× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2194aacd473325c5ff04c51f64941cbe6cd299149a8bb768e2ed05c0e950dd3c
File name: precomp.exe
Detection ratio: 45 / 71
Analysis date: 2019-02-06 18:16:54 UTC ( 1 week, 2 days ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.274755 20190206
AhnLab-V3 Adware/Win32.HPDefender.C2394992 20190206
ALYac Gen:Variant.Zusy.274755 20190206
Arcabit Trojan.Zusy.D43143 20190206
Avast Win32:Malware-gen 20190206
AVG Win32:Malware-gen 20190206
Avira (no cloud) ADWARE/HPDefender.oqcpx 20190206
BitDefender Gen:Variant.Zusy.274755 20190206
CAT-QuickHeal Trojan.Miner 20190206
Comodo ApplicUnwnt@#mx82yii3yzi3 20190206
Cybereason malicious.3e3341 20190109
Cylance Unsafe 20190206
Cyren W32/Trojan.VOWI-6235 20190206
Emsisoft Gen:Variant.Zusy.274755 (B) 20190206
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/CoinMiner.GC potentially unwanted 20190206
F-Secure Adware.ADWARE/HPDefender.oqcpx 20190206
Fortinet W32/CoinMiner.GC 20190206
GData Gen:Variant.Zusy.274755 20190206
K7AntiVirus Adware ( 005267531 ) 20190206
K7GW Adware ( 005267531 ) 20190206
Kaspersky Trojan.Win32.Miner.tlia 20190206
MAX malware (ai score=100) 20190206
McAfee Artemis!AADD4033E334 20190206
McAfee-GW-Edition BehavesLike.Win32.Ramnit.th 20190206
Microsoft Trojan:Win32/Bluteal!rfn 20190206
eScan Gen:Variant.Zusy.274755 20190206
NANO-Antivirus Trojan.Win32.Miner.exyrrs 20190206
Palo Alto Networks (Known Signatures) generic.ml 20190206
Panda Trj/GdSda.A 20190206
Qihoo-360 Win32/Sorter.AVE.CryptLocker.BG 20190206
Rising Malware.Heuristic.MLite(81%) (AI-LITE:NbTHv3J/598CdFoVRpqfKA) 20190206
Sophos AV Ethminer Ethereum Miner (PUA) 20190206
SUPERAntiSpyware Hack.Tool/Gen-BitCoinMiner 20190130
Symantec ML.Attribute.HighConfidence 20190206
Tencent Win32.Trojan.Miner.Lqfd 20190206
Trapmine malicious.moderate.ml.score 20190123
TrendMicro TROJ_GEN.R002C0DIC18 20190206
TrendMicro-HouseCall TROJ_GEN.R002C0DIC18 20190206
VBA32 Trojan.Miner 20190206
ViRobot Trojan.Win32.Z.Zusy.1203712 20190206
Webroot W32.Malware.Gen 20190206
Yandex Trojan.Miner!kRaMBy5GFIA 20190206
Zillya Trojan.Miner.Win32.2424 20190206
ZoneAlarm by Check Point Trojan.Win32.Miner.tlia 20190206
Acronis 20190130
AegisLab 20190206
Alibaba 20180921
Antiy-AVL 20190206
Avast-Mobile 20190206
Babable 20180918
Baidu 20190202
Bkav 20190201
ClamAV 20190206
CMC 20190206
CrowdStrike Falcon (ML) 20181023
DrWeb 20190206
eGambit 20190206
F-Prot 20190206
Ikarus 20190206
Sophos ML 20181128
Jiangmin 20190206
Kingsoft 20190206
Malwarebytes 20190206
SentinelOne (Static ML) 20190203
TACHYON 20190206
TheHacker 20190203
TotalDefense 20190206
Trustlook 20190206
VIPRE 20190205
Zoner 20190206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Command Line Precompressor
Original name precomp.exe
Internal name precomp.exe
File version 0.4.3
Description Command Line Precompressor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-13 19:41:30
Entry Point 0x0008BA2C
Number of sections 7
PE sections
PE imports
CryptReleaseContext
RegCloseKey
CryptAcquireContextA
CryptGetHashParam
CryptGenRandom
RegEnumValueA
RegOpenKeyExA
CryptHashData
CryptDestroyHash
CryptCreateHash
CreateTimerQueueTimer
GetDriveTypeW
VerifyVersionInfoA
InterlockedPopEntrySList
WaitForSingleObject
EncodePointer
CreateTimerQueue
QueueUserAPC
SystemTimeToTzSpecificLocalTime
GetStdHandle
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
EnumSystemLocalesW
UnregisterWait
FreeEnvironmentStringsW
InitializeSListHead
FileTimeToSystemTime
GetLocaleInfoW
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
GetCommandLineA
GetThreadTimes
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
GetThreadPriority
SetWaitableTimer
FreeLibraryAndExitThread
GetTimeZoneInformation
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
SignalObjectAndWait
InterlockedPushEntrySList
SetLastError
GetSystemTime
GetModuleFileNameW
TryEnterCriticalSection
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
VerSetConditionMask
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
DeleteTimerQueueTimer
RegisterWaitForSingleObject
CreateThread
SetEnvironmentVariableW
InterlockedFlushSList
GetExitCodeThread
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
ChangeTimerQueueTimer
SetEndOfFile
GetCurrentThreadId
GetProcAddress
SleepEx
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
ExitThread
GetDateFormatW
GetStartupInfoW
WaitForMultipleObjects
GetProcessHeap
QueryDepthSList
CompareStringW
FindFirstFileExA
ResetEvent
InitOnceExecuteOnce
CreateWaitableTimerA
FindNextFileA
IsValidLocale
DuplicateHandle
ExpandEnvironmentStringsA
ReadConsoleW
GetProcessAffinityMask
CreateEventW
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
UnregisterWaitEx
GetTimeFormatW
GetEnvironmentStringsW
WaitForSingleObjectEx
GetQueuedCompletionStatus
SwitchToThread
GetCurrentDirectoryW
GetCurrentProcessId
CreateIoCompletionPort
GetCommandLineW
WideCharToMultiByte
HeapSize
RaiseException
SetThreadAffinityMask
GetCurrentThread
QueryPerformanceFrequency
ReleaseSemaphore
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetLogicalProcessorInformation
GetNumaHighestNodeNumber
IsValidCodePage
PostQueuedCompletionStatus
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
getaddrinfo
htonl
WSARecv
accept
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
WSASetLastError
WSAGetLastError
getsockopt
closesocket
send
WSASend
ntohs
select
listen
__WSAFDIsSet
WSACleanup
getpeername
recv
WSAIoctl
setsockopt
socket
bind
WSASocketW
PE exports
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.9600.16384

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Command Line Precompressor

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
325632

EntryPoint
0x8ba2c

OriginalFileName
precomp.exe

MIMEType
application/octet-stream

FileVersion
0.4.3

TimeStamp
2018:01:13 20:41:30+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
precomp.exe

ProductVersion
0.4.3

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Unknown (0)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
888832

ProductName
Command Line Precompressor

ProductVersionNumber
6.3.9600.16384

FileTypeExtension
exe

ObjectFileType
Unknown

File identification
MD5 aadd4033e334165172c719c2d32c9fc1
SHA1 8b4ed2eeaf6d85f5a7ae2613c8b7869965d1b7b7
SHA256 2194aacd473325c5ff04c51f64941cbe6cd299149a8bb768e2ed05c0e950dd3c
ssdeep
24576:LyPKWJA6Jfu3tOG8UEdn7LzuEY19PPO3YT5M6Ohc9PTXjzrm1fU:iKWJAFhgFLzuDO3YlFOhc9PTXjzy1fU

authentihash 2c41580ea6bd0db88e249be37e9d45174edfa546153d8ffc9807856a293da20f
imphash 0075342f7ab92209556365f91682804a
File size 1.1 MB ( 1203712 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-01-24 13:12:17 UTC ( 1 year ago )
Last submission 2018-10-13 16:27:06 UTC ( 4 months ago )
File names precomp.oldexe
2194aacd473325c5ff04c51f64941cbe6cd299149a8bb768e2ed05c0e950dd3c.bin
precomp.exe
precomp.exe
precomp.exe
precomp.exe
precomp.exe
precomp.exe
precomp.exe
precomp.exe
precomp.exe
flareFile
precomp.exe
precomp.exe
precomp.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!