× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1608da5cfc807f8e20f5bbae1ecd328340dac2ef5ddd5b5760e17faf77f29c1e
File name: 1608da5cfc807f8e20f5bbae1ecd328340dac2ef5ddd5b5760e17faf77f29c1e
Detection ratio: 14 / 65
Analysis date: 2018-10-16 08:12:20 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180723
Cylance Unsafe 20181016
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
Jiangmin Trojan/Obfuscated.afbj 20181016
K7AntiVirus Trojan ( 00516fdf1 ) 20181016
K7GW Trojan ( 00516fdf1 ) 20181016
Kaspersky UDS:DangerousObject.Multi.Generic 20181016
McAfee Trojan-FPYT!EC277B179A12 20181016
McAfee-GW-Edition BehavesLike.Win32.Generic.ch 20181016
Qihoo-360 HEUR/QVM10.1.8F49.Malware.Gen 20181016
Symantec Packed.Generic.525 20181016
Webroot W32.Trojan.Gen 20181016
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181016
Ad-Aware 20181016
AegisLab 20181016
AhnLab-V3 20181016
Alibaba 20180921
ALYac 20181016
Antiy-AVL 20181016
Arcabit 20181016
Avast 20181016
Avast-Mobile 20181016
AVG 20181016
Avira (no cloud) 20181016
Babable 20180918
Baidu 20181015
BitDefender 20181016
Bkav 20181014
CAT-QuickHeal 20181013
ClamAV 20181016
CMC 20181015
Comodo 20181016
Cybereason 20180225
Cyren 20181016
DrWeb 20181016
eGambit 20181016
Emsisoft 20181016
ESET-NOD32 20181016
F-Prot 20181016
F-Secure 20181016
Fortinet 20181016
GData 20181016
Ikarus 20181015
Kingsoft 20181016
Malwarebytes 20181016
MAX 20181016
Microsoft 20181016
eScan 20181016
NANO-Antivirus 20181016
Palo Alto Networks (Known Signatures) 20181016
Panda 20181015
Rising 20181016
SentinelOne (Static ML) 20181011
Sophos AV 20181016
SUPERAntiSpyware 20181015
Symantec Mobile Insight 20181001
TACHYON 20181016
Tencent 20181016
TheHacker 20181015
TrendMicro 20181016
TrendMicro-HouseCall 20181016
Trustlook 20181016
VBA32 20181015
ViRobot 20181016
Yandex 20181015
Zillya 20181015
Zoner 20181015
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-04-19 05:19:23
Entry Point 0x00001CD0
Number of sections 5
PE sections
PE imports
GetEnhMetaFileHeader
SetViewportExtEx
FillPath
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryA
LoadLibraryW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
ExitProcess
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
GetACP
FindFirstChangeNotificationW
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetEnvironmentStrings
GetEnvironmentStringsW
GetConsoleMode
GetLocaleInfoA
LocalAlloc
AddAtomA
GetCurrentDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
QueryPerformanceCounter
AddAtomW
GetFileType
SetStdHandle
RaiseException
GetCPInfo
GetStringTypeA
SetFilePointer
GetSystemTimeAsFileTime
GetConsoleOutputCP
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetMailslotInfo
GetSystemTimes
ExitThread
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TlsFree
TerminateProcess
WriteConsoleOutputCharacterW
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
WriteConsoleA
FindAtomA
TlsGetValue
Sleep
WriteConsoleW
GetTickCount
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
GetCurrentProcessId
SetLastError
LeaveCriticalSection
TransparentBlt
RegisterClassExW
GetParent
SetParent
SetProcessDefaultLayout
GetAltTabInfoA
SetThreadDesktop
GetCaretPos
PeekMessageW
Number of PE resources by type
RT_DIALOG 1
RT_ICON 1
RT_STRING 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ICELANDIC DEFAULT 4
ENGLISH US 2
ENGLISH NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
52224

EntryPoint
0x1cd0

MIMEType
application/octet-stream

FileVersion
1.0.0.1

TimeStamp
2018:04:19 07:19:23+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
ogwdatgsssk.exe

ProductVersion
1.0.0.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Unknown (0x40534)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
127488

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ec277b179a12f4ba9f85efdf4ce18969
SHA1 e4649adff7487ce452ab9ed6484e7a1a52a5fa38
SHA256 1608da5cfc807f8e20f5bbae1ecd328340dac2ef5ddd5b5760e17faf77f29c1e
ssdeep
3072:IbAxzACpg/AMKbUi4gf3g39/FIx8tus1L5zv06Ee:IbAxzTu/6bUhQ3gnc8tuAvke

authentihash 32add25fd91fb342630a0a7f8f305f113e5946e33ada1da2f3c3d266e46d7da6
imphash 2f41a8e23392ff21578480f7a9c863ae
File size 169.5 KB ( 173568 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-16 07:08:55 UTC ( 5 months, 1 week ago )
Last submission 2018-10-16 07:08:55 UTC ( 5 months, 1 week ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Shell commands
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections