× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0ef8dade7a1832cab1864a27854e94be8c05ca5a78b5941ea25fb1b133fd622b
File name: w0tnAJZ.exe
Detection ratio: 34 / 69
Analysis date: 2018-11-27 07:45:21 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20181127
AVG FileRepMalware 20181127
Bkav HW32.Packed. 20181126
CAT-QuickHeal Trojan.Drixed.100407 20181126
Comodo Malware@#2b0f0bxfo3ri5 20181127
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.aaf6f2 20180225
Cylance Unsafe 20181127
eGambit Unsafe.AI_Score_99% 20181127
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CSFR 20181127
Fortinet W32/GenKryptik.CRRV!tr 20181127
GData Win32.Trojan-Spy.Emotet.SND497 20181127
Ikarus Win32.Outbreak 20181126
Sophos ML heuristic 20181108
K7GW Riskware ( 0040eff71 ) 20181127
Kaspersky Trojan-Banker.Win32.Emotet.brvb 20181127
Malwarebytes Trojan.Emotet 20181127
MAX malware (ai score=100) 20181127
McAfee Emotet-FKM!9D62234AAF6F 20181127
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181127
Microsoft Trojan:Win32/Occamy.C 20181127
Palo Alto Networks (Known Signatures) generic.ml 20181127
Panda Trj/RnkBend.A 20181126
Qihoo-360 Win32/Trojan.d3f 20181127
Rising Trojan.Kryptik!1.B4D6 (CLASSIC) 20181127
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANX 20181127
Symantec Trojan.Emotet 20181127
Trapmine malicious.high.ml.score 20181126
TrendMicro TROJ_FRS.VSN1AK18 20181127
TrendMicro-HouseCall TROJ_FRS.VSN1AK18 20181127
Webroot W32.Trojan.Emotet 20181127
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.brvb 20181127
Ad-Aware 20181127
AegisLab 20181127
AhnLab-V3 20181127
Alibaba 20180921
ALYac 20181127
Antiy-AVL 20181127
Arcabit 20181127
Avast-Mobile 20181127
Avira (no cloud) 20181127
Babable 20180918
Baidu 20181127
BitDefender 20181127
CMC 20181126
Cyren 20181127
DrWeb 20181127
Emsisoft 20181127
F-Prot 20181127
F-Secure 20181127
Jiangmin 20181127
K7AntiVirus 20181127
Kingsoft 20181127
eScan 20181127
NANO-Antivirus 20181127
SUPERAntiSpyware 20181121
Symantec Mobile Insight 20181121
TACHYON 20181127
Tencent 20181127
TheHacker 20181126
TotalDefense 20181127
Trustlook 20181127
VBA32 20181126
VIPRE 20181127
ViRobot 20181127
Yandex 20181123
Zillya 20181126
Zoner 20181127
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description remtsv
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:43:13
Entry Point 0x00005880
Number of sections 6
PE sections
PE imports
GetLogColorSpaceA
GetTextExtentExPointA
GetMiterLimit
GetTextColor
GetPaletteEntries
GetFontLanguageInfo
GetSystemTime
GetQueuedCompletionStatus
FindResourceExA
GetProcessAffinityMask
GetPrivateProfileStringA
GetSystemDefaultUILanguage
WriteProfileStringA
GetOverlappedResult
FindVolumeClose
GetCommandLineW
GetExitCodeProcess
GetVolumeInformationW
GlobalGetAtomNameA
FreeConsole
FindFirstFileW
GetThreadPriority
lstrcatW
GetTapeStatus
IsValidLanguageGroup
GetCurrentThread
DeleteSecurityContext
GetUserNameExA
FreeCredentialsHandle
GetScrollRange
GetScrollPos
GetShellWindow
GetWindowRect
IsWindowEnabled
LoadKeyboardLayoutA
DestroyCaret
InsertMenuItemA
GetWindowRgn
GetDlgCtrlID
GetDoubleClickTime
IsZoomed
FindWindowW
DrawFocusRect
IsClipboardFormatAvailable
SetTimer
CountClipboardFormats
GetTopWindow
LoadImageA
GetCursor
GetFocus
DeregisterShellHookWindow
GetUrlCacheEntryInfoExA
GetUrlCacheEntryInfoW
GetPrinterDriverW
GetStandardColorSpaceProfileW
GetColorProfileHeader
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 1
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
remtsv

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x5880

MIMEType
application/octet-stream

TimeStamp
1995:11:19 15:43:13+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
1.0

CodeSize
20480

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 9d62234aaf6f2b37ce7f444c7fc89313
SHA1 568ef9137c53556925b2d40c0252107ac4e54c07
SHA256 0ef8dade7a1832cab1864a27854e94be8c05ca5a78b5941ea25fb1b133fd622b
ssdeep
3072:BvHSJqr/oR9ua5GImWRVaa2w4uij+DEXcDgfAa/zc:BvHvkLAJWRVapwFy+gM6D/

authentihash 7479f3f49707a328c36ca7005a1c49a099c394f7b24a3ad54f8cbbfb320ffcfe
imphash 55853bd8d462893fa975cffa4e9ae4e1
File size 140.0 KB ( 143360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-26 16:35:36 UTC ( 2 months, 3 weeks ago )
Last submission 2018-11-27 07:02:39 UTC ( 2 months, 3 weeks ago )
File names w0tnAJZ.exe
PVIlRVaCwiH.exe
Ms6mc1B1Zi.exe
3ZczO8.exe
4IHbXkm58bh3.exe
xevZMJ.exe
cHQ4P6mI.exe
NMlxzYhk.exe
axRQ4CEW.exe
AAC9XbedWb.exe
bGD.bin
JRstdNFlP.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.