× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4115bf16c66358589822c156ed394f0a33f8f224558cf804b27242cc5c430e9b
File name: 4115bf16c66358589822c156ed394f0a33f8f224558cf804b27242cc5c430e9b
Detection ratio: 49 / 70
Analysis date: 2018-12-26 01:39:50 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181224
Ad-Aware Trojan.Autoruns.GenericKDS.31439579 20181226
AegisLab Trojan.Win32.Emotet.4!c 20181225
AhnLab-V3 Trojan/Win32.Emotet.R249673 20181225
ALYac Trojan.Autoruns.GenericKDS.31439579 20181226
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181225
Arcabit Trojan.Autoruns.GenericS.D1DFBADB 20181226
Avast Win32:Malware-gen 20181226
AVG Win32:Malware-gen 20181226
BitDefender Trojan.Autoruns.GenericKDS.31439579 20181226
Bkav HW32.Packed. 20181224
ClamAV Win.Malware.Emotet-6792510-0 20181226
Comodo Malware@#1klaswde2m9fn 20181226
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20181226
Cyren W32/Trojan.DJBN-0407 20181226
DrWeb Trojan.EmotetENT.340 20181226
eGambit Unsafe.AI_Score_84% 20181226
Emsisoft Trojan.Autoruns.GenericKDS.31439579 (B) 20181226
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOAT 20181225
F-Secure Trojan.Autoruns.GenericKDS.31439579 20181226
Fortinet W32/Kryptik.GOAT!tr 20181226
GData Trojan.Autoruns.GenericKDS.31439579 20181226
Ikarus Trojan-Banker.Emotet 20181226
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0053b6a31 ) 20181225
K7GW Trojan ( 0053b6a31 ) 20181225
Kaspersky Trojan-Banker.Win32.Emotet.bwje 20181225
Malwarebytes Trojan.Dridex 20181225
McAfee Emotet-FLD!6CD983238144 20181225
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20181225
Microsoft Trojan:Win32/Emotet.CR 20181225
eScan Trojan.Autoruns.GenericKDS.31439579 20181225
NANO-Antivirus Trojan.Win32.Emotet.flljqh 20181225
Palo Alto Networks (Known Signatures) generic.ml 20181226
Panda Trj/GdSda.A 20181225
Qihoo-360 Win32/Trojan.495 20181226
Rising Trojan.Emotet!8.B95 (CLOUD) 20181225
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/Generic-S 20181225
Symantec Trojan.Emotet 20181225
Tencent Win32.Trojan-banker.Emotet.Wtef 20181226
Trapmine malicious.high.ml.score 20181205
TrendMicro TROJ_GEN.R002C0CLN18 20181225
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.SMGB2.hp 20181225
VBA32 BScope.Trojan.Emotet 20181222
Webroot W32.Trojan.Emotet 20181226
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bwje 20181225
Alibaba 20180921
Avast-Mobile 20181225
Avira (no cloud) 20181226
Babable 20180918
Baidu 20181207
CAT-QuickHeal 20181225
CMC 20181225
Cybereason 20180225
F-Prot 20181226
Jiangmin 20181225
Kingsoft 20181226
MAX 20181226
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181225
TACHYON 20181224
TheHacker 20181225
TotalDefense 20181223
Trustlook 20181226
ViRobot 20181225
Yandex 20181223
Zillya 20181225
Zoner 20181225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name OggSound
File version 2, 0, 0, 17
Description Viewpoint Media Player OggSound Component
Comments Data Storage FX Player OggSound Component
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-07-05 05:51:36
Entry Point 0x000020CE
Number of sections 6
PE sections
PE imports
AccessCheck
JetRetrieveColumns
SetPixel
ExtSelectClipRgn
Arc
GetProcessId
HeapCompact
CancelIoEx
GetCPInfo
GetTimeZoneInformation
IsValidLocaleName
GlobalCompact
GetConsoleCP
GetCommandLineW
CloseHandle
SetConsoleCursorPosition
GlobalMemoryStatusEx
FindFirstFileNameTransactedW
GetSystemPowerStatus
CreateMutexExA
GetBinaryTypeA
GetMenuState
GetDoubleClickTime
GetQueueStatus
DlgDirListW
CreateIconFromResourceEx
PostQuitMessage
EnableMenuItem
DeregisterShellHookWindow
memmove
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
KOREAN 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

Comments
Data Storage FX Player OggSound Component

LinkerVersion
12.0

ImageVersion
0.0

FileVersionNumber
3.2.2.26

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Viewpoint Media Player OggSound Component

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

Rademarks
B OriginalFilename

Nent
< ProductVersion

MIMEType
application/octet-stream

FileVersion
2, 0, 0, 17

TimeStamp
2005:07:05 06:51:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
OggSound

UninitializedDataSize
204800

OSVersion
6.0

EntryPoint
0x20ce

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

Opyright
Copyright 2001 Viewpoint Corporati

MachineType
Intel 386 or later, and compatibles

CompanyName
Datastore Corporation

CodeSize
8192

FileSubtype
0

ProductVersionNumber
3.2.2.26

EBuild
t*ProductName

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 6cd9832381441fdaf1c4f007111a700a
SHA1 150deeb9cfa0103a99adde290328df7d48c2e810
SHA256 4115bf16c66358589822c156ed394f0a33f8f224558cf804b27242cc5c430e9b
ssdeep
3072:rfLmNnu9eOC69FHHfdtGPi2OMmpKneux5B3i:rfInu9es9F4i2QKx5t

authentihash b42f8cc97380507dbbbb2341119bd7dcd47950eb5ddbb6db3b73ec86b2c49223
imphash 6d3fef3255342b2d37136a68a20c8deb
File size 120.0 KB ( 122880 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-21 23:07:37 UTC ( 1 month, 3 weeks ago )
Last submission 2018-12-21 23:11:04 UTC ( 1 month, 3 weeks ago )
File names zSBDvMUIDqt0.exe
OggSound
14870912.exe
dSJNA3AW.exe
30009800.exe
XmJ4ElfU3b.exe
5PjlnlUKqtP.exe
93YTyfDf.exe
O6mrGKVGacwb.exe
WuqCm9ng.exe
xI3pfzTkR9fN.exe
pAnA7Ejbmzp.exe
kIvLGhrOG.exe
jetT1Mu0VVA.exe
14870912.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!