× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3ae974563d26e8e655b231258d8b47329ae36fb71c4b9c35271d43c6e6b761d7
File name: payment advise_pdf.exe
Detection ratio: 45 / 68
Analysis date: 2018-12-11 00:07:24 UTC ( 3 days, 4 hours ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31350377 20181210
AhnLab-V3 Malware/Win32.Ransom_hplocky.C2832320 20181210
ALYac Trojan.GenericKD.31350377 20181210
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20181210
Arcabit Trojan.Generic.D1DE5E69 20181210
Avast Win32:Malware-gen 20181210
AVG Win32:Malware-gen 20181210
BitDefender Trojan.GenericKD.31350377 20181210
CAT-QuickHeal Trojan.IGENERIC 20181210
Comodo Malware@#2xbwnm0uwvizr 20181210
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181211
Cyren W32/Trojan.NCUF-3943 20181211
Emsisoft Trojan.GenericKD.31350377 (B) 20181211
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CQTJ 20181210
F-Secure Trojan.GenericKD.31350377 20181211
Fortinet Malicious_Behavior.SB 20181211
GData Trojan.GenericKD.31350377 20181210
Ikarus Trojan.Inject 20181210
Sophos ML heuristic 20181128
Jiangmin Backdoor.Androm.adst 20181210
K7AntiVirus Trojan ( 00540ee41 ) 20181210
K7GW Trojan ( 00540ee41 ) 20181210
Kaspersky Backdoor.Win32.Androm.qunj 20181210
Malwarebytes Trojan.PasswordStealer 20181210
MAX malware (ai score=100) 20181211
McAfee RDN/Generic.hra 20181210
McAfee-GW-Edition BehavesLike.Win32.Generic.gc 20181210
Microsoft Trojan:Win32/Tisar.A 20181210
eScan Trojan.GenericKD.31350377 20181210
NANO-Antivirus Trojan.Win32.Androm.fkgfom 20181210
Palo Alto Networks (Known Signatures) generic.ml 20181211
Panda Trj/CI.A 20181210
Qihoo-360 Win32/Backdoor.0c0 20181211
Rising Backdoor.Androm!8.113 (CLOUD) 20181210
Sophos AV Mal/Generic-S 20181210
Symantec Trojan.Gen.2 20181210
Trapmine malicious.moderate.ml.score 20181205
TrendMicro Ransom_HPLOCKY.SME1 20181210
TrendMicro-HouseCall Ransom_HPLOCKY.SME1 20181210
VBA32 BScope.TrojanRansom.GandCrypt 20181210
Webroot W32.Malware.Gen 20181211
Zillya Backdoor.Androm.Win32.57502 20181208
ZoneAlarm by Check Point Backdoor.Win32.Androm.qunj 20181210
AegisLab 20181210
Alibaba 20180921
Avast-Mobile 20181210
Avira (no cloud) 20181210
Babable 20180918
Baidu 20181207
Bkav 20181210
CMC 20181210
Cybereason 20180225
DrWeb 20181211
eGambit 20181211
F-Prot 20181211
Kingsoft 20181211
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181207
TACHYON 20181210
Tencent 20181211
TheHacker 20181210
TotalDefense 20181210
Trustlook 20181211
ViRobot 20181210
Yandex 20181207
Zoner 20181210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-11-11 21:56:15
Entry Point 0x0001543A
Number of sections 5
PE sections
PE imports
CryptReleaseContext
CryptAcquireContextA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyA
RegCreateKeyA
ImageList_GetIconSize
GetObjectA
CreateCompatibleDC
SelectObject
GetStockObject
GetBitmapDimensionEx
CreateFontIndirectA
AddFontResourceExW
CreateSolidBrush
CombineRgn
BitBlt
BeginPath
DeleteObject
CreateCompatibleBitmap
IcmpCloseHandle
GetAdaptersInfo
IcmpCreateFile
GetStdHandle
GetDriveTypeW
CancelIoEx
FileTimeToSystemTime
GetOverlappedResult
WaitForSingleObject
EncodePointer
SetConsoleCursorPosition
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
FillConsoleOutputCharacterA
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
FormatMessageW
GetTimeZoneInformation
TlsGetValue
GetFullPathNameW
SetLastError
InitializeCriticalSection
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
HeapSetInformation
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
GetTickCount
DisableThreadLibraryCalls
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoW
GetUserDefaultLCID
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
GetProcessHeap
CompareStringW
FindFirstFileExA
lstrcpyA
FindFirstFileW
IsValidLocale
GetProcAddress
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
GlobalFree
GetConsoleCP
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetCurrentDirectoryW
GetCurrentProcessId
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
WideCharToMultiByte
IsValidCodePage
HeapCreate
WriteFile
Sleep
VirtualAlloc
glClear
glLoadIdentity
glMatrixMode
glEndList
GetPwrCapabilities
SetupDiEnumDeviceInterfaces
SetupDiGetClassDevsA
SetupDiDestroyDeviceInfoList
SetupDiGetDeviceInterfaceDetailA
SHCreateShellItem
CommandLineToArgvW
ColorRGBToHLS
StrChrA
PathFileExistsW
PathIsDirectoryW
StrCmpW
GetUserNameExA
SetFocus
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
FindWindowW
GetMonitorInfoA
ShowWindow
DefWindowProcA
FindWindowA
MessageBeep
LoadBitmapA
GetWindowThreadProcessId
SendDlgItemMessageA
GetSystemMetrics
MessageBoxW
SetMessageQueue
GetWindowRect
DispatchMessageA
EndPaint
UnhookWindowsHookEx
MessageBoxIndirectA
MessageBoxA
SetWindowLongA
TranslateMessage
GetWindow
CallNextHookEx
SetActiveWindow
GetDC
RegisterClassExA
EndDeferWindowPos
ReleaseDC
LoadStringA
BeginDeferWindowPos
SendMessageA
GetDesktopWindow
GetClientRect
GetDlgItem
CharLowerBuffA
SetScrollRange
RegisterClassA
SetRect
MonitorFromRect
LoadAcceleratorsA
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
FillRect
EnumThreadWindows
DeferWindowPos
LoadImageA
MsgWaitForMultipleObjects
EnableWindow
GetUpdateRect
DestroyWindow
timeGetTime
WSAStartup
closesocket
socket
WSAIoctl
WTSRegisterSessionNotification
GdipDisposeImage
GdipCreateBitmapFromFile
GdipAlloc
GdipFree
GdipCloneImage
GdiplusStartup
RegisterDragDrop
Number of PE resources by type
RT_BITMAP 12
RT_CURSOR 7
RT_ICON 6
RCDATA 5
RT_GROUP_CURSOR 3
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 35
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:11:11 22:56:15+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
180224

LinkerVersion
10.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x1543a

InitializedDataSize
234496

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 cb7a83bbe941350037827b6a313a2188
SHA1 82019ac949ad5347e3fdd22c369725b8d11f96e3
SHA256 3ae974563d26e8e655b231258d8b47329ae36fb71c4b9c35271d43c6e6b761d7
ssdeep
6144:HXACqV7gErwduaPLuKc+q/ZCZKIgbFUH55hTjbma2tQbtOTN9F:HVduaz1c+q/ZCZKIgcLTj6tgtOzF

authentihash 6d7581c994a2e0ebf979fde25d613aae15f918271ad3cf361d0841a0f8ec0fe0
imphash 606ea7d5f3e71f819263dc2416f487ff
File size 406.0 KB ( 415744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-12 02:12:34 UTC ( 1 month ago )
Last submission 2018-11-12 10:16:12 UTC ( 1 month ago )
File names payment advise_pdf.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!