× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 50119da56e84ae4baa207a9391a0143fe5aa66c212aeba08e2d6d864af0a0d83
File name: output.114770246.txt
Detection ratio: 31 / 71
Analysis date: 2018-12-26 08:31:50 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181224
Ad-Aware Gen:Variant.Razy.442737 20181226
AegisLab Trojan.Win32.Generic.4!c 20181226
AhnLab-V3 Trojan/Win32.Shade.C2904490 20181226
Arcabit Trojan.Razy.D6C171 20181226
AVG FileRepMalware 20181226
BitDefender Gen:Variant.Razy.442737 20181226
Bkav HW32.Packed. 20181224
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181022
Cylance Unsafe 20181226
Endgame malicious (high confidence) 20181108
Fortinet W32/Kryptik.GJCI!tr 20181226
GData Gen:Variant.Razy.442737 20181226
Ikarus Trojan-Ransom.Crypted007 20181226
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20181226
MAX malware (ai score=80) 20181226
McAfee Artemis!0A0AE5D80427 20181226
McAfee-GW-Edition Artemis!Trojan 20181225
Microsoft Ransom:Win32/Troldesh.A 20181225
eScan Gen:Variant.Razy.442737 20181226
NANO-Antivirus Trojan.Win32.Kryptik.fllozm 20181226
Palo Alto Networks (Known Signatures) generic.ml 20181226
Panda Trj/GdSda.A 20181225
Qihoo-360 Win32/Trojan.a78 20181226
Rising Trojan.Kryptik!8.8 (CLOUD) 20181226
SentinelOne (Static ML) static engine - malicious 20181223
Symantec Ransom.Troldesh 20181225
Trapmine malicious.high.ml.score 20181205
VBA32 BScope.TrojanPSW.Papras 20181222
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181226
Alibaba 20180921
ALYac 20181226
Antiy-AVL 20181226
Avast 20181226
Avast-Mobile 20181225
Avira (no cloud) 20181226
AVware 20180925
Babable 20180918
Baidu 20181207
CAT-QuickHeal 20181225
ClamAV 20181226
CMC 20181225
Comodo 20181226
Cybereason 20180225
Cyren 20181226
DrWeb 20181226
eGambit 20181226
Emsisoft 20181226
ESET-NOD32 20181226
F-Prot 20181226
F-Secure 20181226
Jiangmin 20181226
K7AntiVirus 20181225
K7GW 20181225
Kingsoft 20181226
Malwarebytes 20181225
Sophos AV 20181226
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181225
TACHYON 20181226
Tencent 20181226
TheHacker 20181225
TrendMicro 20181226
TrendMicro-HouseCall 20181226
Trustlook 20181226
VIPRE 20181226
ViRobot 20181225
Webroot 20181226
Yandex 20181223
Zillya 20181225
Zoner 20181225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Signature verification The digital signature of the object did not verify.
Signing date 3:13 AM 4/7/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-26 03:23:54
Entry Point 0x00001DA0
Number of sections 3
PE sections
Overlays
MD5 6489e844a7ba4d450d2915c484d134be
File type data
Offset 1067008
Size 3336
Entropy 7.35
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
RevertToSelf
RegCloseKey
OpenProcessToken
FreeSid
ImpersonateSelf
RegQueryValueExA
AccessCheck
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
RegOpenKeyExA
InitializeAcl
RegOpenKeyExW
GetLengthSid
AddAccessAllowedAce
RegEnumKeyExA
SetSecurityDescriptorGroup
IsValidSecurityDescriptor
BeginPath
CreateMetaFileW
GetStdHandle
GetDriveTypeW
GetFileAttributesA
WaitForSingleObject
HeapDestroy
GetFileAttributesW
GetLocalTime
GetCurrentProcess
FileTimeToDosDateTime
LocalAlloc
GetFileInformationByHandle
GetLocaleInfoW
GetFileTime
GetTempPathA
GetCPInfo
GetTempPathW
HeapReAlloc
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
GetEnvironmentVariableA
GlobalHandle
FindClose
MoveFileW
SetLastError
GetSystemTime
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
LoadLibraryA
MultiByteToWideChar
GetPrivateProfileStringW
GetModuleHandleA
GetSystemDirectoryW
GetExitCodeThread
CreateMutexW
TerminateProcess
GlobalAlloc
SetEndOfFile
GetVersion
HeapFree
SetHandleCount
LoadLibraryW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
lstrcmpiW
RtlUnwind
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
DeleteFileA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetTempFileNameW
ExpandEnvironmentStringsW
GetTimeFormatA
GetTempFileNameA
FindFirstFileW
DuplicateHandle
GetProcAddress
CreateEventW
CreateFileW
GetFileType
CreateFileA
HeapAlloc
GetLastError
GetSystemInfo
lstrlenA
GlobalFree
OpenEventW
GlobalUnlock
lstrlenW
VirtualFree
FileTimeToLocalFileTime
GetCurrentProcessId
WideCharToMultiByte
GetCommandLineA
QueryPerformanceFrequency
SetFilePointer
ReadFile
CloseHandle
GlobalLock
GetModuleHandleW
HeapCreate
WriteFile
CreateProcessW
Sleep
VirtualAlloc
ResetEvent
SystemParametersInfoA
SetTimer
LoadCursorA
GetParent
UpdateWindow
SendMessageA
GetMenuItemCount
LoadStringA
PostMessageA
CharUpperW
wsprintfA
KillTimer
IsCharUpperW
GetDlgItem
ReleaseDC
GetDC
SetCursor
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:12:26 04:23:54+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
8192

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
1057792

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x1da0

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

Execution parents
File identification
MD5 0a0ae5d804271f56c1fa5e1e695cc514
SHA1 e8d307b58856cd38c5b43f576a5dfd451f29b11c
SHA256 50119da56e84ae4baa207a9391a0143fe5aa66c212aeba08e2d6d864af0a0d83
ssdeep
12288:Mi94bywx1Dj5+h7ZCn0P5T7lHDbIi9dszYjN5HbPiLsptcyx7tbFEujtgDi:MHx13SZW0x5j5dsYnHeYpuyx7tx/tgDi

authentihash 8046ef1943317f725868453d53a2871e56b437f26aa52049a49b8ef0d3e3b39a
imphash 919a9aec1eff347967bff351784e8b43
File size 1.0 MB ( 1070344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-12-26 03:37:15 UTC ( 3 months, 3 weeks ago )
Last submission 2019-01-27 07:21:16 UTC ( 2 months, 3 weeks ago )
File names output.114801095.txt
output.114812968.txt
output.114772920.txt
20738483
csrss.exe
20691435
ransomware.bb.exe.milo
sserv.exe
output.114770246.txt
output.114812998.txt
output.114800219.txt
csrss.exe
output.114800188.txt
sserv.jpg
csrss.exe
output.114771170.txt
output.114812948.txt
output.114822040.txt
output.114779947.txt
output.114822037.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections