× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4fe6a6083775900230eab8b7ca97e68e66a174eb854c949708a996aa1e38e3bb
File name: 4fe6a6083775900230eab8b7ca97e68e66a174eb854c949708a996aa1e38e3bb
Detection ratio: 13 / 68
Analysis date: 2018-12-14 18:31:56 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.7b0110 20180225
eGambit Unsafe.AI_Score_99% 20181214
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181214
K7GW Spyware ( 005068aa1 ) 20181214
Microsoft Trojan:Win32/Fuerboos.A!cl 20181214
Qihoo-360 HEUR/QVM20.1.DD7F.Malware.Gen 20181214
Rising Trojan.Fuerboos!8.EFC8 (TFE:2:xBEn8WEcuzM) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Avira (no cloud) 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181214
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
Emsisoft 20181214
ESET-NOD32 20181214
F-Prot 20181214
F-Secure 20181214
Fortinet 20181214
GData 20181214
Ikarus 20181214
Jiangmin 20181214
Kaspersky 20181214
Kingsoft 20181214
Malwarebytes 20181214
MAX 20181214
McAfee 20181214
McAfee-GW-Edition 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
Sophos AV 20181214
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TotalDefense 20181214
TrendMicro 20181214
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-15 02:21:48
Entry Point 0x00007AA1
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
ExcludeClipRect
GetColorAdjustment
GetCharWidth32A
GetTextCharsetInfo
GetTextExtentPointA
GetSystemPaletteUse
GetRgnBox
GetTextColor
GetCharWidthA
GdiSetBatchLimit
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
GetEnvironmentStringsW
GetThreadLocale
VirtualProtect
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
FormatMessageA
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
GetTempPathW
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
lstrcpyA
VirtualQueryEx
DeleteTimerQueue
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractIconW
ExtractAssociatedIconW
GetUserNameExW
GetComputerObjectNameW
GetWindowRgn
GetWindowTextLengthA
IsWindow
LockWorkStation
GetMenu
GetPriorityClipboardFormat
GetMenuItemCount
DrawIcon
DefMDIChildProcW
GetDlgItemTextA
LoadAcceleratorsW
GetKeyboardLayoutNameW
EnumWindowStationsA
GetDlgItem
GetClipboardOwner
GetWindowLongW
GetOpenClipboardWindow
GetCaretPos
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:15 02:21:48+00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x7aa1

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 9e349e77b01106b52e716dd1779ff67a
SHA1 4b4e96bb07c46cd14feaee14684ee33586f6fceb
SHA256 4fe6a6083775900230eab8b7ca97e68e66a174eb854c949708a996aa1e38e3bb
ssdeep
3072:DptZkqytgR+WlNY5ZjhfVYkRr5DZAGurMBB:lt+DMliZjhfeo93urMBB

authentihash 84a3fb1bcf5076c0be019ee338bc3a3d13e7910fae76c3a6d3f7360cccbe5850
imphash 6f4d6e6e5ddb6bb37c3c863e8103b8a8
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 18:31:56 UTC ( 2 months, 1 week ago )
Last submission 2018-12-14 18:31:56 UTC ( 2 months, 1 week ago )
File names 48.exe
8711.exe
852425.exe
32824.exe
101640.exe
425572.exe
mddefwarchive.exe
461305.exe
17.exe
16.exe
workandroid.exe
32209890.exe
509249.exe
6232949.exe
0.exe
618126.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!