer

Product RegDllView
Original name RegDllView.exe
Internal name RegDllView
File version 1.60
Description RegDllView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-16 17:00:15
Entry Point 0x000220E1
Number of sections 4
PE sections
PE imports
GetMapMode
GetObjectType
LocaleNameToLCID
GetFileMUIPath
GetConsoleProcessList
GetSystemDefaultUILanguage
GetCommandLineA
IsValidLocale
GetCurrentThreadId
SetConsoleScreenBufferSize
GetNamedPipeClientSessionId
ExtractIconExA
GetPriorityClipboardFormat
GetClipboardViewer
MenuItemFromPoint
SetMenu
GetCapture
GetFocus
IsWindowEnabled
OpenDriver
Number of PE resources by type
RT_STRING 9
RT_DIALOG 4
RT_MENU 4
RT_BITMAP 3
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 15
HEBREW DEFAULT 7
PE resources
ExifTool file metadata
UninitializedDataSize
45056

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
RegDllView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x220e1

OriginalFileName
RegDllView.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2007 - 2015 Nir Sofer

FileVersion
1.6

TimeStamp
2018:08:16 10:00:15-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
RegDllView

ProductVersion
1.6

SubsystemVersion
5.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NirSoft

CodeSize
0

ProductName
RegDllView

ProductVersionNumber
1.6.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 fbcf649977092322e62762330edc0c56
SHA1 d6580ae0f4a0e1a5a84323960f713c93f7f8562f
SHA256 0e6ca1d86245ca02cd271555d1d776705e7f66fa52e953655eb34653b4f55997
ssdeep
3072:KS5o/uBN/nHomFBdhYr+8SU/zegY+/cFH7/qOG3cnuipC4:KeBBImorOQfcFHmO9nE

authentihash 0ab47eeed7086cf1ad8ca3c09fb7d24054aefcb2838fe4910d15fa470d92d6b0
imphash e2a5ca7568cc133f2b849cacb248e013
File size 168.0 KB ( 172032 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-16 17:09:43 UTC ( 6 months, 1 week ago )
Last submission 2018-12-16 14:26:40 UTC ( 2 months, 1 week ago )
File names duplexputil.exe
ascroyale.exe
969.exe.5.dr
cabinetdiagram.exe
casemute.exe
25159176.exe
59.exe
catchsmx.exe
680.exe
7495.exe
diagrammute.exe
colorncl.exe
RegDllView.exe
2018-08-16-Emotet-malwre-binary-1-of-2.exe
caseentry.exe
RegDllView
25158320.exe
25158704.exe
output.113860544.txt
channelstyles.exe
channelmontana.exe
7804277.exe
119530.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!