× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4474dd137a0fa4d69d8896131fc0ad04ff879eb5631dfcd38050937157e7487b
File name: POs.exe
Detection ratio: 12 / 65
Analysis date: 2019-02-25 06:01:18 UTC ( 3 months ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cybereason malicious.2f55f2 20190109
Cylance Unsafe 20190224
Endgame malicious (moderate confidence) 20190215
ESET-NOD32 a variant of Win32/GenKryptik.DAOR 20190224
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190224
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.gc 20190224
Palo Alto Networks (Known Signatures) generic.ml 20190224
Qihoo-360 HEUR/QVM03.0.7542.Malware.Gen 20190224
SentinelOne (Static ML) static engine - malicious 20190203
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190224
Acronis 20190222
Ad-Aware 20190224
AegisLab 20190224
AhnLab-V3 20190224
Alibaba 20180921
Antiy-AVL 20190224
Arcabit 20190224
Avast 20190224
Avast-Mobile 20190224
AVG 20190224
Avira (no cloud) 20190224
Babable 20180917
Baidu 20190214
BitDefender 20190224
CAT-QuickHeal 20190224
ClamAV 20190224
CMC 20190223
Comodo 20190224
Cyren 20190224
DrWeb 20190224
eGambit 20190224
Emsisoft 20190224
F-Secure 20190224
Fortinet 20190224
GData 20190224
Ikarus 20190224
Jiangmin 20190224
K7AntiVirus 20190224
K7GW 20190224
Kingsoft 20190224
Malwarebytes 20190224
MAX 20190224
McAfee 20190224
Microsoft 20190224
eScan 20190224
NANO-Antivirus 20190224
Panda 20190224
Rising 20190224
Sophos AV 20190224
SUPERAntiSpyware 20190220
Symantec 20190224
Symantec Mobile Insight 20190220
TACHYON 20190224
Tencent 20190224
TheHacker 20190224
TotalDefense 20190224
Trapmine 20190123
Trustlook 20190224
VBA32 20190222
VIPRE 20190224
ViRobot 20190224
Webroot 20190224
Yandex 20190222
Zoner 20190224
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Unicornous
Original name STRIDEWAYS0.exe
Internal name STRIDEWAYS0
File version 1.08.0006
Comments beylics4
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-02-13 22:53:48
Entry Point 0x0000104C
Number of sections 3
PE sections
PE imports
EVENT_SINK_QueryInterface
__vbaExceptHandler
Ord(632)
MethCallEngine
EVENT_SINK_Release
Ord(100)
EVENT_SINK_AddRef
Number of PE resources by type
RT_ICON 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 2
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
beylics4

InitializedDataSize
12288

ImageVersion
1.8

FileSubtype
0

FileVersionNumber
1.8.0.6

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

EntryPoint
0x104c

OriginalFileName
STRIDEWAYS0.exe

MIMEType
application/octet-stream

FileVersion
1.08.0006

TimeStamp
2008:02:13 23:53:48+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
STRIDEWAYS0

ProductVersion
1.08.0006

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
495616

ProductName
Unicornous

ProductVersionNumber
1.8.0.6

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 ae0b3ad4ffe173a4315ce2cfe3573610
SHA1 9dea95f2f55f277b0e2425272e3a8d299b278a95
SHA256 4474dd137a0fa4d69d8896131fc0ad04ff879eb5631dfcd38050937157e7487b
ssdeep
12288:qQQli/m3SUZ+XPeK0tdI1ImQJ4mXBwNHSRS5DA38CmhJJggxwN8:qQQlcEgZ0tdsO3CxZ

authentihash e172e66504e1a8e0c33c7e3e65cb037e0d36cf02ef931e4d7ed7e7390905f360
imphash e214f95f7f3a3181be62d978fbf0219c
File size 496.0 KB ( 507904 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (82.7%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
OS/2 Executable (generic) (2.0%)
Generic Win/DOS Executable (2.0%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-25 00:35:02 UTC ( 3 months ago )
Last submission 2019-03-01 13:40:24 UTC ( 2 months, 3 weeks ago )
File names 4474dd137a0fa4d69d8896131fc0ad04ff879eb5631dfcd38050937157e7487b.bin
fzkflf.exe
POs.exe
STRIDEWAYS0.exe
STRIDEWAYS0
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.