× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1ffe266f572a9a5e716f0fb4c8386e26fa820bd4632c4c0292a027f09a4972c8
File name: 1ffe266f572a9a5e716f0fb4c8386e26fa820bd4632c4c0292a027f09a4972c8
Detection ratio: 13 / 57
Analysis date: 2016-05-24 22:27:11 UTC ( 2 years, 4 months ago )
Antivirus Result Update
AegisLab Troj.W32.Gen.lNNz 20160524
AVG Generic_s.HQW 20160524
Avira (no cloud) TR/Crypt.ZPACK.taeg 20160524
Bkav HW32.Packed.8682 20160524
Comodo Heur.Packed.Unknown 20160524
ESET-NOD32 Win32/Dridex.AM 20160524
Fortinet W32/Dridex.AM!tr 20160524
Kaspersky UDS:DangerousObject.Multi.Generic 20160524
McAfee Artemis!D729D1433137 20160524
McAfee-GW-Edition BehavesLike.Win32.Sality.dh 20160524
Panda Trj/Genetic.gen 20160524
Qihoo-360 QVM20.1.Malware.Gen 20160524
Sophos AV Mal/Generic-S 20160524
Ad-Aware 20160524
AhnLab-V3 20160524
Alibaba 20160524
ALYac 20160524
Antiy-AVL 20160524
Arcabit 20160524
Avast 20160524
AVware 20160524
Baidu 20160523
Baidu-International 20160524
BitDefender 20160524
CAT-QuickHeal 20160524
ClamAV 20160524
CMC 20160523
Cyren 20160524
DrWeb 20160524
Emsisoft 20160524
F-Prot 20160524
F-Secure 20160524
GData 20160524
Ikarus 20160524
Jiangmin 20160524
K7AntiVirus 20160524
K7GW 20160524
Kingsoft 20160524
Malwarebytes 20160524
Microsoft 20160524
eScan 20160524
NANO-Antivirus 20160524
nProtect 20160524
Rising 20160524
SUPERAntiSpyware 20160524
Symantec 20160524
Tencent 20160524
TheHacker 20160523
TotalDefense 20160524
TrendMicro 20160524
TrendMicro-HouseCall 20160524
VBA32 20160524
VIPRE 20160524
ViRobot 20160524
Yandex 20160524
Zillya 20160524
Zoner 20160524
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2009 KONICA MINOLTA, INC.

Product KMWOW64 ????????
Original name KMWOW64.exe
Internal name KMWOW64
File version 1, 2, 0, 0
Description KMWOW64 ????????
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1990-06-12 00:01:33
Entry Point 0x0000AA70
Number of sections 7
PE sections
PE imports
RemoveClusterResourceNode
GetLastError
FreeLibrary
GetTickCount
LoadLibraryA
GetPrivateProfileSectionNamesW
GetDateFormatA
SetThreadPriority
LocalAlloc
GetCommandLineA
GetProcAddress
AddAtomW
GetTempFileNameW
GetVolumeNameForVolumeMountPointA
RaiseException
InterlockedExchange
ResetEvent
FreeConsole
GetThreadTimes
GetCurrencyFormatA
VirtualQueryEx
ReadFileEx
ExitProcess
SetMailslotInfo
MprAdminMIBEntryGet
SHInvokePrinterCommandW
DragQueryFileA
InSendMessageEx
putwc
sprintf
freopen
CoInternetCombineUrl
Number of PE resources by type
RT_ICON 16
RT_GROUP_ICON 2
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 19
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
0

ImageVersion
0.0

ProductName
KMWOW64

FileVersionNumber
1.1.0.0

LanguageCode
Japanese

FileFlagsMask
0x0017

FileDescription
KMWOW64

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
KMWOW64.exe

MIMEType
application/octet-stream

Subsystem
Windows command line

FileVersion
1, 2, 0, 0

TimeStamp
1990:06:12 01:01:33+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
KMWOW64

ProductVersion
1, 1, 0, 0

SubsystemVersion
4.0

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright (C) 2009 KONICA MINOLTA, INC.

MachineType
Intel 386 or later, and compatibles

CompanyName
KONICA MINOLTA, INC.

CodeSize
40960

FileSubtype
0

ProductVersionNumber
1.1.0.0

EntryPoint
0xaa70

ObjectFileType
Executable application

File identification
MD5 d729d143313779c702b174ee92a6d9e4
SHA1 87dc127458920ed161327ecc82aad842e3a5cd82
SHA256 1ffe266f572a9a5e716f0fb4c8386e26fa820bd4632c4c0292a027f09a4972c8
ssdeep
3072:MzYIsi+biXOtYoRm6EbfM2TsOoIjT/YpYvwRt:MPsVbiXOrcftYXInApYoR

authentihash 8b0748386571a4d689f56cceecdf30a95d7974c5ddd6bcf0cf7775e0f40461aa
imphash ab15eebf64187c46035c37b33ff96df5
File size 200.0 KB ( 204800 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.6%)
Clipper DOS Executable (19.1%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
VXD Driver (0.2%)
Tags
peexe

VirusTotal metadata
First submission 2016-05-24 22:27:11 UTC ( 2 years, 4 months ago )
Last submission 2016-05-24 22:27:11 UTC ( 2 years, 4 months ago )
File names KMWOW64
KMWOW64.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Runtime DLLs
UDP communications