× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 217201028cfad66ea193105e7a7d6bb0a0d9b536d8cf6093bc45c7c328d63ac7
File name: PriNtrBvF.exe
Detection ratio: 8 / 65
Analysis date: 2018-03-13 09:12:41 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180313
AVG FileRepMalware 20180313
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9994 20180313
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20170201
Cylance Unsafe 20180313
Endgame malicious (high confidence) 20180308
Sophos ML heuristic 20180121
SentinelOne (Static ML) static engine - malicious 20180225
Ad-Aware 20180313
AegisLab 20180313
AhnLab-V3 20180312
Alibaba 20180313
ALYac 20180313
Antiy-AVL 20180313
Arcabit 20180313
Avast-Mobile 20180313
Avira (no cloud) 20180313
AVware 20180313
BitDefender 20180313
Bkav 20180312
CAT-QuickHeal 20180313
ClamAV 20180313
CMC 20180313
Comodo 20180313
Cybereason None
Cyren 20180313
DrWeb 20180313
eGambit 20180313
Emsisoft 20180313
ESET-NOD32 20180313
F-Prot 20180313
F-Secure 20180311
Fortinet 20180313
GData 20180313
Jiangmin 20180313
K7AntiVirus 20180313
K7GW 20180313
Kaspersky 20180313
Kingsoft 20180313
Malwarebytes 20180313
MAX 20180313
McAfee 20180313
McAfee-GW-Edition 20180313
Microsoft 20180313
eScan 20180313
NANO-Antivirus 20180313
nProtect 20180313
Palo Alto Networks (Known Signatures) 20180313
Panda 20180312
Rising 20180313
Sophos AV 20180313
SUPERAntiSpyware 20180313
Symantec 20180313
Symantec Mobile Insight 20180311
Tencent 20180313
TheHacker 20180311
TotalDefense 20180313
TrendMicro 20180313
TrendMicro-HouseCall 20180313
Trustlook 20180313
VBA32 20180312
VIPRE 20180313
ViRobot 20180313
Webroot 20180313
WhiteArmor 20180223
Yandex 20180313
Zillya 20180312
ZoneAlarm by Check Point 20180313
Zoner 20180313
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-12 23:36:33
Entry Point 0x000234C1
Number of sections 5
PE sections
PE imports
RegOpenKeyExW
GetLastError
IsValidCodePage
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetStartupInfoA
LoadLibraryW
SetEvent
GetVersionExW
GetOEMCP
LCMapStringA
TlsSetValue
HeapDestroy
GetTickCount
TlsAlloc
IsValidLocale
GetEnvironmentStringsW
GetVersionExA
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
HeapAlloc
GetCurrentProcess
EnumSystemLocalesA
GetEnvironmentStrings
GetFileType
GetLocaleInfoA
GetCurrentProcessId
FreeEnvironmentStringsW
GetProcessHeap
CreateThread
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
InterlockedIncrement
IsDebuggerPresent
GetCommandLineA
GetUserDefaultLCID
QueryPerformanceCounter
TlsFree
GetLocaleInfoW
CompareStringW
GetCPInfo
GetStringTypeA
GetModuleHandleA
DeleteCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CreateEventW
CompareStringA
GetSystemTimeAsFileTime
GetDateFormatA
GetACP
HeapReAlloc
GetStringTypeW
GetProcAddress
SetEnvironmentVariableA
FreeLibrary
FormatMessageW
TerminateProcess
GetTimeZoneInformation
WideCharToMultiByte
SetHandleCount
InitializeCriticalSection
HeapCreate
VirtualFree
FatalAppExitA
InterlockedDecrement
Sleep
GetCurrentThread
SetConsoleCtrlHandler
CloseHandle
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
SetLastError
GetTimeFormatA
DestroyWindow
OffsetRect
DefWindowProcW
SetMenuItemInfoA
DestroyMenu
MessageBeep
SetWindowPos
SetWindowLongW
SendMessageW
InflateRect
UnregisterClassA
SetCapture
MoveWindow
ShowWindowAsync
AdjustWindowRectEx
PostMessageW
SetActiveWindow
GetKeyState
GetCursorPos
ReleaseDC
CheckMenuItem
DestroyIcon
GetSubMenu
RegisterClassW
LoadStringW
GetClientRect
SetTimer
DrawFocusRect
CreateWindowExA
LoadIconA
GetActiveWindow
SetWindowTextW
CreateWindowExW
GetMenuItemCount
PtInRect
GetMenu
GetMenuStringW
SCardControl
OleSaveToStream
Number of PE resources by type
RT_DIALOG 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:03:13 00:36:33+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
208896

LinkerVersion
7.1

ImageFileCharacteristics
Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x234c1

InitializedDataSize
40960

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 9f471c1ebebd570c78c54b9be855c90b
SHA1 97113f944f161d07ff511135bf4cb9cecbee89b3
SHA256 217201028cfad66ea193105e7a7d6bb0a0d9b536d8cf6093bc45c7c328d63ac7
ssdeep
3072:Rcf53CXcl6+WE6+tiFJplfoAwetiVeiitHupktzF4hOfASWoVLiLgi30YtY2r+gf:RcxCMU/ZYGiitHnLASWhpd9sdQsRA

authentihash 4222f91ce1394e485c1f8906312d240bd406424f7e3a39b39be7355467ff81d5
imphash cb41dddfbb8de0531f95cf7a6f750bb8
File size 248.0 KB ( 253952 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.0%)
Win64 Executable (generic) (31.0%)
Windows screen saver (14.7%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-13 09:12:41 UTC ( 1 year, 1 month ago )
Last submission 2018-10-27 11:25:09 UTC ( 5 months, 4 weeks ago )
File names output.112989882.txt
PriNtrBvF.exe
VirusShare_9f471c1ebebd570c78c54b9be855c90b
PriNtrBvF.exe
VirusShare_9f471c1ebebd570c78c54b9be855c90b
9f471c1ebebd570c78c54b9be855c90b.vir
flareFile
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Opened mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.