× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1cd9c644ad634b363ea30c3097e9d6e66acd373112e558e1a669089226b834ba
File name: 6pIDDVspvnb0.exe
Detection ratio: 41 / 66
Analysis date: 2018-05-29 17:37:27 UTC ( 8 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30889872 20180529
AegisLab Ml.Attribute.Gen!c 20180529
AhnLab-V3 Trojan/Win32.Agent.R229209 20180529
ALYac Trojan.GenericKD.30889872 20180529
Antiy-AVL Trojan/Win32.Agent 20180529
Arcabit Trojan.Generic.D1D75790 20180529
Avast Win32:Malware-gen 20180529
AVG Win32:Malware-gen 20180529
Avira (no cloud) TR/Crypt.ZPACK.wwsps 20180529
AVware Trojan.Win32.Generic!BT 20180529
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180529
BitDefender Trojan.GenericKD.30889872 20180529
Comodo CloudScanner.Trojan.Gen 20180529
Cylance Unsafe 20180529
Cyren W32/Trojan.KKHN-7140 20180529
Emsisoft Trojan.GenericKD.30889872 (B) 20180529
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GHCZ 20180529
F-Secure Trojan.GenericKD.30889872 20180529
Fortinet W32/Kryptik.GHBV!tr 20180529
GData Win32.Trojan-Spy.Emotet.QV 20180529
Ikarus Trojan.Win32.Krypt 20180529
Sophos ML heuristic 20180503
Kaspersky Trojan.Win32.Agent.qwgtem 20180529
Malwarebytes Spyware.PasswordStealer 20180529
MAX malware (ai score=95) 20180529
McAfee RDN/Generic.grp 20180529
McAfee-GW-Edition Artemis!Trojan 20180529
Microsoft Trojan:Win32/Cloxer.D!cl 20180529
eScan Trojan.GenericKD.30889872 20180529
Palo Alto Networks (Known Signatures) generic.ml 20180529
Panda Trj/GdSda.A 20180529
Qihoo-360 Win32/Trojan.c8a 20180529
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANR 20180529
Symantec Trojan.Emotet 20180529
TrendMicro TROJ_GEN.R011C0OET18 20180529
TrendMicro-HouseCall TROJ_GEN.R011C0OET18 20180529
VIPRE Trojan.Win32.Generic!BT 20180529
Webroot W32.Trojan.Emotet 20180529
ZoneAlarm by Check Point Trojan.Win32.Agent.qwgtem 20180529
Alibaba 20180529
Avast-Mobile 20180529
Babable 20180406
Bkav 20180529
CAT-QuickHeal 20180529
ClamAV 20180529
CMC 20180529
CrowdStrike Falcon (ML) 20180202
Cybereason None
DrWeb 20180529
eGambit 20180529
F-Prot 20180529
Jiangmin 20180529
K7AntiVirus 20180529
K7GW 20180529
Kingsoft 20180529
NANO-Antivirus 20180529
nProtect 20180529
Rising 20180529
SUPERAntiSpyware 20180529
Symantec Mobile Insight 20180525
Tencent 20180529
TheHacker 20180524
TotalDefense 20180529
Trustlook 20180529
VBA32 20180529
ViRobot 20180529
Yandex 20180529
Zillya 20180528
Zoner 20180528
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2028-12-25 04:27:37
Entry Point 0x0000211D
Number of sections 5
PE sections
PE imports
CryptDuplicateHash
ImpersonateSelf
BackupEventLogA
GetUserNameA
ImageList_SetIconSize
CertAddSerializedElementToStore
CertOpenSystemStoreA
CryptMsgOpenToEncode
CertGetCertificateChain
GetStretchBltMode
AnimatePalette
ExtCreatePen
CreateWaitableTimerW
GetCurrentProcess
ConnectNamedPipe
WritePrivateProfileStringA
WaitForDebugEvent
GetNumberFormatA
DeactivateActCtx
CreateNamedPipeW
GetGeoInfoW
ClearCommBreak
LocalHandle
GetFileType
GetComputerNameExW
SetDynamicTimeZoneInformation
FindFirstVolumeW
LZSeek
MprAdminMIBEntryGet
VarUI4FromUI8
glTexCoord2f
SetActivePwrScheme
RasDialA
I_RpcServerRegisterForwardFunction
NdrConformantArrayMarshall
RpcRaiseException
RpcAsyncCancelCall
I_RpcNsBindingSetEntryNameW
SetupLogErrorA
SetupDiSetSelectedDriverA
SetupDiGetDeviceInstanceIdW
SetupDiCreateDeviceInterfaceW
HashData
StrCpyNW
SHSetValueW
SHCopyKeyW
BlockInput
GetKBCodePage
GetWindowTextW
LoadCursorW
SetCaretBlinkTime
GetAncestor
SetScrollInfo
InternetSetOptionW
GetUrlCacheEntryInfoA
InternetSetStatusCallbackA
waveOutGetErrorTextW
waveOutSetVolume
waveOutGetVolume
midiInStart
XcvDataW
GetPrinterDataExW
AddJobW
WintrustRemoveActionID
gethostbyaddr
SCardForgetCardTypeW
SCardDisconnect
InstallColorProfileW
toupper
CoUnmarshalInterface
OleConvertOLESTREAMToIStorage
STGMEDIUM_UserMarshal
CreateILockBytesOnHGlobal
PdhGetDataSourceTimeRangeH
IsValidURL
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
192512

ImageVersion
0.0

FileVersionNumber
1.0.124.0

LanguageCode
Japanese

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
12.164

FileTypeExtension
exe

MIMEType
application/octet-stream

TimeStamp
2028:12:25 05:27:37+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
25 4 3

CodeSize
0

FileSubtype
0

ProductVersionNumber
24.0.55.0

EntryPoint
0x211d

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 48635922b0f38bdac6a709c5eebffa07
SHA1 907eab9d5b433e7738cb88db93e516c255ed3cd3
SHA256 1cd9c644ad634b363ea30c3097e9d6e66acd373112e558e1a669089226b834ba
ssdeep
3072:SSws0R8NLF12yX3mArIVmfsA0m0qkCSQ:z90+VP2G3mA8Vmk604

authentihash bc419e5c1112be8a50015fafe5b77236fb4185aa6f2813129e93957609abf880
imphash 86ee6b4fd57c45f61c782b78525ce632
File size 208.0 KB ( 212992 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Executable (generic) (35.7%)
Win16/32 Executable Delphi generic (16.4%)
OS/2 Executable (generic) (16.0%)
Generic Win/DOS Executable (15.8%)
DOS Executable Generic (15.8%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-27 22:07:27 UTC ( 8 months, 3 weeks ago )
Last submission 2018-06-20 01:11:23 UTC ( 8 months ago )
File names 6pIDDVspvnb0.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!