× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 44b843a94233864e39c1d42b6cf6dec4532e2d3ad6948a0f1d47637431b3a94e
File name: 44b843a94233864e39c1d42b6cf6dec4532e2d3ad6948a0f1d47637431b3a94e
Detection ratio: 50 / 67
Analysis date: 2017-12-06 09:13:07 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.267649 20171206
AegisLab Troj.W32.Mansabo!c 20171206
AhnLab-V3 Trojan/Win32.Inject.C2278939 20171205
ALYac Gen:Variant.Zusy.267649 20171205
Arcabit Trojan.Zusy.D41581 20171206
Avast Win32:Malware-gen 20171206
AVG Win32:Malware-gen 20171206
Avira (no cloud) TR/AD.Inject.lhumj 20171206
AVware Trojan.Win32.Generic!BT 20171206
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9993 20171206
BitDefender Gen:Variant.Zusy.267649 20171206
Comodo UnclassifiedMalware 20171206
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cybereason malicious.aefa4c 20171103
Cylance Unsafe 20171206
Cyren W32/Trojan.OGVG-3098 20171206
DrWeb Trojan.Inject2.65162 20171206
Emsisoft Gen:Variant.Zusy.267649 (B) 20171206
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Injector.DUGT 20171206
F-Secure Gen:Variant.Zusy.267649 20171206
Fortinet W32/GenKryptik.BGHZ!tr 20171206
GData Gen:Variant.Zusy.267649 20171206
Ikarus Trojan.Win32.Krypt 20171206
Sophos ML heuristic 20170914
Jiangmin Trojan.Mansabo.nk 20171206
K7AntiVirus Trojan ( 0051f1b91 ) 20171205
K7GW Trojan ( 0051f1b91 ) 20171206
Kaspersky Trojan.Win32.Mansabo.aix 20171206
Malwarebytes Trojan.TrickBot 20171206
MAX malware (ai score=100) 20171206
McAfee RDN/Generic.hbg 20171206
McAfee-GW-Edition BehavesLike.Win32.Dorkbot.fh 20171206
Microsoft Trojan:Win32/Skeeyah.A!rfn 20171206
eScan Gen:Variant.Zusy.267649 20171206
NANO-Antivirus Trojan.Win32.Mansabo.evopzo 20171206
nProtect Trojan/W32.Mansabo.385024 20171206
Palo Alto Networks (Known Signatures) generic.ml 20171206
Panda Trj/GdSda.A 20171205
Qihoo-360 HEUR/QVM03.0.9FA1.Malware.Gen 20171206
SentinelOne (Static ML) static engine - malicious 20171113
Sophos AV Mal/Generic-S 20171206
Symantec Trojan.Gen 20171206
Tencent Win32.Trojan.Mansabo.Duo 20171206
TrendMicro TROJ_GEN.R020C0DL317 20171206
TrendMicro-HouseCall TROJ_GEN.R020C0DL317 20171206
VBA32 TScope.Trojan.VB 20171205
VIPRE Trojan.Win32.Generic!BT 20171206
Webroot W32.Adware.Gen 20171206
ZoneAlarm by Check Point Trojan.Win32.Mansabo.aix 20171206
Alibaba 20171206
Avast-Mobile 20171205
Bkav 20171205
CAT-QuickHeal 20171205
ClamAV 20171206
CMC 20171206
eGambit 20171206
F-Prot 20171206
Kingsoft 20171206
Rising 20171206
SUPERAntiSpyware 20171206
Symantec Mobile Insight 20171206
TheHacker 20171205
TotalDefense 20171206
Trustlook 20171206
ViRobot 20171206
WhiteArmor 20171204
Yandex 20171205
Zillya 20171204
Zoner 20171206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Learn with FEAC. Our three-day Enterprise Architecture Skills Workshops are intended to give you the practical skills

Product Image Viewer
Original name Image Viewer.exe
Internal name Image Viewer
File version 1.00
Description ESO-Batxillerat-CF del concurs de fotografia FEAC a Claudia Ramos del Col·legi Maristes Montserrat
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-11-30 12:46:09
Entry Point 0x00001108
Number of sections 3
PE sections
PE imports
EVENT_SINK_QueryInterface
Ord(645)
Ord(516)
Ord(685)
Ord(661)
Ord(546)
EVENT_SINK_AddRef
Ord(650)
Ord(611)
Ord(300)
Ord(600)
__vbaExceptHandler
Ord(632)
MethCallEngine
DllFunctionCall
Ord(608)
Ord(100)
Ord(573)
ProcCallEngine
Ord(606)
EVENT_SINK_Release
Ord(595)
Ord(617)
Ord(306)
Ord(598)
Number of PE resources by type
RT_ICON 2
GNPTOTECTION 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 3
GERMAN LUXEMBOURG 2
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
ESO-Batxillerat-CF del concurs de fotografia FEAC a Claudia Ramos del Col legi Maristes Montserrat

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
327680

EntryPoint
0x1108

OriginalFileName
Image Viewer.exe

MIMEType
application/octet-stream

LegalCopyright
Learn with FEAC. Our three-day Enterprise Architecture Skills Workshops are intended to give you the practical skills

FileVersion
1.0

TimeStamp
2017:11:30 13:46:09+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Image Viewer

ProductVersion
1.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
53248

ProductName
Image Viewer

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 00a24069186c0079fe6d8a8554ab1e29
SHA1 8c14327aefa4ccbd5164dd59274683dab73b36aa
SHA256 44b843a94233864e39c1d42b6cf6dec4532e2d3ad6948a0f1d47637431b3a94e
ssdeep
6144:sl6j2IO/T+PnPBFRGQDt4s9UH3Tvb5P29RaCtMUm7JiNhvfZXkvABl63:bJOr+Pnrl2hHZO9RhuUm7JGvfSAA

authentihash 14c7cb018a3f7ac0223f3b062ed0c2b948ad71d879a3544b7abff1500c7cc0c3
imphash 15335708ba48a08c4e0324e04af5dba2
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (88.6%)
Win32 Executable (generic) (4.8%)
OS/2 Executable (generic) (2.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-05 09:46:22 UTC ( 1 year, 2 months ago )
Last submission 2017-12-06 09:13:07 UTC ( 1 year, 2 months ago )
File names Image Viewer.exe
Image Viewer
1002-8c14327aefa4ccbd5164dd59274683dab73b36aa
00a24069186c0079fe6d8a8554ab1e29.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!