× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3b74112f1e11a578433184505e899b3c47416aa37283812c491525cf36b76c04
File name: c72596c6c09dc3f60d15cac74c166e1f
Detection ratio: 48 / 68
Analysis date: 2018-02-11 05:02:15 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.249362 20180211
ALYac Gen:Variant.Razy.249362 20180211
Antiy-AVL Trojan/Win32.Refinka 20180211
Arcabit Trojan.Razy.D3CE12 20180211
Avast Win32:Malware-gen 20180211
AVG Win32:Malware-gen 20180211
Avira (no cloud) TR/Crypt.XPACK.Gen 20180210
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180208
BitDefender Gen:Variant.Razy.249362 20180211
Bkav HW32.Packed.CAAC 20180209
CAT-QuickHeal Trojan.Refinka 20180210
Comodo Backdoor.Win32.Poison.GBY 20180211
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170201
Cybereason malicious.6c09dc 20180205
Cylance Unsafe 20180211
Cyren W32/Agent.AQR.gen!Eldorado 20180211
DrWeb Trojan.MulDrop7.57372 20180211
eGambit Unsafe.AI_Score_99% 20180211
Emsisoft Gen:Variant.Razy.249362 (B) 20180211
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Kryptik.GBWK 20180211
F-Prot W32/Agent.AQR.gen!Eldorado 20180211
F-Secure Gen:Variant.Razy.249362 20180210
Fortinet W32/GenKryptik.BMXO!tr 20180211
GData Gen:Variant.Razy.249362 20180211
Ikarus Trojan.Win32.Tofsee 20180210
Sophos ML heuristic 20180121
Jiangmin Trojan.Refinka.arc 20180211
K7AntiVirus Trojan ( 005246281 ) 20180211
K7GW Trojan ( 005246281 ) 20180210
Kaspersky Trojan.Win32.Refinka.osg 20180211
MAX malware (ai score=81) 20180211
McAfee GenericRXDV-QH!C72596C6C09D 20180211
McAfee-GW-Edition BehavesLike.Win32.Ransomware.cc 20180211
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180211
eScan Gen:Variant.Razy.249362 20180211
NANO-Antivirus Trojan.Win32.Refinka.expqwv 20180211
Panda Trj/Genetic.gen 20180210
Qihoo-360 HEUR/QVM20.1.2115.Malware.Gen 20180211
Rising Trojan.Kryptik!1.AE8C (CLASSIC) 20180211
SentinelOne (Static ML) static engine - malicious 20180115
Sophos AV Mal/Elenoocka-E 20180211
Symantec Packed.Generic.493 20180210
Tencent Win32.Trojan.Refinka.Swuf 20180211
TrendMicro Ransom_CERBER.SMALY0A 20180211
TrendMicro-HouseCall Ransom_CERBER.SMALY0A 20180211
WhiteArmor Malware.HighConfidence 20180205
ZoneAlarm by Check Point Trojan.Win32.Refinka.osg 20180211
AegisLab 20180211
AhnLab-V3 20180210
Alibaba 20180209
Avast-Mobile 20180210
AVware 20180210
ClamAV 20180211
CMC 20180211
Kingsoft 20180211
Malwarebytes 20180211
nProtect 20180209
Palo Alto Networks (Known Signatures) 20180211
SUPERAntiSpyware 20180210
Symantec Mobile Insight 20180209
TheHacker 20180208
TotalDefense 20180210
Trustlook 20180211
VBA32 20180209
VIPRE 20180211
ViRobot 20180211
Webroot 20180211
Yandex 20180210
Zillya 20180209
Zoner 20180211
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-09 09:13:41
Entry Point 0x00001014
Number of sections 4
PE sections
PE imports
RegDeleteValueW
RegOpenKeyA
RegSaveKeyA
LogonUserW
CreateServiceA
RegUnLoadKeyW
GetUserNameA
ReadEventLogW
RegLoadKeyW
RegRestoreKeyW
OpenEventLogW
RegEnumKeyA
CryptSignHashA
CoRegCleanup
SetSetupSave
DowngradeAPL
ComPlusMigrate
SetSetupOpen
CertFreeCTLContext
CertGetNameStringA
CertCloseStore
CertAlgIdToOID
CryptMsgUpdate
CertDeleteCTLFromStore
CryptMsgControl
CryptMemAlloc
CryptMsgGetParam
CryptFindOIDInfo
CertFindCTLInStore
CryptMsgDuplicate
CertGetStoreProperty
CDLocateRng
CDBuildVect
MD5Final
MD5Init
MD5Update
GetOEMCP
LoadLibraryExA
EnterCriticalSection
GetLogicalDriveStringsA
Heap32Next
GetConsoleAliasA
GetModuleHandleA
CreateFileW
GetCommandLineW
lstrcmp
lstrlen
WriteFile
OpenWaitableTimerW
CreateMutexW
GetCommandLineA
GetProcAddress
GetStringTypeW
SleepEx
InsertMenuA
IsDialogMessageW
CreateDesktopA
DrawStateA
IsWindowVisible
DialogBoxParamW
MessageBoxA
GetClassLongA
GetMessageW
GetWindow
CharToOemA
LoadMenuW
DispatchMessageW
GetDlgItemTextW
Number of PE resources by type
RT_MENU 1
RT_DIALOG 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:06:09 10:13:41+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
140288

LinkerVersion
36.35

FileTypeExtension
exe

InitializedDataSize
20480

SubsystemVersion
5.1

EntryPoint
0x1014

OSVersion
5.1

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 c72596c6c09dc3f60d15cac74c166e1f
SHA1 fb1404bbb5dec5ac3111b27217c180b94543b9a6
SHA256 3b74112f1e11a578433184505e899b3c47416aa37283812c491525cf36b76c04
ssdeep
3072:/5r+fiTSqPHIbFIT+mqlQqaJ0lYFBMHWqx29pHPxujllIgfI54:d+QBMU+EqaJ0l5C9pHPxsj

authentihash 177f6fc6e32f7c112d9e0fd138dbb9f94857cbf003fde5452122a96db30d5696
imphash 4b4f7af7843c81a9f3f0c95bf75d61d2
File size 158.0 KB ( 161792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (43.2%)
Win32 Dynamic Link Library (generic) (21.7%)
Win32 Executable (generic) (14.8%)
Win16/32 Executable Delphi generic (6.8%)
Generic Win/DOS Executable (6.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-02-11 05:02:15 UTC ( 1 year, 2 months ago )
Last submission 2018-02-11 05:02:15 UTC ( 1 year, 2 months ago )
File names c72596c6c09dc3f60d15cac74c166e1f
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs