× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4c1db0432c187d592962ea1be25635d669282f332aab0b2fc7485f2ca2588e04
File name: 4c1db0432c187d592962ea1be25635d669282f332aab0b2fc7485f2ca2588e04.exe
Detection ratio: 47 / 69
Analysis date: 2019-02-17 00:46:25 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190213
Ad-Aware Trojan.GenericKD.41017030 20190216
AegisLab Trojan.Win32.Emotet.4!c 20190216
AhnLab-V3 Trojan/Win32.Emotet.R255530 20190216
ALYac Trojan.Agent.Emotet 20190216
Arcabit Trojan.Generic.D271DEC6 20190216
Avast Win32:MalwareX-gen [Trj] 20190216
AVG Win32:MalwareX-gen [Trj] 20190216
BitDefender Trojan.GenericKD.41017030 20190216
ClamAV Win.Malware.Emotet-6857981-0 20190216
Comodo Malware@#19t08mljfuwlp 20190216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190216
Cyren W32/Emotet.OP.gen!Eldorado 20190216
DrWeb Trojan.DownLoader27.31670 20190216
Emsisoft Trojan.Emotet (A) 20190216
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.GPTC 20190216
F-Prot W32/Emotet.OP.gen!Eldorado 20190216
Fortinet W32/GenKryptik.CZNO!tr 20190216
GData Trojan.GenericKD.41017030 20190216
Ikarus Trojan-Banker.Emotet 20190216
Sophos ML heuristic 20181128
K7AntiVirus Riskware ( 0040eff71 ) 20190216
K7GW Riskware ( 0040eff71 ) 20190216
Kaspersky Trojan-Banker.Win32.Emotet.cggf 20190216
Malwarebytes Trojan.Emotet 20190216
McAfee Emotet-FLY!83E160FE1EE5 20190216
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.ch 20190216
Microsoft Trojan:Win32/Emotet.AC!bit 20190216
eScan Trojan.GenericKD.41017030 20190216
Palo Alto Networks (Known Signatures) generic.ml 20190216
Panda Trj/RnkBend.A 20190215
Qihoo-360 HEUR/QVM19.1.3A2B.Malware.Gen 20190216
Rising Trojan.Emotet!8.B95 (CLOUD) 20190216
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190216
Symantec Trojan.Emotet 20190216
Tencent Win32.Trojan-banker.Emotet.Ecaj 20190216
Trapmine malicious.high.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.THBAEAI 20190216
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THBAEAI 20190216
VBA32 BScope.Trojan.Refinka 20190215
VIPRE LooksLike.Win32.Dridex.e (v) 20190216
ViRobot Trojan.Win32.Z.Jaik.155648.H 20190216
Webroot W32.Trojan.Emotet 20190216
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cggf 20190216
Alibaba 20180921
Antiy-AVL 20190216
Avast-Mobile 20190216
Avira (no cloud) 20190216
Babable 20180917
Baidu 20190214
Bkav 20190215
CAT-QuickHeal 20190216
CMC 20190215
Cybereason 20190109
F-Secure 20190216
Jiangmin 20190216
Kingsoft 20190216
MAX 20190216
NANO-Antivirus 20190216
SUPERAntiSpyware 20190213
Symantec Mobile Insight 20190206
TACHYON 20190216
TheHacker 20190215
TotalDefense 20190216
Trustlook 20190216
Yandex 20190215
Zillya 20190215
Zoner 20190216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2017 America Online, Inc.

Original name jgm1GEN.dll
Internal name pgadoEN.exe
File version 024
Description PG ADO DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-14 17:02:36
Entry Point 0x000011A0
Number of sections 11
PE sections
PE imports
IsValidSecurityDescriptor
GetUserDefaultUILanguage
GetCurrentProcess
GetThreadPriority
GetNamedPipeInfo
TerminateThread
IsValidLocaleName
SetFileApisToOEM
GetProcessPriorityBoost
GetTickCount
CloseHandle
GetVersion
GetCurrentThread
InterlockedIncrement
GetForegroundWindow
TranslateAcceleratorA
AnyPopup
MapVirtualKeyExW
LoadStringW
ChangeClipboardChain
GetMessagePos
AddMonitorA
PdhCollectQueryDataWithTime
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.2

ImageVersion
0.0

FileVersionNumber
24.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
PG ADO DLL

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
143360

EntryPoint
0x11a0

OriginalFileName
jgm1GEN.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright 2017 America Online, Inc.

FileVersion
024

TimeStamp
2019:02:14 18:02:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
pgadoEN.exe

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows 16-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
America Online

CodeSize
0

FileSubtype
0

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 83e160fe1ee5d8260f908190cad09543
SHA1 de7ea07b91038167d70a98ca60d176a55291ea6f
SHA256 4c1db0432c187d592962ea1be25635d669282f332aab0b2fc7485f2ca2588e04
ssdeep
3072:tHuRLmtmsMYVqMqzCrgLJBOzvO0a7RY/Tn9rcjc:timHMYcPUgW7O0URYbd

authentihash fcb69716c88fe3676000816c7519f6cc4244439f31b3e038ad4a98dcfca365a5
imphash 29e2f96ba3193a54a986c554523e5c45
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-14 17:07:50 UTC ( 2 months, 1 week ago )
Last submission 2019-02-15 15:07:49 UTC ( 2 months ago )
File names 4c1db0432c187d592962ea1be25635d669282f332aab0b2fc7485f2ca2588e04.exe
emotet_e1_4c1db0432c187d592962ea1be25635d669282f332aab0b2fc7485f2ca2588e04_2019-02-14__171501.exe_
pgadoEN.exe
abyUjjqjU.exe
usgupCA5gYTQ.exe
MzblBFXS3.exe
jgm1GEN.dll
YkPEmh0VviO0mfNAR.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!