× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3d08ac9cd968a11b8d59d07cf56a70e0e765c62218c20431463eb6d87be99038
File name: LlgZkGVI.exe
Detection ratio: 21 / 71
Analysis date: 2019-02-06 03:42:52 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
Ad-Aware Gen:Variant.Razy.460155 20190206
Arcabit Trojan.Razy.D7057B 20190206
AVG FileRepMalware 20190206
BitDefender Gen:Variant.Razy.460155 20190206
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cylance Unsafe 20190206
Emsisoft Gen:Variant.Razy.460155 (B) 20190206
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMKF 20190206
GData Gen:Variant.Razy.460155 20190206
Sophos ML heuristic 20181128
MAX malware (ai score=80) 20190206
Microsoft Trojan:Win32/Fuerboos.A!cl 20190206
eScan Gen:Variant.Razy.460155 20190206
Qihoo-360 HEUR/QVM20.1.09D1.Malware.Gen 20190206
Rising Trojan.GenKryptik!8.AA55/N3#95% (RDM+:cmRtazr49J93rd5TX7bkR0UFBNZq) 20190206
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Qbot-N 20190206
Symantec ML.Attribute.HighConfidence 20190205
Trapmine malicious.high.ml.score 20190123
AegisLab 20190206
AhnLab-V3 20190205
Alibaba 20180921
ALYac 20190206
Antiy-AVL 20190206
Avast 20190206
Avast-Mobile 20190206
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
Bkav 20190201
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190206
Cybereason 20190109
Cyren 20190206
DrWeb 20190206
eGambit 20190206
F-Prot 20190206
F-Secure 20190205
Fortinet 20190206
Ikarus 20190205
Jiangmin 20190206
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190206
Kingsoft 20190206
Malwarebytes 20190206
McAfee 20190206
McAfee-GW-Edition 20190205
NANO-Antivirus 20190206
Palo Alto Networks (Known Signatures) 20190206
Panda 20190205
SUPERAntiSpyware 20190130
TACHYON 20190206
Tencent 20190206
TheHacker 20190203
TotalDefense 20190205
TrendMicro 20190206
TrendMicro-HouseCall 20190206
Trustlook 20190206
VBA32 20190205
VIPRE 20190205
ViRobot 20190205
Webroot 20190206
Yandex 20190204
Zillya 20190204
ZoneAlarm by Check Point 20190206
Zoner 20190206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserv

Product Microsoft® Windows® Operating S
Original name extractr.exe
Internal name extractr.exe
File version 6.1.7601.17514 (win7sp1_rtm.101119-1
Description Wimfltr v2 extractor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-06 11:41:12
Entry Point 0x00003E13
Number of sections 4
PE sections
PE imports
ImpersonateSelf
GetAclInformation
IsTokenRestricted
CreatePropertySheetPageA
JetIntersectIndexes
CreatePalette
RestoreDC
PatBlt
OffsetRgn
CopyMetaFileW
GetViewportExtEx
GdiSetBatchLimit
GetFontUnicodeRanges
EnumResourceTypesA
LocalFree
FlushProcessWriteBuffers
ResumeThread
GetCurrentProcessorNumber
ApplicationRecoveryInProgress
GetFileSizeEx
GetOverlappedResult
GetConsoleCP
SleepEx
GetOEMCP
WriteFile
GetCurrentProcess
Sleep
VirtualFree
IsProcessorFeaturePresent
GetVersion
GetModuleHandleW
GetBinaryTypeA
FindCloseChangeNotification
LZSeek
LZInit
MprInfoBlockAdd
VarCyAdd
VarCyMul
SafeArrayCreateEx
CM_Set_DevNode_Registry_PropertyW
FreeCredentialsHandle
RegisterWindowMessageW
GetParent
DestroyWindow
FindWindowW
LockSetForegroundWindow
SetWindowPos
EnableWindow
DdeSetUserHandle
TranslateMessage
LoadKeyboardLayoutA
GetMenuItemID
CreateDialogParamW
GetDlgCtrlID
GetMenu
SendDlgItemMessageW
SetWindowTextW
InvalidateRect
wsprintfA
UnhookWinEvent
LoadCursorW
GetSystemMenu
CreateWindowExW
LoadAcceleratorsW
LogicalToPhysicalPoint
CharNextW
OpenClipboard
InternetInitializeAutoProxyDll
GetUrlCacheEntryInfoA
SCardBeginTransaction
SCardListReadersW
fputc
fclose
_time64
_localtime64
towupper
fopen
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
393216

ImageVersion
0.0

ProductName
Microsoft Windows Operating S

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
12.0

FileTypeExtension
exe

OriginalFileName
extractr.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7601.17514 (win7sp1_rtm.101119-1

TimeStamp
2019:02:06 03:41:12-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
extractr.exe

ProductVersion
6.1.7600.163

FileDescription
Wimfltr v2 extractor

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserv

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
28672

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x3e13

ObjectFileType
Executable application

File identification
MD5 3aeaef8006d794a79fe4d6b3394607dd
SHA1 02b03e78a7d66c9cd6cc3fe5807ac10562b6edd1
SHA256 3d08ac9cd968a11b8d59d07cf56a70e0e765c62218c20431463eb6d87be99038
ssdeep
3072:LHO5xWvFtoi89BIWgGTXBlfP5JTHOLS7Lm63KJ0cf:b6WvFX89BF1PFv3KJ0c

authentihash f218991c752c30688b67ca9417dd0623acfefed0e6811c05ae270bdc2c3ae8b8
imphash f1979a2b483134cce7495beea125e128
File size 408.0 KB ( 417792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-06 03:42:52 UTC ( 1 month, 1 week ago )
Last submission 2019-02-06 04:41:36 UTC ( 1 month, 1 week ago )
File names mdmmcdthunk.exe
tmplvsc.exe
substurned.exe
extractr.exe
emotet_e1_3d08ac9cd968a11b8d59d07cf56a70e0e765c62218c20431463eb6d87be99038_2019-02-06__035007.exe_
LlgZkGVI.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!