× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 377aa7ab21be4da6e96f0cfc57631e9315a781177e284d81613b3c8243ae5569
File name: 55FF.tmp.exe
Detection ratio: 10 / 68
Analysis date: 2018-06-26 13:48:26 UTC ( 11 months ago ) View latest
Antivirus Result Update
Bkav W32.eHeur.Malware14 20180626
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20180530
Cylance Unsafe 20180626
Endgame malicious (moderate confidence) 20180612
Kaspersky UDS:DangerousObject.Multi.Generic 20180626
Palo Alto Networks (Known Signatures) generic.ml 20180626
SentinelOne (Static ML) static engine - malicious 20180618
VBA32 BScope.Trojan.Yakes 20180626
Webroot W32.Rogue.Gen 20180626
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180626
Ad-Aware 20180626
AegisLab 20180626
AhnLab-V3 20180626
Alibaba 20180626
ALYac 20180626
Antiy-AVL 20180626
Arcabit 20180626
Avast 20180626
Avast-Mobile 20180626
AVG 20180626
Avira (no cloud) 20180626
AVware 20180626
Babable 20180406
Baidu 20180626
BitDefender 20180626
CAT-QuickHeal 20180626
ClamAV 20180625
CMC 20180626
Comodo 20180626
Cybereason 20180225
Cyren 20180626
DrWeb 20180626
eGambit 20180626
Emsisoft 20180626
ESET-NOD32 20180626
F-Prot 20180626
F-Secure 20180626
Fortinet 20180626
GData 20180626
Ikarus 20180626
Sophos ML 20180601
Jiangmin 20180626
K7AntiVirus 20180626
K7GW 20180626
Kingsoft 20180626
Malwarebytes 20180626
MAX 20180626
McAfee 20180626
McAfee-GW-Edition 20180626
Microsoft 20180626
eScan 20180626
NANO-Antivirus 20180626
Panda 20180626
Qihoo-360 20180626
Rising 20180626
Sophos AV 20180626
SUPERAntiSpyware 20180626
Symantec 20180626
Symantec Mobile Insight 20180626
TACHYON 20180626
Tencent 20180626
TheHacker 20180624
TrendMicro 20180626
TrendMicro-HouseCall 20180626
Trustlook 20180626
VIPRE 20180626
ViRobot 20180626
Yandex 20180626
Zillya 20180626
Zoner 20180626
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(C)

Product Mrever
Description Uuencde Clickthrugh Rtc
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-26 12:01:09
Entry Point 0x00071770
Number of sections 3
PE sections
PE imports
RegEnumKeyA
CommDlgExtendedError
JetTruncateLogInstance
BitBlt
gluLookAt
DeleteIPAddress
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
acmDriverOpen
LresultFromObject
LoadTypeLib
UuidFromStringA
SetupDiGetClassDevsA
DragQueryFileA
StrCmpNIA
OpenThemeData
mmioSetInfo
OpenPrinterA
Ord(17)
CoInitialize
PdhOpenQueryA
HlinkGoBack
Number of PE resources by type
RT_DIALOG 14
RT_BITMAP 12
RT_ICON 7
REGISTRY 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 38
PE resources
ExifTool file metadata
CodeSize
155648

SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.9.5

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Uuencde Clickthrugh Rtc

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
57344

PrivateBuild
6.3.9.5

EntryPoint
0x71770

MIMEType
application/octet-stream

LegalCopyright
(C)

TimeStamp
2018:06:26 13:01:09+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
6.3.9.5

UninitializedDataSize
307200

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

LegalTrademarks
(C)

ProductName
Mrever

ProductVersionNumber
6.3.9.5

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 6069c345c8fcd7e233103e5309359616
SHA1 b37cbf9619a639745cb3ba6ce4bb2b11c2fb9dc8
SHA256 377aa7ab21be4da6e96f0cfc57631e9315a781177e284d81613b3c8243ae5569
ssdeep
3072:77VOfDLCyHgcCQxrEMDENO9B7BZpZKF/yeXAvYgZKlAg5S+gWHYDokeF9+6FTF:/V3QVExNO9PZKFKioPaBS+grcbrFTF

authentihash ee1010687885c0cde4ecd3f74534a255ec2d84de99eb74c16d4db4cc39526038
imphash 1859225a53d42ab938718765554b6541
File size 204.5 KB ( 209408 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (28.0%)
UPX compressed Win32 Executable (27.5%)
Win32 EXE Yoda's Crypter (27.0%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
Tags
peexe upx

VirusTotal metadata
First submission 2018-06-26 13:03:56 UTC ( 11 months ago )
Last submission 2018-10-01 10:22:57 UTC ( 7 months, 3 weeks ago )
File names home
55FF.tmp.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.