× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1e274d3e851d01c106a7385a096fdac32f28effa0e38aec2791a967efc509a77
File name: 665gf4VWdDAko6m.exe
Detection ratio: 34 / 67
Analysis date: 2018-11-06 05:25:23 UTC ( 3 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40703204 20181106
ALYac Trojan.GenericKD.40703204 20181106
Arcabit Trojan.Generic.D26D14E4 20181106
Avast Win32:BankerX-gen [Trj] 20181106
AVG Win32:BankerX-gen [Trj] 20181106
BitDefender Trojan.GenericKD.40703204 20181106
Bkav HW32.Packed. 20181102
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.2e8c9e 20180225
Cylance Unsafe 20181106
Emsisoft Trojan.GenericKD.40703204 (B) 20181106
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.CPZC 20181106
F-Secure Trojan.GenericKD.40703204 20181106
Fortinet W32/GenKryptik.CPZC!tr 20181106
GData Trojan.GenericKD.40703204 20181106
Ikarus Trojan.Win32.Krypt 20181105
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 005405db1 ) 20181105
K7GW Trojan ( 005405db1 ) 20181106
Kaspersky Trojan-Banker.Win32.Emotet.bnww 20181106
MAX malware (ai score=100) 20181106
McAfee RDN/Generic.grp 20181106
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181106
Microsoft Trojan:Win32/Emotet.AC!bit 20181106
eScan Trojan.GenericKD.40703204 20181106
Palo Alto Networks (Known Signatures) generic.ml 20181106
Qihoo-360 HEUR/QVM20.1.FB53.Malware.Gen 20181106
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181106
Symantec Trojan.Emotet 20181105
TACHYON Banker/W32.Emotet.135168.M 20181106
Webroot W32.Trojan.Emotet 20181106
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bnww 20181106
AegisLab 20181106
AhnLab-V3 20181106
Alibaba 20180921
Antiy-AVL 20181106
Avast-Mobile 20181105
Avira (no cloud) 20181105
Babable 20180918
Baidu 20181106
CAT-QuickHeal 20181105
ClamAV 20181106
CMC 20181106
Cyren 20181106
DrWeb 20181106
eGambit 20181106
F-Prot 20181106
Jiangmin 20181106
Kingsoft 20181106
Malwarebytes 20181106
NANO-Antivirus 20181106
Panda 20181105
Rising 20181106
SUPERAntiSpyware 20181031
Symantec Mobile Insight 20181105
Tencent 20181106
TheHacker 20181104
TotalDefense 20181105
TrendMicro 20181106
TrendMicro-HouseCall 20181106
Trustlook 20181106
VBA32 20181105
ViRobot 20181106
Yandex 20181102
Zillya 20181105
Zoner 20181106
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name perca (3
File version 1.0
Description PerkalView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1996-06-16 21:58:56
Entry Point 0x00004090
Number of sections 6
PE sections
PE imports
DecryptFileW
AllocateLocallyUniqueId
IsValidSecurityDescriptor
GetOpenFileNameA
GetTextMetricsW
FrameRgn
DeleteObject
DeleteColorSpace
GetStretchBltMode
SetTextJustification
UnrealizeObject
BitBlt
ExtSelectClipRgn
GdiComment
GetBkColor
lstrcmpW
GetComputerNameW
QueryThreadCycleTime
GetLogicalProcessorInformation
GetNamedPipeClientProcessId
GetThreadLocale
IsSystemResumeAutomatic
ZombifyActCtx
GlobalFree
GetConsoleCP
GetConsoleCursorInfo
FillConsoleOutputCharacterW
GetCommandLineW
FindNextFileW
GetCommMask
GetTapePosition
FindFirstFileNameW
TzSpecificLocalTimeToSystemTime
lstrlenW
EscapeCommFunction
VarBstrCat
FindExecutableW
InitializeSecurityContextW
LoadAcceleratorsA
GetCursorPos
LoadImageA
GetListBoxInfo
GetPriorityClipboardFormat
IsGUIThread
ToUnicodeEx
FreeDDElParam
GetWindowModuleFileNameW
SetWindowContextHelpId
GetPhysicalCursorPos
DdeEnableCallback
GetProcessWindowStation
GetMenuDefaultItem
DrawFrameControl
fputs
ungetwc
fprintf
CoLoadLibrary
CoUninitialize
OleDestroyMenuDescriptor
Number of PE resources by type
RT_STRING 3
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 4
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileSubtype
0

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
PerkalView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
151552

EntryPoint
0x4090

OriginalFileName
perca.exe

MIMEType
application/octet-stream

FileVersion
1.0

TimeStamp
1996:06:16 23:58:56+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
perca (3

ProductVersion
1.0

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Micro

CodeSize
16384

ProductName
Microsoft

ProductVersionNumber
1.6.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 cc1cfa22e8c9e3e490f06e1e8e953278
SHA1 c82b154810c96c6aa1f044ed3c231e8e4dc6e799
SHA256 1e274d3e851d01c106a7385a096fdac32f28effa0e38aec2791a967efc509a77
ssdeep
3072:cY8YOzNFUC+AuHpxi92fX2KBuczzkt6i:cFYOzNFwF/X2S/H

authentihash afd477ed32e0d97aff477b4219b2a3987db00fdc07962bf215ecb6901d06db60
imphash ef608a61d82f6d8dd7f5ed2a04d49e94
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-04 11:52:16 UTC ( 3 months, 2 weeks ago )
Last submission 2018-11-04 11:52:16 UTC ( 3 months, 2 weeks ago )
File names 665gf4VWdDAko6m.exe
perca (3
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!