× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48f37a317aaac36b219ff0fbf485f8d45b5b911492043c63c52021a91feade5b
File name: .
Detection ratio: 51 / 69
Analysis date: 2018-12-23 04:11:41 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181222
Ad-Aware Trojan.Agent.DIXV 20181223
AegisLab Trojan.Win32.Generic.4!c 20181223
AhnLab-V3 Trojan/Win32.Fuerboos.C2837323 20181222
ALYac Trojan.Agent.DIXV 20181223
Antiy-AVL Trojan[Banker]/Win32.IcedID 20181222
Arcabit Trojan.Agent.DIXV 20181222
Avast Win32:Malware-gen 20181223
AVG Win32:Malware-gen 20181222
BitDefender Trojan.Agent.DIXV 20181222
Comodo TrojWare.Win32.TrojanDownloader.Dofoil.EW@7y7jrz 20181223
CrowdStrike Falcon (ML) malicious_confidence_80% (W) 20181022
Cylance Unsafe 20181223
Cyren W32/S-015268a1!Eldorado 20181223
DrWeb Trojan.IcedID.15 20181223
Emsisoft Trojan.Agent.DIXV (B) 20181223
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMUV 20181223
F-Prot W32/S-015268a1!Eldorado 20181223
F-Secure Trojan.Agent.DIXV 20181223
Fortinet W32/GenKryptik.CRRJ!tr 20181223
GData Trojan.Agent.DIXV 20181223
Ikarus Trojan-Banker.Emotet 20181223
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.IcedID.dd 20181223
K7AntiVirus Trojan ( 005414121 ) 20181222
K7GW Trojan ( 005414121 ) 20181222
Kaspersky HEUR:Trojan.Win32.Generic 20181223
Malwarebytes Trojan.IcedID 20181223
MAX malware (ai score=82) 20181223
McAfee Ursnif-FQLY!414EB4232A66 20181223
McAfee-GW-Edition Ursnif-FQLY!414EB4232A66 20181222
Microsoft Trojan:Win32/Emotet.AV!dha 20181223
eScan Trojan.Agent.DIXV 20181223
NANO-Antivirus Trojan.Win32.IcedID.fkfmtq 20181223
Palo Alto Networks (Known Signatures) generic.ml 20181223
Panda Generic Malware 20181222
Qihoo-360 Win32/Trojan.316 20181223
Rising Trojan.GenKryptik!8.AA55 (RDM+:cmRtazoS57Vdfq47meDPv6rBW0bm) 20181223
Sophos AV Mal/Generic-S 20181223
SUPERAntiSpyware Trojan.Agent/Gen-IcedID 20181220
Symantec ML.Attribute.HighConfidence 20181222
TACHYON Trojan/W32.Agent.513024.DW 20181222
Tencent Win32.Trojan.Generic.Ozsg 20181223
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.URSNIF.SMAL01.hp 20181223
TrendMicro-HouseCall TrojanSpy.Win32.URSNIF.SMAL01.hp 20181223
VBA32 TrojanBanker.IcedID 20181222
Yandex Trojan.PWS.IcedID! 20181221
Zillya Trojan.IcedID.Win32.4 20181222
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181223
Alibaba 20180921
Avast-Mobile 20181222
Avira (no cloud) 20181222
Babable 20180918
Baidu 20181207
Bkav 20181221
CAT-QuickHeal 20181222
ClamAV 20181223
CMC 20181223
eGambit 20181223
Kingsoft 20181223
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181215
TheHacker 20181220
TotalDefense 20181222
Trustlook 20181223
ViRobot 20181222
Webroot 20181223
Zoner 20181223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright© 2015 - 2017 uSamp People, Inc.

Product Cloudcoat
Original name fatherobserve.exe
Internal name fatherobserve.exe
File version 6.6.83.66
Description Cloudcoat
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-15 11:17:13
Entry Point 0x00002942
Number of sections 4
PE sections
PE imports
SelectClipRgn
CreateFontA
GetPixel
GetStockObject
CreateRectRgn
DeviceIoControl
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
ReadFile
SetHandleCount
GetLastError
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LoadLibraryExA
GetEnvironmentStrings
GetLocaleInfoA
GetFileSize
IsValidCodePage
GetWindowsDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
InterlockedIncrement
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
QueryPerformanceCounter
TlsFree
GetFileType
CompareStringW
GetTempPathA
RaiseException
GetCPInfo
GetStringTypeA
GetTickCount
SetSystemPowerState
GetModuleHandleA
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CompareStringA
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
TerminateProcess
CreateProcessA
GetTimeZoneInformation
WideCharToMultiByte
GetEnvironmentVariableA
HeapCreate
VirtualFree
TlsGetValue
Sleep
FormatMessageA
SetEndOfFile
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetCurrentProcessId
SetLastError
CloseHandle
DispatchMessageA
RegisterHotKey
DrawIcon
SetDlgItemInt
LoadImageA
GetClassNameA
IsWindowEnabled
CheckMenuRadioItem
SetCursor
GetDlgItemInt
InsertMenuItemA
Number of PE resources by type
RT_DIALOG 12
RT_ICON 8
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 23
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.6.83.66

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Cloudcoat

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
460288

EntryPoint
0x2942

OriginalFileName
fatherobserve.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015 - 2017 uSamp People, Inc.

FileVersion
6.6.83.66

TimeStamp
2009:11:15 03:17:13-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
fatherobserve.exe

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
uSamp People

CodeSize
98816

ProductName
Cloudcoat

ProductVersionNumber
6.6.83.66

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 414eb4232a6616b179451c1186c45ad9
SHA1 3023edc22e0265616e4d2a8b8604ab60d0e08f31
SHA256 48f37a317aaac36b219ff0fbf485f8d45b5b911492043c63c52021a91feade5b
ssdeep
3072:O3GTr+7aM1efjtxGt4MMyJ8JH0G+pyV914TH/v/g3lDUwRq5snio2fWKIulMdtbH:3dM2jtxWVKJOy91oH+n9K43WOJ

authentihash ad6c00ca87a2e4ecd2284df0426c6fc805e36ce2b633ac66e85ac854c3e0a94c
imphash 11382f6869c956613aa6c332b73a3065
File size 501.0 KB ( 513024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-22 17:29:32 UTC ( 1 month, 3 weeks ago )
Last submission 2018-12-22 17:29:32 UTC ( 1 month, 3 weeks ago )
File names fatherobserve.exe
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.