× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1f5494fb42b0ab72c25329887eb7206035010216d470f6ed7c7a81d549fe2593
File name: f6f07a60172b188ddc0cd59577d11a83
Detection ratio: 19 / 70
Analysis date: 2019-01-20 18:04:03 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
Avast Win32:Trojan-gen 20190120
AVG Win32:Trojan-gen 20190120
Cylance Unsafe 20190120
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CWUT 20190120
Fortinet W32/GenKryptik.CWUT!tr 20190120
Kaspersky Trojan-Banker.Win32.IcedID.tobw 20190120
McAfee GenericRXGV-MG!F6F07A60172B 20190120
Microsoft Trojan:Win32/Azden.A!cl 20190120
Palo Alto Networks (Known Signatures) generic.ml 20190120
Panda Trj/GdSda.A 20190120
Qihoo-360 Win32/Trojan.1eb 20190120
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20190120
Symantec ML.Attribute.HighConfidence 20190119
Tencent Win32.Trojan-banker.Icedid.Egea 20190120
Trapmine malicious.moderate.ml.score 20190103
Webroot W32.Trojan.Gen 20190120
ZoneAlarm by Check Point Trojan-Banker.Win32.IcedID.tobw 20190120
Ad-Aware 20190120
AegisLab 20190120
AhnLab-V3 20190120
Alibaba 20180921
ALYac 20190120
Antiy-AVL 20190120
Arcabit 20190120
Avast-Mobile 20190118
Avira (no cloud) 20190120
Babable 20180918
Baidu 20190118
BitDefender 20190120
Bkav 20190119
CAT-QuickHeal 20190120
ClamAV 20190120
CMC 20190120
Comodo 20190120
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cyren 20190120
DrWeb 20190120
eGambit 20190120
Emsisoft 20190120
F-Prot 20190120
F-Secure 20190120
GData 20190120
Ikarus 20190120
Sophos ML 20181128
Jiangmin 20190120
K7AntiVirus 20190120
K7GW 20190120
Kingsoft 20190120
Malwarebytes 20190120
MAX 20190120
McAfee-GW-Edition 20190120
eScan 20190120
NANO-Antivirus 20190120
SentinelOne (Static ML) 20190118
Sophos AV 20190120
SUPERAntiSpyware 20190116
TACHYON 20190120
TheHacker 20190118
TotalDefense 20190120
TrendMicro 20190120
TrendMicro-HouseCall 20190120
Trustlook 20190120
VBA32 20190118
ViRobot 20190120
Yandex 20190118
Zillya 20190118
Zoner 20190120
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Tour de Force CRM Example Willbreak
Original name Willbreak.exe
Internal name Tour de Force CRM ExampleColorselect Pointinclude
File version 9.5.44.80
Description Willbreak
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-01-17 10:54:58
Entry Point 0x00006EED
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegCreateKeyW
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetLocaleInfoW
GetModuleFileNameA
RtlUnwind
DeleteCriticalSection
GetCurrentProcess
EnumSystemLocalesA
GetLocaleInfoA
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
GetUserDefaultLCID
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
VirtualProtectEx
GetFileType
SetStdHandle
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
SetFilePointer
GetSystemTimeAsFileTime
HeapSetInformation
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CloseHandle
IsProcessorFeaturePresent
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
TerminateProcess
InitializeCriticalSection
HeapCreate
CreateFileW
InterlockedDecrement
Sleep
SetLastError
GetTickCount
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
ExitProcess
WriteConsoleW
LeaveCriticalSection
CoUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
9.5.44.80

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Willbreak

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
176640

EntryPoint
0x6eed

OriginalFileName
Willbreak.exe

MIMEType
application/octet-stream

FileVersion
9.5.44.80

TimeStamp
2011:01:17 02:54:58-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
Tour de Force CRM ExampleColorselect Pointinclude

ProductVersion
9.5.44.80

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tour de Force CRM Example

CodeSize
155648

ProductName
Tour de Force CRM Example Willbreak

ProductVersionNumber
9.5.44.80

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 f6f07a60172b188ddc0cd59577d11a83
SHA1 f5a80a4adc9f587c77d0438d88188011417b5089
SHA256 1f5494fb42b0ab72c25329887eb7206035010216d470f6ed7c7a81d549fe2593
ssdeep
3072:eEwrR8gXyxqx92Lg5s2yTGKMt6+YpIkUygq45R2JTW19pk5ub6DyH8qIgjQ5+FwU:eJRjiMv2Lg+qlt6rpIkU9rlQcPg4qu

authentihash 066ef8d7755f5ea7be30e2bc18434f5e1a50ecb14c34b755fa1bba4133016441
imphash 23a164d324b741a291d000e9e76af64a
File size 276.0 KB ( 282624 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-20 14:18:17 UTC ( 1 month, 4 weeks ago )
Last submission 2019-01-20 14:18:17 UTC ( 1 month, 4 weeks ago )
File names Tour de Force CRM ExampleColorselect Pointinclude
Willbreak.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.