× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4232a13c5dc8c821ea9a9805c92ad5a22c258ade1a74f018865f6f914cf4248b
File name: xPcS7cltc.exe
Detection ratio: 18 / 69
Analysis date: 2019-01-19 07:33:52 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
CAT-QuickHeal Trojan.Emotet.X4 20190118
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.c39e1c 20190109
Cylance Unsafe 20190119
eGambit Unsafe.AI_Score_99% 20190119
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Malwarebytes Trojan.Emotet 20190119
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dh 20190119
Microsoft Trojan:Win32/Emotet.AC!bit 20190119
Palo Alto Networks (Known Signatures) generic.ml 20190119
Qihoo-360 HEUR/QVM19.1.A55B.Malware.Gen 20190119
Rising Trojan.GenKryptik!8.AA55/N3#91% (RDM+:cmRtazp5fVwnheiLQgo8nDqTtOwy) 20190119
SentinelOne (Static ML) static engine - malicious 20190118
Symantec ML.Attribute.HighConfidence 20190118
Trapmine malicious.high.ml.score 20190103
Webroot W32.Trojan.Emotet 20190119
Ad-Aware 20190119
AegisLab 20190119
AhnLab-V3 20190118
Alibaba 20180921
ALYac 20190119
Antiy-AVL 20190119
Arcabit 20190119
Avast 20190119
Avast-Mobile 20190118
AVG 20190119
Avira (no cloud) 20190119
Babable 20180918
Baidu 20190118
BitDefender 20190119
Bkav 20190119
ClamAV 20190119
CMC 20190118
Comodo 20190119
Cyren 20190119
DrWeb 20190119
Emsisoft 20190119
ESET-NOD32 20190119
F-Prot 20190119
F-Secure 20190119
Fortinet 20190119
GData 20190119
Ikarus 20190118
Jiangmin 20190119
K7AntiVirus 20190119
K7GW 20190119
Kaspersky 20190119
Kingsoft 20190119
MAX 20190119
McAfee 20190119
eScan 20190119
NANO-Antivirus 20190119
Panda 20190118
Sophos AV 20190119
SUPERAntiSpyware 20190116
TACHYON 20190119
Tencent 20190119
TheHacker 20190118
TrendMicro 20190119
TrendMicro-HouseCall 20190119
Trustlook 20190119
VBA32 20190118
ViRobot 20190118
Yandex 20190118
Zillya 20190118
ZoneAlarm by Check Point 20190119
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) America Online, Inc. 1999 - 2004

Product America Online
Internal name MISCUTIL
File version 9.00.001
Description Utilities
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-19 07:00:17
Entry Point 0x0001BE53
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
InitiateSystemShutdownA
GetServiceDisplayNameW
CryptHashSessionKey
GetSidIdentifierAuthority
TreeResetNamedSecurityInfoW
LogonUserA
QueryUsersOnEncryptedFile
EqualPrefixSid
GetClusterFromResource
JetTerm2
GetLogColorSpaceA
GetCurrentPositionEx
GetPolyFillMode
GetObjectW
GetFontLanguageInfo
GetObjectType
GetSystemTime
GetSystemWindowsDirectoryA
GetModuleFileNameW
GetOverlappedResult
DeactivateActCtx
GetTapeStatus
FlsGetValue
FlushFileBuffers
GetShortPathNameA
GetVolumePathNamesForVolumeNameW
IsWow64Process
GetAtomNameA
GetVolumeInformationA
GetWindowsDirectoryA
GetPrivateProfileStringA
WriteProfileStringA
GetConsoleCursorInfo
GetCurrentDirectoryA
GetLocalTime
GetLogicalDrives
GetTapePosition
GetPrivateProfileIntW
GetSystemPowerStatus
GetCurrentThread
EnumResourceTypesA
EnumResourceNamesW
GetTimeFormatW
GetProfileSectionA
MapViewOfFile
GetModuleHandleA
GetExitCodeThread
GlobalAddAtomA
FindResourceExW
GetCurrentProcess
ReadFile
GetComputerNameExW
IsValidLocale
GetSystemDirectoryA
GetPrivateProfileSectionW
LocalFree
GetThreadSelectorEntry
QueryIdleProcessorCycleTime
FindAtomW
GetTimeZoneInformation
DebugActiveProcess
GetConsoleMode
GetFileType
LocalUnlock
GetThreadLocale
LoadTypeLib
VariantTimeToSystemTime
GetRecordInfoFromGuids
SystemTimeToVariantTime
RasGetEapUserIdentityA
RpcRaiseException
RpcServerListen
SetupDiGetClassDescriptionExW
ExtractIconA
HashData
SHDeleteValueA
GetMenuPosFromID
DecryptMessage
ReleaseCapture
FindWindowW
GetComboBoxInfo
PostQuitMessage
GetDialogBaseUnits
FlashWindowEx
GetMenuState
LoadCursorW
LookupIconIdFromDirectoryEx
DestroyCaret
GetTabbedTextExtentW
GetWindowRgn
LockWorkStation
GetMenuItemRect
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
DrawMenuBar
DrawTextW
GetThreadDesktop
LoadAcceleratorsA
GetPriorityClipboardFormat
DdeClientTransaction
ChangeMenuA
GetKeyboardLayout
GetMenuItemCount
DeferWindowPos
CreateIconFromResource
ExcludeUpdateRgn
GetWindowLongW
GetWindowTextA
CharNextW
GetMenuContextHelpId
GetFileVersionInfoSizeW
FindNextUrlCacheEntryW
InternetGoOnline
DeleteUrlCacheEntryW
mmioSendMessage
DeletePortW
shutdown
getservbyname
realloc
fputws
fgetws
strcmp
CoTaskMemFree
MkParseDisplayName
CoUninitialize
CoGetClassObjectFromURL
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:01:19 08:00:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
130048

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit, System file

EntryPoint
0x1be53

InitializedDataSize
95232

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 eee77316f586f7fe9afad86fe20605d5
SHA1 c2f0610c39e1caae5ca451c14e3044f600f32d3a
SHA256 4232a13c5dc8c821ea9a9805c92ad5a22c258ade1a74f018865f6f914cf4248b
ssdeep
3072:qBtB38d/dQQFY08jlhHwouPlk6ad3kcqzSdiu3EPnbhFNbchdh+nyL:Y/3m/rFYL5hHwoklUd3tq2j

authentihash aa45ea8348556a340ec63e46517cade0aa4c7801b669ebd6bfceffabd21c1fe8
imphash b3d3f7ae58738a0846e7b38c80c315c5
File size 211.0 KB ( 216064 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Microsoft Visual C++ compiled executable (generic) (46.2%)
Win32 Dynamic Link Library (generic) (18.4%)
Win32 Executable (generic) (12.6%)
Win16/32 Executable Delphi generic (5.8%)
OS/2 Executable (generic) (5.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-19 07:04:15 UTC ( 1 month, 4 weeks ago )
Last submission 2019-01-21 17:04:42 UTC ( 1 month, 3 weeks ago )
File names xPcS7cltc.exe
dxvlSlf0J9bC.exe
Vqtyj9ca.exe
RKNWERer235.exe
ZQET3del0MH.exe
477.exe
MISCUTIL
351.exe
7WS5wm5m.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!