× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 429ffa5c7c52c01146f172a51945ebd02e473c4780466fd57f86534129c7d54b
File name: 44c6561214021a85e3ae3002f9a75155
Detection ratio: 35 / 68
Analysis date: 2018-01-14 21:11:12 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Ursu.57472 20180114
ALYac Gen:Variant.Ursu.57472 20180114
Arcabit Trojan.Ursu.DE080 20180114
Avast FileRepMalware 20180114
AVG FileRepMalware 20180114
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180112
BitDefender Gen:Variant.Ursu.57472 20180114
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20171016
Cybereason malicious.b79381 20171103
Cylance Unsafe 20180114
eGambit Unsafe.AI_Score_97% 20180114
Emsisoft Gen:Variant.Ursu.57472 (B) 20180114
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Kryptik.GBPB 20180114
F-Secure Gen:Variant.Ursu.57472 20180114
Fortinet W32/Kryptik.EDFS!tr 20180114
GData Gen:Variant.Ursu.57472 20180114
Sophos ML heuristic 20170914
Kaspersky Trojan-Downloader.Win32.Upatre.gkwt 20180114
Malwarebytes Trojan.PasswordStealer 20180114
MAX malware (ai score=89) 20180114
McAfee Artemis!44C656121402 20180114
McAfee-GW-Edition BehavesLike.Win32.Ransomware.cc 20180114
Microsoft VirTool:Win32/CeeInject 20180114
eScan Gen:Variant.Ursu.57472 20180114
Qihoo-360 HEUR/QVM20.1.8769.Malware.Gen 20180114
Rising Downloader.Upatre!8.B5 (TFE:4:AUwxqgWNyXR) 20180114
SentinelOne (Static ML) static engine - malicious 20171224
Sophos AV Mal/Generic-S 20180114
Symantec Trojan.Gen.9 20180114
Tencent Suspicious.Heuristic.Gen.b.0 20180114
TrendMicro TROJ_GEN.R004C0WAE18 20180114
TrendMicro-HouseCall TROJ_GEN.R004C0WAE18 20180114
VIPRE Trojan.Win32.Generic!BT 20180114
ZoneAlarm by Check Point Trojan-Downloader.Win32.Upatre.gkwt 20180114
AegisLab 20180114
AhnLab-V3 20180114
Alibaba 20180114
Antiy-AVL 20180114
Avast-Mobile 20180114
Avira (no cloud) 20180114
AVware 20180103
Bkav 20180112
CAT-QuickHeal 20180113
ClamAV 20180114
CMC 20180114
Comodo 20180114
Cyren 20180114
DrWeb 20180114
F-Prot 20180114
Ikarus 20180114
Jiangmin 20180114
K7AntiVirus 20180114
K7GW 20180112
Kingsoft 20180114
NANO-Antivirus 20180114
nProtect 20180114
Palo Alto Networks (Known Signatures) 20180114
Panda 20180114
SUPERAntiSpyware 20180114
Symantec Mobile Insight 20180112
TheHacker 20180114
TotalDefense 20180114
Trustlook 20180114
VBA32 20180112
ViRobot 20180114
Webroot 20180114
WhiteArmor 20180110
Yandex 20180112
Zillya 20180112
Zoner 20180114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-02-05 16:05:34
Entry Point 0x00006983
Number of sections 3
PE sections
PE imports
SafeRef
CoLoadServices
CoEnterServiceDomain
CoCreateActivity
SetVolumeLabelW
SetThreadContext
lstrcmpi
ResumeThread
CreateProcessA
OpenJobObjectW
LoadLibraryA
ReadProcessMemory
VirtualAlloc
GetConsoleAliasW
GetTickCount
ReadConsoleA
CreateFileMappingA
GetConsoleTitleA
GetSystemDirectoryA
WaitForSingleObjectEx
DecodePointer
SetLocalTime
CopyFileW
SHGetFileInfoA
SHFree
SHDefExtractIconA
SHUpdateImageA
SHFileOperationW
ShellAboutW
DllUnregisterServer
StrChrA
ExtractIconW
FindExecutableA
Chkdsk
FormatEx
Recover
Extend
Format
InsertMenuA
GetMessageA
GetClassLongW
FlashWindow
LoadMenuA
DispatchMessageA
LoadIconW
wsprintfW
DrawStateW
GetPropA
IsCharLowerW
IsDialogMessageA
CharToOemA
PE exports
Number of PE resources by type
CSQA 3
Number of PE resources by language
ENGLISH US 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:02:05 17:05:34+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
135168

LinkerVersion
10.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

FileTypeExtension
exe

InitializedDataSize
18432

SubsystemVersion
4.0

EntryPoint
0x6983

OSVersion
5.1

ImageVersion
5.1

UninitializedDataSize
0

File identification
MD5 44c6561214021a85e3ae3002f9a75155
SHA1 76695e6b79381755926cfb4006e74e5fec584531
SHA256 429ffa5c7c52c01146f172a51945ebd02e473c4780466fd57f86534129c7d54b
ssdeep
3072:wbJS5mN5m89RJM4KXwsIi8n7gmWUzIQ9:uJn5maRJM42Hp7DSI

authentihash 2ef320c31f60b193eda3760d40569df88708cac74b5badb1b1e6de219b5019a7
imphash 0f83a75db9e6f53ee81898bd75772760
File size 146.5 KB ( 150016 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-01-14 21:11:12 UTC ( 1 year, 3 months ago )
Last submission 2018-01-14 21:11:12 UTC ( 1 year, 3 months ago )
File names 44c6561214021a85e3ae3002f9a75155
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs