× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1b41d5796f6f5c7f2d7dd02b62671cd98e75833b5681dbf1bbe16590424daf33
File name: zbetcheckin_tracker_loader.exe
Detection ratio: 14 / 68
Analysis date: 2018-08-19 13:41:30 UTC ( 9 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180819
AVG FileRepMalware 20180819
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180818
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.bd5a09 20180225
Cylance Unsafe 20180819
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
McAfee-GW-Edition BehavesLike.Win32.Generic.ch 20180819
Microsoft Trojan:Win32/Vigorf.A 20180819
Qihoo-360 HEUR/QVM10.1.49F5.Malware.Gen 20180819
Rising Malware.Obscure/Heur!1.9E03 (CLASSIC) 20180819
Symantec ML.Attribute.HighConfidence 20180818
VBA32 Malware-Cryptor.Limpopo 20180817
Ad-Aware 20180819
AegisLab 20180819
AhnLab-V3 20180819
Alibaba 20180713
ALYac 20180819
Antiy-AVL 20180819
Arcabit 20180819
Avast-Mobile 20180819
Avira (no cloud) 20180819
AVware 20180819
Babable 20180725
BitDefender 20180819
Bkav 20180817
CAT-QuickHeal 20180819
ClamAV 20180819
CMC 20180817
Comodo 20180819
Cyren 20180819
DrWeb 20180819
eGambit 20180819
Emsisoft 20180819
ESET-NOD32 20180819
F-Prot 20180819
F-Secure 20180819
Fortinet 20180819
GData 20180819
Ikarus 20180819
Jiangmin 20180819
K7AntiVirus 20180819
K7GW 20180819
Kaspersky 20180819
Kingsoft 20180819
Malwarebytes 20180819
MAX 20180819
McAfee 20180819
eScan 20180819
NANO-Antivirus 20180819
Palo Alto Networks (Known Signatures) 20180819
Panda 20180819
SentinelOne (Static ML) 20180701
Sophos AV 20180819
SUPERAntiSpyware 20180819
Symantec Mobile Insight 20180814
TACHYON 20180819
Tencent 20180819
TheHacker 20180818
TotalDefense 20180818
TrendMicro 20180819
TrendMicro-HouseCall 20180819
Trustlook 20180819
VIPRE 20180819
ViRobot 20180819
Webroot 20180819
Yandex 20180818
Zillya 20180817
ZoneAlarm by Check Point 20180819
Zoner 20180818
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-19 09:30:23
Entry Point 0x00005EA0
Number of sections 5
PE sections
PE imports
SetSecurityDescriptorDacl
InitiateSystemShutdownA
GetUserNameW
SetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
GetGraphicsMode
GetNativeSystemInfo
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
TerminateThread
GetModuleFileNameW
GetConsoleCP
GetExitCodeProcess
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
HeapSize
RtlUnwind
GetModuleFileNameA
GetACP
DeleteCriticalSection
GetCurrentProcess
CompareFileTime
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
GetUserDefaultLCID
EnumSystemLocalesW
WideCharToMultiByte
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetStartupInfoW
SetFilePointerEx
GetFileInformationByHandle
SetProcessAffinityMask
GetProcAddress
EncodePointer
GetLocaleInfoW
SetStdHandle
GetTempPathA
RaiseException
GetCPInfo
TlsFree
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
ReadFile
GetCurrentThreadId
SetUnhandledExceptionFilter
lstrcpyA
SetProcessWorkingSetSize
CloseHandle
IsProcessorFeaturePresent
GetCommandLineA
IsValidLocale
DuplicateHandle
HeapReAlloc
DecodePointer
GetModuleHandleW
HeapAlloc
GetFileType
TerminateProcess
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
WriteFile
CreateFileW
TlsGetValue
Sleep
SetLastError
ReadConsoleW
TlsSetValue
GetProcessTimes
SetComputerNameExW
GetProcessHeap
LocalAlloc
WriteConsoleW
LeaveCriticalSection
ReleaseDC
BeginPaint
GetDC
EndPaint
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
BELARUSIAN DEFAULT 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
382976

EntryPoint
0x5ea0

MIMEType
application/octet-stream

TimeStamp
2018:08:19 10:30:23+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
tgrthryj.exe

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Unknown (0x40534)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
96256

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 04a753705bb47ca70b9a167d5d53f3cd
SHA1 7890454bd5a09239ab1a732f19f14f9d83dc75ce
SHA256 1b41d5796f6f5c7f2d7dd02b62671cd98e75833b5681dbf1bbe16590424daf33
ssdeep
3072:XgDsvyTIrE1yNbf3W31D68n+UzLIWDT5xr08PcVMB0hbGKFCjxX:XgwLrEof3+DJHnDT5908B08Km

authentihash 36bd63f44d8e72b27fe1c0ef73bb6e67b0be4cdc69fc37d81086952e5b050661
imphash b71d7a434d800ee407b058ac582dcaea
File size 183.0 KB ( 187392 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (40.0%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-19 13:41:30 UTC ( 9 months ago )
Last submission 2018-08-19 13:41:30 UTC ( 9 months ago )
File names zbetcheckin_tracker_loader.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs