× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2035ef02a014f9ae2a21d39c98604ca4863d77c47dcc12d31bb9b7b2d3e5fc98
File name: output.113312269.txt
Detection ratio: 59 / 70
Analysis date: 2019-05-14 16:38:45 UTC ( 1 week, 5 days ago )
Antivirus Result Update
Acronis suspicious 20190514
Ad-Aware Trojan.GenericKD.30794501 20190514
AegisLab Trojan.Win32.Generic.4!c 20190514
AhnLab-V3 Win-Trojan/Gandcrab01.Exp 20190514
Alibaba Trojan:Win32/Kryptik.78a2bd7f 20190513
ALYac Trojan.MSIL.IRCBot 20190514
Antiy-AVL Trojan/Win32.TSGeneric 20190514
APEX Malicious 20190513
Arcabit Trojan.Generic.D1D5E305 20190514
Avast Win32:Malware-gen 20190514
AVG Win32:Malware-gen 20190514
Avira (no cloud) HEUR/AGEN.1032585 20190514
BitDefender Trojan.GenericKD.30794501 20190514
Bkav W32.WinkepeA.Trojan 20190514
CAT-QuickHeal Trojan.Mauvaise.SL1 20190514
Comodo Malware@#1a8mcok9913ei 20190514
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.9f4369 20190417
Cylance Unsafe 20190514
Cyren W32/S-8ce49c37!Eldorado 20190514
DrWeb Trojan.Encoder.24384 20190514
Emsisoft Trojan.GenericKD.30794501 (B) 20190514
Endgame malicious (high confidence) 20190403
ESET-NOD32 a variant of Win32/Kryptik.GGRU 20190514
F-Prot W32/S-8ce49c37!Eldorado 20190514
F-Secure Heuristic.HEUR/AGEN.1032585 20190514
FireEye Generic.mg.1b613159f436928a 20190514
Fortinet W32/Kryptik.GKJF!tr 20190514
GData Trojan.GenericKD.30794501 20190514
Ikarus Trojan-Ransom.GandCrab 20190514
Sophos ML heuristic 20190313
Jiangmin Trojan.Chapak.io 20190514
K7AntiVirus Trojan ( 0052908c1 ) 20190514
K7GW Trojan ( 0052908c1 ) 20190514
Kaspersky HEUR:Trojan.Win32.Generic 20190514
Malwarebytes Trojan.MalPack 20190514
MAX malware (ai score=98) 20190514
McAfee Packed-FFG!1B613159F436 20190514
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20190513
Microsoft Trojan:Win32/Gandcrab.AF 20190514
eScan Trojan.GenericKD.30794501 20190514
NANO-Antivirus Trojan.Win32.Encoder.fbukpj 20190514
Palo Alto Networks (Known Signatures) generic.ml 20190514
Panda Trj/Genetic.gen 20190514
Qihoo-360 HEUR/QVM10.1.2814.Malware.Gen 20190514
Rising Trojan.Kryptik!1.B1E3 (CLASSIC) 20190514
SentinelOne (Static ML) DFI - Malicious PE 20190511
Sophos AV Mal/WaledPak-D 20190514
SUPERAntiSpyware Ransom.GandCrab/Variant 20190514
Symantec Trojan.Gen.2 20190514
TACHYON Trojan/W32.IRCBot.158720 20190514
Tencent Win32.Trojan.Generic.Dzkb 20190514
Trapmine malicious.high.ml.score 20190325
TrendMicro Ransom_GANDCRAB.SMD3 20190514
TrendMicro-HouseCall Ransom_GANDCRAB.SMD3 20190514
VBA32 BScope.TrojanRansom.GandCrypt 20190514
Yandex Trojan.Chapak! 20190501
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20190514
Zoner Trojan.Win32.68202 20190513
Avast-Mobile 20190514
Babable 20190424
Baidu 20190318
ClamAV 20190514
CMC 20190321
eGambit 20190514
Kingsoft 20190514
Symantec Mobile Insight 20190510
TheHacker 20190513
TotalDefense 20190514
Trustlook 20190514
ViRobot 20190514
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-14 03:53:37
Entry Point 0x00001829
Number of sections 6
PE sections
PE imports
CloseMetaFile
AddFontResourceA
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetCommBreak
GetModuleFileNameW
GetConsoleCP
CreateMailslotW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
SetConsoleOutputCP
RtlUnwind
GetStdHandle
DeleteCriticalSection
FlushViewOfFile
SetFileShortNameW
RaiseException
GetConsoleMode
DecodePointer
GetCurrentProcessId
WriteConsoleW
SetVolumeMountPointA
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetCommMask
MultiByteToWideChar
GetStartupInfoW
SetStdHandle
FreeEnvironmentStringsW
FindVolumeMountPointClose
GetProcAddress
InitializeSListHead
GetThreadContext
GetProcessHeap
ExitProcess
GetTempPathA
ReadConsoleW
WideCharToMultiByte
MapViewOfFile
TlsFree
FindFirstFileExA
ReadFile
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
FindNextFileA
GetACP
HeapReAlloc
CreateConsoleScreenBuffer
GetModuleHandleW
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
SetConsoleMode
WriteFile
CreateFileW
SetFilePointerEx
GetStringTypeW
FindClose
TlsGetValue
WriteProfileSectionW
GetFileType
SetEndOfFile
TlsSetValue
GetCurrentThreadId
SetMailslotInfo
VirtualAlloc
SetLastError
LeaveCriticalSection
CoGetContextToken
CoCancelCall
Number of PE resources by type
RT_STRING 14
RT_GROUP_CURSOR 1
RT_ICON 1
AFX_DIALOG_LAYOUT 1
TYVME 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 20
ENGLISH UK 2
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
2.0.4.0

LanguageCode
Unknown (0880)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (4E0)

InitializedDataSize
439296

EntryPoint
0x1829

MIMEType
application/octet-stream

TimeStamp
2018:05:14 05:53:37+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
75264

FileSubtype
0

ProductVersionNumber
2.0.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 1b613159f436928ade528943b037031f
SHA1 a54b04ce4d59820528d5123ab2fa83351bac607a
SHA256 2035ef02a014f9ae2a21d39c98604ca4863d77c47dcc12d31bb9b7b2d3e5fc98
ssdeep
3072:zEKQC2mCj7nnjuEgM5TeOzIVGQ7lQiK5dEl3PyxeHFANThzCyH8J:yju+5TWVGFrEl3PyAuR

authentihash 580628e00099ee86ef5bf0674b7042a2d5e10e047926a7c0e8621e4766bb4f8e
imphash 35eea88c825b860534eccca7ecaf92a3
File size 155.0 KB ( 158720 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-14 21:21:42 UTC ( 1 year ago )
Last submission 2018-05-28 17:41:50 UTC ( 12 months ago )
File names winmgr.exe
output.113312269.txt
okokokok.exe
okokokok.exe
a14b08896528ef96d36a1eb3c58b839b67166ff3
winmgr.exe
winmgr.exe
winmgr(181).gxe
winmgr.exe.1
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections