× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1e88bbe05961b78209442a75f4c477b38335a6b425c2d4d961544b98b1bdca46
File name: mizo6.bod
Detection ratio: 37 / 69
Analysis date: 2018-11-25 18:39:51 UTC ( 4 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31367027 20181125
AegisLab Trojan.Win32.Generic.4!c 20181125
ALYac Trojan.GenericKD.31367027 20181125
Arcabit Trojan.Generic.D1DE9F73 20181125
AVG FileRepMalware 20181125
Avira (no cloud) TR/AD.Ursnif.gufqv 20181125
BitDefender Trojan.GenericKD.31367027 20181125
CAT-QuickHeal Trojan.Agent 20181125
Comodo Malware@#6vxor6iz2yw9 20181125
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181022
Emsisoft Trojan.GenericKD.31367027 (B) 20181125
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNCH 20181125
F-Secure Trojan.GenericKD.31367027 20181125
Fortinet W32/Kryptik.GNCH!tr 20181125
GData Trojan.GenericKD.31367027 20181125
Ikarus Trojan-Banker.UrSnif 20181125
Sophos ML heuristic 20181108
K7GW Trojan ( 005420311 ) 20181125
Malwarebytes Trojan.Ursnif 20181125
MAX malware (ai score=100) 20181125
McAfee RDN/Generic.com 20181125
McAfee-GW-Edition BehavesLike.Win32.Generic.dh 20181125
Microsoft Trojan:Win32/Occamy.C 20181125
eScan Trojan.GenericKD.31367027 20181125
Palo Alto Networks (Known Signatures) generic.ml 20181125
Panda Trj/CI.A 20181125
Qihoo-360 Win32/Trojan.5ac 20181125
Rising Trojan.Kryptik!8.8 (CLOUD) 20181125
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Troj/Inject-DRM 20181125
Symantec Trojan Horse 20181124
Trapmine malicious.high.ml.score 20180918
TrendMicro TROJ_GEN.USKN18 20181125
TrendMicro-HouseCall TROJ_GEN.USKN18 20181125
VBA32 BScope.TrojanRansom.Crypmod 20181123
Webroot W32.Trojan.Gen 20181125
AhnLab-V3 20181125
Alibaba 20180921
Antiy-AVL 20181125
Avast 20181125
Avast-Mobile 20181125
Babable 20180918
Baidu 20181123
Bkav 20181123
ClamAV 20181125
CMC 20181125
Cybereason 20180225
Cylance 20181125
Cyren 20181125
DrWeb 20181125
eGambit 20181125
F-Prot 20181125
Jiangmin 20181125
K7AntiVirus 20181125
Kaspersky 20181125
Kingsoft 20181125
NANO-Antivirus 20181125
SUPERAntiSpyware 20181121
Symantec Mobile Insight 20181121
TACHYON 20181125
Tencent 20181125
TheHacker 20181118
TotalDefense 20181125
Trustlook 20181125
ViRobot 20181125
Yandex 20181123
Zillya 20181123
ZoneAlarm by Check Point 20181125
Zoner 20181125
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2006-2014 (c) Tencent Inc.

Product Tot
Original name Tot
File version 4.1.8.6
Description Mechanism Pic
Comments Mechanism Pic
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-11-22 20:34:50
Entry Point 0x0000E4D5
Number of sections 4
PE sections
PE imports
SetSecurityDescriptorDacl
FreeSid
MakeSelfRelativeSD
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeSecurityDescriptor
InitializeAcl
GetLengthSid
SetFileSecurityA
GetSecurityDescriptorLength
GetOpenFileNameA
CommDlgExtendedError
GetObjectA
PolyBezier
GetCurrentObject
SetMapMode
SelectClipPath
GetTextExtentPoint32A
CreatePen
GetStockObject
SetWindowExtEx
CreateFontIndirectA
GetTextMetricsA
SelectObject
EndPath
SetBkMode
SetTextAlign
TextOutA
BeginPath
GetPixel
Rectangle
SetTextColor
DeleteObject
GetInterfaceInfo
GetStdHandle
InterlockedPopEntrySList
WaitForSingleObject
EncodePointer
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
ResumeThread
InterlockedPushEntrySList
OutputDebugStringW
InterlockedDecrement
SetLastError
TlsGetValue
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
QueryPerformanceFrequency
HeapSetInformation
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
CreateThread
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
TerminateProcess
GetModuleHandleExW
GlobalAlloc
GetCurrentThreadId
GetProcAddress
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
RtlUnwind
LeaveCriticalSection
GetStartupInfoW
WaitForMultipleObjects
GetProcessHeap
GetCurrentProcessorNumber
GetProcessWorkingSetSize
GlobalLock
CreateFileW
GetConsoleWindow
CreateEventA
GetFileType
TlsSetValue
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
lstrlenA
GlobalFree
GetConsoleCP
GetEnvironmentStringsW
GlobalUnlock
WaitForSingleObjectEx
GetCurrentProcessId
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
Sleep
ReadFileEx
VirtualAlloc
NetWkstaUserGetInfo
DsWriteAccountSpnA
ShellExecuteA
Ord(14)
PathCompactPathA
GetMessageA
TranslateAcceleratorA
GetParent
ReleaseDC
DrawTextExW
GetScrollInfo
BeginPaint
DefWindowProcA
DestroyMenu
PostQuitMessage
DefMDIChildProcA
SetWindowTextA
TranslateMDISysAccel
DispatchMessageA
EndPaint
UpdateWindow
EnumChildWindows
MessageBoxA
SetWindowLongA
TranslateMessage
GetMessageTime
GetWindow
SetScrollInfo
SystemParametersInfoA
LoadMenuA
GetIconInfo
GetMenu
LoadStringA
SendMessageA
GetClientRect
GetDlgItem
RegisterClassA
CallNextHookEx
LoadAcceleratorsA
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
GetMenuItemInfoA
CreateIconFromResource
LoadImageA
GetDC
ScrollWindow
GetSubMenu
RegisterClipboardFormatA
DestroyWindow
mmioStringToFOURCCA
mmioSetBuffer
mmioSetInfo
mmioStringToFOURCCW
mmioSeek
mmioSendMessage
ReleaseStgMedium
PdhCollectQueryData
Number of PE resources by type
RT_RCDATA 10
PNG 10
RT_ICON 5
RCDATA 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 29
PE resources
ExifTool file metadata
SubsystemVersion
5.1

Comments
Mechanism Pic

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.1.8.6

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Mechanism Pic

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
190976

EntryPoint
0xe4d5

OriginalFileName
Tot

MIMEType
application/octet-stream

LegalCopyright
2006-2014 (c) Tencent Inc.

FileVersion
4.1.8.6

TimeStamp
2018:11:22 21:34:50+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
4.1.8.6

UninitializedDataSize
0

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tencent Inc.

CodeSize
111616

ProductName
Tot

ProductVersionNumber
4.1.8.6

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 7449c98798aa9c834b1d22a2ce17e261
SHA1 9ec5a8fd50325541a34819dedcf920584427f236
SHA256 1e88bbe05961b78209442a75f4c477b38335a6b425c2d4d961544b98b1bdca46
ssdeep
6144:dL0o8kh9H4408ba4hQqy6dC4f/OkCI4aKLh7oHvbQo6D9p6xrQpcB+wlu78TaFoC:p0o8kh9H4408ba4hQqy6dC4f/OkCIOLZ

authentihash 4b5912a2e92f2f21ca1b42213c189b396d5769e06f60afd0786a1de318f3ebdb
imphash d3152b95cb4204d6efe9afc88f38d32b
File size 296.5 KB ( 303616 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-23 11:42:48 UTC ( 5 months ago )
Last submission 2018-11-29 21:55:05 UTC ( 4 months, 3 weeks ago )
File names output.114565186.txt
mizo5.bod
mizo3.bod
mizo6.bod.exe
mizo4.bod
mizo7.bod
mizo2.bod
mizo1.bod
mizo6.bod
mizo6.bod
Tot
7449c98798aa9c834b1d22a2ce17e261
mizo10.bod
mizo12.bod
mizo14.bod
mizo13.bod
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!