× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4336142bb4a33ce8200e3b440c2ae2fe8dfdc3252173a6f270ec8a6807fa6bef
File name: 2103.exe
Detection ratio: 47 / 69
Analysis date: 2018-10-09 11:21:18 UTC ( 1 week ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30444405 20181009
AegisLab Troj.Downloader.W32!c 20181009
AhnLab-V3 Trojan/Win32.Agent.C2437881 20181009
ALYac Trojan.Downloader.Agent 20181009
Antiy-AVL Trojan[Downloader]/Win32.AGeneric 20181009
Arcabit Trojan.Generic 20181009
Avast Win32:Dh-A [Heur] 20181009
AVG Win32:Dh-A [Heur] 20181009
Avira (no cloud) TR/Spy.Agent.kpelq 20181009
AVware Trojan.Win32.Generic!BT 20180925
BitDefender Trojan.GenericKD.30444405 20181009
CAT-QuickHeal Trojan.IGENERIC 20181008
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180723
Cylance Unsafe 20181009
Cyren W32/Trojan.IZRB-2120 20181009
Emsisoft Trojan.GenericKD.30444405 (B) 20181009
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Spy.Delf.POA 20181009
F-Secure Trojan.GenericKD.30444405 20181009
Fortinet W32/Fareit.A 20181009
GData Trojan.GenericKD.30444405 20181009
Ikarus Backdoor.Win32.Delf 20181009
Sophos ML heuristic 20180717
Jiangmin TrojanDownloader.Generic.azoz 20181009
K7AntiVirus Trojan ( 7000000f1 ) 20181009
K7GW Trojan ( 7000000f1 ) 20181009
Kaspersky HEUR:Trojan-Downloader.Win32.Generic 20181009
MAX malware (ai score=100) 20181009
McAfee Artemis!2785CAD8298F 20181009
McAfee-GW-Edition BehavesLike.Win32.Generic.gh 20181009
Microsoft Trojan:Win32/Tiggre!rfn 20181009
eScan Trojan.GenericKD.30444405 20181009
NANO-Antivirus Trojan.Win32.Delf.ezbzgp 20181009
Palo Alto Networks (Known Signatures) generic.ml 20181009
Panda Trj/Genetic.gen 20181008
Qihoo-360 HEUR/QVM05.1.8D29.Malware.Gen 20181009
Rising Spyware.Delf!8.12D (TFE:3:FXOFEWBx8dN) 20181009
Sophos AV Mal/Generic-S 20181009
Symantec Trojan.Gen.2 20181009
Tencent Win32.Trojan-downloader.Generic.Hrpd 20181009
TrendMicro BKDR_XENID.A 20181009
TrendMicro-HouseCall BKDR_XENID.A 20181009
VBA32 TScope.Trojan.Delf 20181009
VIPRE Trojan.Win32.Generic!BT 20181009
Webroot W32.Trojan.GenKD 20181009
Zillya Trojan.Delf.Win32.107216 20181008
ZoneAlarm by Check Point HEUR:Trojan-Downloader.Win32.Generic 20181009
Alibaba 20180921
Avast-Mobile 20181008
Babable 20180918
Baidu 20181009
Bkav 20181009
ClamAV 20181009
CMC 20181009
Comodo 20181009
Cybereason 20180225
DrWeb 20181009
eGambit 20181009
F-Prot 20181009
Kingsoft 20181009
Malwarebytes 20181009
SentinelOne (Static ML) 20180926
SUPERAntiSpyware 20181006
Symantec Mobile Insight 20181001
TACHYON 20181009
TheHacker 20181008
TotalDefense 20181009
Trustlook 20181009
ViRobot 20181008
Yandex 20181008
Zoner 20181008
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0006BEC0
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
RegCloseKey
GetDIBColorTable
DeleteEnhMetaFile
GetSystemPaletteEntries
PatBlt
GetClipBox
GetCurrentPositionEx
ResizePalette
GdiFlush
GetTextMetricsA
MaskBlt
CreateBrushIndirect
SetStretchBltMode
GetEnhMetaFilePaletteEntries
GetPixel
BitBlt
GetObjectA
CreateCompatibleDC
DeleteDC
SetBkMode
SetPixel
SetPaletteEntries
CreateHalftonePalette
CreateDIBSection
CopyEnhMetaFileA
RealizePalette
SetTextColor
GetDeviceCaps
SetEnhMetaFileBits
CreateBitmap
MoveToEx
CreatePalette
GetStockObject
CreateDIBitmap
PlayEnhMetaFile
SelectPalette
UnrealizeObject
GetDIBits
GetEnhMetaFileBits
SetBrushOrgEx
GetBrushOrgEx
StretchBlt
StretchDIBits
GetBitmapBits
SetROP2
CreateFontIndirectA
SelectObject
GetNearestPaletteIndex
GetWinMetaFileBits
SetDIBColorTable
GetEnhMetaFileHeader
GetPaletteEntries
SetBkColor
SetWinMetaFileBits
DeleteObject
CreateCompatibleBitmap
CreatePenIndirect
GetStdHandle
FileTimeToDosDateTime
GetFileAttributesA
WaitForSingleObject
GetLocalTime
DeleteCriticalSection
GetLocaleInfoA
LocalAlloc
SetErrorMode
GetFileTime
GetCPInfo
WriteFile
GetDiskFreeSpaceA
GetFullPathNameA
SetEvent
LocalFree
MoveFileA
InitializeCriticalSection
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
OutputDebugStringA
ExitProcess
GetModuleFileNameA
RaiseException
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
CreateThread
MulDiv
ExitThread
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
EnterCriticalSection
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetFileSize
CreateDirectoryA
GetProcAddress
GlobalReAlloc
FindFirstFileA
CompareStringA
FindNextFileA
GlobalLock
GetTimeZoneInformation
CreateEventA
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
GetSystemInfo
lstrlenA
GlobalFree
GetThreadLocale
GlobalUnlock
VirtualQuery
FileTimeToLocalFileTime
WideCharToMultiByte
GetCommandLineA
OpenMutexA
QueryPerformanceFrequency
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetVersion
VirtualFree
Sleep
VirtualAlloc
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SysAllocString
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
SHGetSpecialFolderPathA
ReleaseDC
GetSystemMetrics
GetIconInfo
LoadIconA
DestroyIcon
LoadStringA
FillRect
DrawIconEx
CharNextA
CreateIcon
MessageBoxA
GetClipboardData
CharLowerBuffA
GetSysColor
GetKeyboardType
GetDC
CharToOemA
setsockopt
gethostname
socket
closesocket
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
connect
shutdown
inet_ntoa
htons
recv
PE exports
Number of PE resources by type
RT_STRING 9
RT_RCDATA 2
Number of PE resources by language
NEUTRAL 11
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
438272

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x6bec0

InitializedDataSize
67072

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 2785cad8298f921c43de25f5ab359e1e
SHA1 e894abe30a4d881958337e7e63e94f89d9542289
SHA256 4336142bb4a33ce8200e3b440c2ae2fe8dfdc3252173a6f270ec8a6807fa6bef
ssdeep
12288:1uEJhFelnvqYb/oySI4DfCp4dsQa7fCg7LD1AKS2n6Tz0:1PJhkRv9/xSre6SNRn6KH6Tz

authentihash 61faa8902d004bdbb138ed394265af7efc09cb6d73f25e944e38b75078e6a3ac
imphash 001668c666470436c2ba6bfa1347ca1f
File size 494.5 KB ( 506368 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Borland Delphi 7 (92.1%)
Win32 Executable Delphi generic (1.9%)
Windows screen saver (1.8%)
DOS Borland compiled Executable (generic) (1.3%)
Win32 Dynamic Link Library (generic) (0.9%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-03-21 12:10:13 UTC ( 6 months, 4 weeks ago )
Last submission 2018-05-16 17:53:06 UTC ( 5 months ago )
File names 2103.exe
45927b80bde81c567b18c03f2321185192622f5e
2103.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Created mutexes
Opened mutexes
Runtime DLLs
HTTP requests
DNS requests
TCP connections