× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 32df92ed637ae07a4e4e409f5ec4198df0a8832afbb5ecd9d89d52d4b90f0b79
File name: UJWH1U6BNK37.EXE
Detection ratio: 48 / 67
Analysis date: 2018-11-16 19:04:33 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31317983 20181116
AegisLab Trojan.Win32.Emotet.4!c 20181116
AhnLab-V3 Trojan/Win32.Emotet.R241682 20181116
ALYac Trojan.Autoruns.GenericKDS.31317983 20181116
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181116
Arcabit Trojan.Autoruns.GenericS.D1DDDFDF 20181116
Avast Win32:BankerX-gen [Trj] 20181116
AVG Win32:BankerX-gen [Trj] 20181116
BitDefender Trojan.Autoruns.GenericKDS.31317983 20181116
Bkav HW32.Packed. 20181116
CAT-QuickHeal Trojan.IGENERIC 20181116
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.2d1f3f 20180225
Cylance Unsafe 20181116
Cyren W32/Trojan.SQRI-8692 20181116
eGambit Unsafe.AI_Score_91% 20181116
Emsisoft Trojan.Autoruns.GenericKDS.31317983 (B) 20181116
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GBDI 20181116
F-Prot W32/Emotet.IG.gen!Eldorado 20181116
F-Secure Trojan.Autoruns.GenericKDS.31317983 20181116
Fortinet W32/Kryptik.GBDI!tr 20181116
GData Trojan.Autoruns.GenericKDS.31317983 20181116
Sophos ML heuristic 20181108
K7AntiVirus Trojan ( 005227f41 ) 20181116
K7GW Trojan ( 005227f41 ) 20181116
Kaspersky Trojan-Banker.Win32.Emotet.bkix 20181116
Malwarebytes Trojan.Emotet 20181116
MAX malware (ai score=99) 20181116
McAfee RDN/Generic.dx 20181116
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181116
Microsoft Trojan:Win32/Emotet.AC!bit 20181116
eScan Trojan.Autoruns.GenericKDS.31317983 20181116
NANO-Antivirus Trojan.Win32.Emotet.fjrycb 20181116
Palo Alto Networks (Known Signatures) generic.ml 20181116
Panda Trj/Genetic.gen 20181116
Qihoo-360 HEUR/QVM20.1.C5E1.Malware.Gen 20181116
Rising Trojan.Kryptik!8.8 (CLOUD) 20181116
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181116
Symantec Trojan.Emotet 20181116
Tencent Win32.Trojan-banker.Emotet.Szlc 20181116
TrendMicro TROJ_GEN.R004C0CJS18 20181116
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMDS.hp 20181116
VBA32 BScope.TrojanBanker.Emotet 20181116
Webroot W32.Trojan.Emotet 20181116
Zillya Trojan.Emotet.Win32.6914 20181116
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bkix 20181116
Alibaba 20180921
Avast-Mobile 20181116
Avira (no cloud) 20181116
Babable 20180918
Baidu 20181116
ClamAV 20181116
CMC 20181116
Comodo 20181116
DrWeb 20181116
Jiangmin 20181116
Kingsoft 20181116
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
TACHYON 20181116
TheHacker 20181113
TotalDefense 20181116
Trustlook 20181116
ViRobot 20181116
Yandex 20181115
Zoner 20181116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2007 - 2015 Nir Sofer

Product RegDllView
Original name RegDllView.exe
Internal name RegDllView
File version 1.60
Description RegDllView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-07-27 17:30:04
Entry Point 0x000034F0
Number of sections 6
PE sections
PE imports
GetSidSubAuthorityCount
GetOldestEventLogRecord
QueryServiceObjectSecurity
PrivilegeCheck
CryptHashPublicKeyInfo
GetCurrentObject
SetLayout
GetUserDefaultUILanguage
QueryDosDeviceA
GetConsoleWindow
GetCurrentProcessorNumber
ZombifyActCtx
GetFileTime
GetCommandLineW
TlsGetValue
CreateMemoryResourceNotification
GetCurrentThreadId
GetTapeStatus
IsValidLanguageGroup
DrawDibDraw
NetServerComputerNameDel
DsListSitesW
VarBstrFromUI4
WriteGlobalPwrPolicy
RasConnectionNotificationW
UuidFromStringA
StrFromTimeIntervalW
GetCursorPos
CharNextExA
EnumThreadWindows
AnyPopup
BringWindowToTop
GetClientRect
CloseWindow
GetFocus
LogicalToPhysicalPoint
CloseClipboard
SetScrollPos
GetCursor
InternetCanonicalizeUrlW
g_rgSCardRawPci
ReleaseBindInfo
Number of PE resources by type
RT_STRING 5
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 6
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.1

FileSubtype
0

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
RegDllView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
147456

EntryPoint
0x34f0

OriginalFileName
RegDllView.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2007 - 2015 Nir Sofer

FileVersion
1.6

TimeStamp
2013:07:27 10:30:04-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
RegDllView

ProductVersion
1.6

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NirSoft

CodeSize
12288

ProductName
RegDllView

ProductVersionNumber
1.6.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 c4c4df760936d978133f7760b3930e2e
SHA1 5a19c392d1f3fc45455e794210c4ec7ee4b5a698
SHA256 32df92ed637ae07a4e4e409f5ec4198df0a8832afbb5ecd9d89d52d4b90f0b79
ssdeep
3072:W9XEmYb2fpLjU0vslEQECpJapMLEPMmP1Dxi:W5Emq2RLjU0E+QEiU0Et9

authentihash 9a221874b005b74e1eeadccc3e0393bc062357048d72236e7808c54938e62811
imphash e680b9b9a75855243a2d5f2a5fd64927
File size 128.0 KB ( 131072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-25 23:20:10 UTC ( 3 months, 3 weeks ago )
Last submission 2018-11-16 19:04:33 UTC ( 3 months ago )
File names UJWH1U6BNK37.EXE
RegDllView.exe
RegDllView
Gok65gsMx0Y2K.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!