× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2ad57fe2d71e246028891018476dd3d0ddbbd7d39db8056b17d2b2aaf69bfd45
File name: .
Detection ratio: 39 / 66
Analysis date: 2018-09-10 06:05:28 UTC ( 8 months, 2 weeks ago ) View latest
Antivirus Result Update
AhnLab-V3 Trojan/Win32.Injector.C2700378 20180909
Antiy-AVL Trojan[Exploit]/EXE.CVE-2016-0099.Generic 20180906
Arcabit Trojan.Generic.D269583E 20180910
Avast Win32:Evo-gen [Susp] 20180910
AVG Win32:Evo-gen [Susp] 20180910
Avira (no cloud) HEUR/AGEN.1031789 20180910
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180910
BitDefender Trojan.GenericKD.40458302 20180910
Bkav HW32.Packed. 20180906
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cybereason malicious.9b52a4 20180225
Cyren W32/Trojan.XURX-1089 20180910
Emsisoft Trojan.GenericKD.40458302 (B) 20180910
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Injector.EAHB 20180910
F-Secure Trojan.GenericKD.40458302 20180910
Fortinet W32/Fareit!tr.pws 20180910
GData Trojan.GenericKD.40458302 20180910
Ikarus Trojan.Injector 20180909
Sophos ML heuristic 20180717
K7GW Trojan ( 0053c0681 ) 20180910
Kaspersky HEUR:Trojan-PSW.Win32.Fareit.gen 20180910
Malwarebytes Spyware.LokiBot 20180910
MAX malware (ai score=100) 20180910
McAfee Artemis!6BD2F5E8E83D 20180910
McAfee-GW-Edition BehavesLike.Win32.ObfusRansom.fc 20180910
Microsoft Trojan:Win32/Tiggre!rfn 20180910
eScan Trojan.GenericKD.40458302 20180910
Palo Alto Networks (Known Signatures) generic.ml 20180910
Panda Trj/CI.A 20180909
Qihoo-360 HEUR/QVM42.2.B5CF.Malware.Gen 20180910
Rising Trojan.Injector!8.C4 (CLOUD) 20180910
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/Generic-S 20180910
Symantec Trojan Horse 20180909
Tencent Win32.Trojan.Inject.Auto 20180910
TrendMicro TROJ_GEN.R015C0OI918 20180910
TrendMicro-HouseCall TROJ_GEN.R015C0OI918 20180910
ZoneAlarm by Check Point HEUR:Trojan-PSW.Win32.Fareit.gen 20180910
Ad-Aware 20180910
AegisLab 20180910
Alibaba 20180713
ALYac 20180910
Avast-Mobile 20180910
AVware 20180910
Babable 20180907
CAT-QuickHeal 20180909
ClamAV 20180910
CMC 20180910
Comodo 20180910
DrWeb 20180910
eGambit 20180910
F-Prot 20180910
Jiangmin 20180910
K7AntiVirus 20180910
Kingsoft 20180910
NANO-Antivirus 20180910
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180905
TACHYON 20180910
TheHacker 20180907
Trustlook 20180910
VBA32 20180907
VIPRE 20180910
ViRobot 20180910
Webroot 20180910
Yandex 20180908
Zillya 20180908
Zoner 20180909
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
F-PROT NSIS, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-01-30 03:57:45
Entry Point 0x0000320C
Number of sections 5
PE sections
Overlays
MD5 95e3afee3723d87ed9ab57cd7d6a5698
File type data
Offset 37376
Size 299217
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GetProcAddress
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GlobalLock
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 4
RT_BITMAP 1
RT_ICON 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:01:30 04:57:45+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
25600

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x320c

InitializedDataSize
162816

SubsystemVersion
4.0

ImageVersion
6.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 6bd2f5e8e83dd335d3abf107a1c8d9fe
SHA1 e85a9a19b52a47d321281b5a37ec082eaa9c77ca
SHA256 2ad57fe2d71e246028891018476dd3d0ddbbd7d39db8056b17d2b2aaf69bfd45
ssdeep
6144:8DOc1p3QpKPbxaNctzJfvYq+4hnuvwFlJvMd7GDmUM9+U+BksalAM9w4Mfiil:+t15PbDJJ3Yq+HwMRSmdAralAgBu

authentihash dc66a4c3c0f43b9a12540e146421437075c2ee713e69d0a844258ac2f8591804
imphash 3abe302b6d9a1256e6a915429af4ffd2
File size 328.7 KB ( 336593 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2018-09-07 19:28:37 UTC ( 8 months, 2 weeks ago )
Last submission 2018-09-23 21:31:45 UTC ( 8 months ago )
File names .
d.exe
d.exe
d.exe
output.114015035.txt
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Runtime DLLs