× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 41bf764eafc5d80e2ceb78e6dbb6f13c9d7db453b70dc8122ca48d874a64d99a
File name: 41bf764eafc5d80e2ceb78e6dbb6f13c9d7db453b70dc8122ca48d874a64d99a
Detection ratio: 25 / 67
Analysis date: 2018-07-12 19:53:01 UTC ( 8 months, 1 week ago ) View latest
Antivirus Result Update
AegisLab Packer.Generic!c 20180712
Avast FileRepMalware 20180712
AVG FileRepMalware 20180712
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180712
Bkav HW32.Packed.64B9 20180712
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cybereason malicious.46571e 20180225
Cylance Unsafe 20180712
Endgame malicious (high confidence) 20180711
Sophos ML heuristic 20180601
Kaspersky UDS:DangerousObject.Multi.Generic 20180712
Malwarebytes Trojan.MalPack.VB 20180712
MAX malware (ai score=95) 20180712
McAfee Emotet-FHR!4954FA59333C 20180712
McAfee-GW-Edition BehavesLike.Win32.Emotet.mc 20180712
Microsoft Trojan:Win32/Emotet.AC!bit 20180712
Palo Alto Networks (Known Signatures) generic.ml 20180712
Qihoo-360 HEUR/QVM20.1.7521.Malware.Gen 20180712
Rising Malware.Heuristic!ET#95% (RDM+:cmRtazoFxSg57sTR4ySxCvtwaJ8y) 20180712
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/EncPk-ANY 20180712
Symantec Packed.Generic.517 20180712
VBA32 BScope.TrojanBanker.Emotet 20180712
Webroot W32.Trojan.Emotet 20180712
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180712
Ad-Aware 20180712
AhnLab-V3 20180712
Alibaba 20180712
ALYac 20180712
Antiy-AVL 20180712
Arcabit 20180712
Avast-Mobile 20180712
Avira (no cloud) 20180712
AVware 20180712
Babable 20180406
BitDefender 20180712
CAT-QuickHeal 20180712
ClamAV 20180712
CMC 20180712
Comodo 20180712
Cyren 20180712
DrWeb 20180712
eGambit 20180712
Emsisoft 20180712
ESET-NOD32 20180712
F-Prot 20180712
F-Secure 20180712
Fortinet 20180712
GData 20180712
Ikarus 20180712
Jiangmin 20180712
K7AntiVirus 20180712
K7GW 20180712
Kingsoft 20180712
eScan 20180712
NANO-Antivirus 20180712
Panda 20180712
SUPERAntiSpyware 20180712
TACHYON 20180712
Tencent 20180712
TheHacker 20180712
TrendMicro 20180712
TrendMicro-HouseCall 20180712
Trustlook 20180712
VIPRE 20180712
ViRobot 20180712
Yandex 20180712
Zillya 20180712
Zoner 20180711
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© wfw fwfw. f wfw f

Product fwfw f
Original name wfw.fwf
Internal name sfwfw
File version 10.00.9600.16428 (winblue_gdr.131013
Description dfew fw plugin image d
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-12 15:51:03
Entry Point 0x000117DA
Number of sections 6
PE sections
PE imports
CryptDecrypt
CryptHashSessionKey
CryptDecodeObjectEx
JetRetrieveKey
JetMakeKey
GetThreadId
GetBinaryTypeA
VarCyCmp
RasRenameEntryA
DdeDisconnectList
ShowCursor
GetClipboardOwner
IsCharAlphaNumericW
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
API Tracing Manifest Read Library

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

CharacterSet
Unicode

InitializedDataSize
20480

EntryPoint
0x117da

OriginalFileName
amxread.dll

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2018:07:12 17:51:03+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
amxread.dll

ProductVersion
6.1.7600.16385

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
72192

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 4954fa59333c7a4bcc0a00bbd60f10b3
SHA1 7809e9046571e47cb48a1a8845f321c082379e93
SHA256 41bf764eafc5d80e2ceb78e6dbb6f13c9d7db453b70dc8122ca48d874a64d99a
ssdeep
1536:4vQTWRVpi+Edev2MufTFPW++BbCpo6Ztg16WBU/cFa+V2taAaVc/s1sbUnxHn:HYp7vOfTFLbpo6Ztg16WBU/cFa+V2taD

authentihash 57e8cd0d536a0b7f670be3fdc5246cb43a4edf7ff1bdac2563d9a5541d03ad16
imphash 651d585ff23ee6fe5bcc5022176445a4
File size 87.5 KB ( 89600 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-12 15:53:42 UTC ( 8 months, 1 week ago )
Last submission 2018-08-04 11:45:39 UTC ( 7 months, 2 weeks ago )
File names 1686156686.exe
output.113599000.txt
wfw.fwf
659593473989.exe
kmo4PRoT8cTST.exe
726660966.exe
703474003791.exe
sfwfw
0315236738.exe
035692348802.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!