× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2d325563fc2ba18c9d4f30b5620c39f896895618fca7565aec90cf1d6994eb96
File name: MmKNjhiTuE.exe
Detection ratio: 12 / 68
Analysis date: 2018-09-15 10:30:00 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
CAT-QuickHeal Trojan.Emotet.X4 20180915
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cylance Unsafe 20180915
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.CLEC 20180915
Sophos ML heuristic 20180717
Microsoft Trojan:Win32/Emotet.AC!bit 20180915
Qihoo-360 HEUR/QVM20.1.E0AF.Malware.Gen 20180915
Rising Malware.Heuristic!ET#95% (RDM+:cmRtazq1DoZEkRvua1ppPwumSIMl) 20180915
SentinelOne (Static ML) static engine - malicious 20180830
Symantec ML.Attribute.HighConfidence 20180914
Webroot W32.Trojan.Emotet 20180915
Ad-Aware 20180913
AegisLab 20180915
AhnLab-V3 20180914
Alibaba 20180713
ALYac 20180915
Antiy-AVL 20180915
Arcabit 20180915
Avast 20180915
Avast-Mobile 20180915
AVG 20180915
Avira (no cloud) 20180914
AVware 20180915
Babable 20180907
Baidu 20180914
BitDefender 20180915
Bkav 20180915
ClamAV 20180915
CMC 20180915
Comodo 20180915
Cybereason 20180225
Cyren 20180915
DrWeb 20180915
eGambit 20180915
Emsisoft 20180915
F-Prot 20180915
F-Secure 20180915
Fortinet 20180915
GData 20180915
Ikarus 20180915
Jiangmin 20180915
K7AntiVirus 20180915
K7GW 20180915
Kaspersky 20180915
Kingsoft 20180915
Malwarebytes 20180915
MAX 20180915
McAfee 20180915
McAfee-GW-Edition 20180915
eScan 20180915
NANO-Antivirus 20180915
Palo Alto Networks (Known Signatures) 20180915
Panda 20180915
Sophos AV 20180915
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180915
Tencent 20180915
TheHacker 20180914
TotalDefense 20180915
TrendMicro 20180915
TrendMicro-HouseCall 20180915
Trustlook 20180915
VBA32 20180914
VIPRE 20180915
ViRobot 20180915
Yandex 20180915
Zillya 20180914
ZoneAlarm by Check Point 20180915
Zoner 20180914
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

Product Mozilla
Internal name uconv
File version Personal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-15 17:00:43
Entry Point 0x0001F3EE
Number of sections 6
PE sections
PE imports
ReadEncryptedFileRaw
CryptGetHashParam
ObjectDeleteAuditAlarmW
CreateRestrictedToken
ChangeServiceConfig2A
RegSetValueW
DeleteAce
TreeResetNamedSecurityInfoW
GetSecurityDescriptorLength
CryptCreateHash
PrintDlgExW
CryptUnregisterOIDFunction
CertCreateSelfSignCertificate
CryptHashCertificate
CertGetStoreProperty
CloseMetaFile
CreateBitmap
PaintRgn
GetTcpStatistics
GetAdaptersInfo
UnlockFile
AddVectoredExceptionHandler
SetThreadPriority
GetFileSize
GetModuleHandleA
OutputDebugStringW
ResumeThread
GlobalFindAtomA
_lopen
HeapAlloc
FoldStringW
FindFirstChangeNotificationA
PeekConsoleInputA
GetCurrentThreadId
RaiseException
MprInfoDelete
MprAdminMIBEntryGetFirst
MprAdminInterfaceGetHandle
NetApiBufferSize
SafeArrayDestroyDescriptor
VarI2FromStr
VARIANT_UserUnmarshal
RasEnumEntriesW
RasEnumConnectionsW
UuidCreateSequential
I_RpcAsyncAbortCall
RpcBindingToStringBindingA
RpcSmDestroyClientContext
RpcAsyncCompleteCall
SetupDiGetDriverInfoDetailA
CM_Get_DevNode_Registry_PropertyW
SetupCloseLog
SetupDiGetClassInstallParamsW
StrCSpnIW
ReleaseDC
GetPriorityClipboardFormat
EnumThreadWindows
AnyPopup
MoveWindow
ShowWindowAsync
CreateIconFromResourceEx
GetClientRect
GetWindow
VerFindFileW
HttpSendRequestW
waveInGetPosition
mixerGetLineInfoW
XcvDataW
WintrustGetRegPolicyFlags
localeconv
MkParseDisplayName
GetClassFile
OleCreateEmbeddingHelper
PdhBrowseCountersW
PdhEnumObjectsW
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
259072

EntryPoint
0x1f3ee

MIMEType
application/octet-stream

LegalCopyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

FileVersion
Personal

TimeStamp
2018:09:15 17:00:43+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
uconv

ProductVersion
Personal

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mozilla, Netscape

LegalTrademarks
Mozilla, Netscape

ProductName
Mozilla

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 dcfb2c13bd5a9d9f354a772b69491b35
SHA1 d913bed0de10c0168bc8ab733f9b5fd20bbd5472
SHA256 2d325563fc2ba18c9d4f30b5620c39f896895618fca7565aec90cf1d6994eb96
ssdeep
3072:T2pQCpK4I7InYYdAoyjzqqxJkA8EOMQhuviZWXs3u8UYQxosnCi7pt4RYqKi1AYm:r0K37I+oSqREOZuK8ThNCir4Jr1ARx

authentihash a505237745873ce415adf1acbb7a7eb3e63f004ddb07f540c425e7d310bbed24
imphash 2f0fc27a5c6a0d0cceda47748594e1c9
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-15 10:03:00 UTC ( 5 months, 1 week ago )
Last submission 2018-09-15 10:30:00 UTC ( 5 months, 1 week ago )
File names MmKNjhiTuE.exe
zbetcheckin_tracker_NTGpsf
41.exe
uconv
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs