× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 50d336af71e434ac5e15c578a0cc0321c5438b47ad5262d04da0d128ca3a710d
File name: fKFNUe8.exe
Detection ratio: 20 / 68
Analysis date: 2019-02-06 01:04:30 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
Ad-Aware Gen:Variant.Razy.460155 20190205
AVG FileRepMalware 20190205
BitDefender Gen:Variant.Razy.460155 20190205
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.44ea02 20190109
Cylance Unsafe 20190206
Emsisoft Gen:Variant.Razy.460155 (B) 20190206
Endgame malicious (high confidence) 20181108
GData Gen:Variant.Razy.460155 20190206
Sophos ML heuristic 20181128
MAX malware (ai score=80) 20190206
Microsoft Trojan:Win32/Fuerboos.A!cl 20190205
eScan Gen:Variant.Razy.460155 20190205
Qihoo-360 HEUR/QVM20.1.0935.Malware.Gen 20190206
Rising Trojan.Kryptik!8.8/N3#94% (RDM+:cmRtazqu6weCLWERIWGTAI5R+NM/) 20190205
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/FakeAV-IS 20190205
Symantec ML.Attribute.HighConfidence 20190205
Trapmine malicious.high.ml.score 20190123
AegisLab 20190205
AhnLab-V3 20190205
Alibaba 20180921
Antiy-AVL 20190206
Arcabit 20190205
Avast 20190205
Avast-Mobile 20190205
Avira (no cloud) 20190205
Babable 20180918
Baidu 20190202
Bkav 20190201
CAT-QuickHeal 20190205
ClamAV 20190205
CMC 20190205
Comodo 20190205
Cyren 20190205
DrWeb 20190206
eGambit 20190206
ESET-NOD32 20190206
F-Prot 20190205
F-Secure 20190205
Fortinet 20190206
Jiangmin 20190206
K7AntiVirus 20190205
K7GW 20190205
Kaspersky 20190206
Kingsoft 20190206
Malwarebytes 20190206
McAfee 20190205
McAfee-GW-Edition 20190205
NANO-Antivirus 20190205
Palo Alto Networks (Known Signatures) 20190206
Panda 20190205
SUPERAntiSpyware 20190130
TACHYON 20190205
Tencent 20190206
TheHacker 20190203
TotalDefense 20190205
TrendMicro 20190205
TrendMicro-HouseCall 20190205
Trustlook 20190206
VBA32 20190205
ViRobot 20190205
Webroot 20190206
Yandex 20190204
Zillya 20190204
ZoneAlarm by Check Point 20190205
Zoner 20190206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserv

Product Microsoft® Windows® Operating S
Original name extractr.exe
Internal name extractr.exe
File version 6.1.7601.17514 (win7sp1_rtm.101119-1
Description Wimfltr v2 extractor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-06 08:59:51
Entry Point 0x00002A92
Number of sections 4
PE sections
PE imports
ImpersonateSelf
GetAclInformation
IsTokenRestricted
CreatePropertySheetPageA
JetIntersectIndexes
RestoreDC
PatBlt
OffsetRgn
CreatePalette
GetViewportExtEx
GdiSetBatchLimit
CopyMetaFileW
GetFontUnicodeRanges
EnumResourceTypesA
LocalFree
GetCurrentProcess
ResumeThread
GetCurrentProcessorNumber
ApplicationRecoveryInProgress
GetFileSizeEx
GetOverlappedResult
GetConsoleCP
SleepEx
GetOEMCP
WriteFile
FlushProcessWriteBuffers
Sleep
VirtualFree
IsProcessorFeaturePresent
GetVersion
GetModuleHandleW
GetBinaryTypeA
FindCloseChangeNotification
LZSeek
LZInit
MprInfoBlockAdd
VarCyAdd
VarCyMul
SafeArrayCreateEx
CM_Set_DevNode_Registry_PropertyW
FreeCredentialsHandle
RegisterWindowMessageW
GetParent
DestroyWindow
FindWindowW
LockSetForegroundWindow
SetWindowPos
EnableWindow
DdeSetUserHandle
TranslateMessage
LoadKeyboardLayoutA
GetMenuItemID
CreateDialogParamW
GetDlgCtrlID
GetMenu
SendDlgItemMessageW
SetWindowTextW
InvalidateRect
wsprintfA
UnhookWinEvent
LoadCursorW
GetSystemMenu
CreateWindowExW
LoadAcceleratorsW
LogicalToPhysicalPoint
CharNextW
OpenClipboard
InternetInitializeAutoProxyDll
GetUrlCacheEntryInfoA
SCardBeginTransaction
SCardListReadersW
fputc
fclose
_time64
_localtime64
towupper
fopen
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
393216

ImageVersion
0.0

ProductName
Microsoft Windows Operating S

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
12.0

FileTypeExtension
exe

OriginalFileName
extractr.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7601.17514 (win7sp1_rtm.101119-1

TimeStamp
2019:02:06 00:59:51-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
extractr.exe

ProductVersion
6.1.7601.1751

FileDescription
Wimfltr v2 extractor

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserv

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
28672

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x2a92

ObjectFileType
Executable application

Execution parents
File identification
MD5 21626257b6dc20156dad50e9e32aac0f
SHA1 b50d36a44ea020eb2aef1d0bc4c24bb2c0760d49
SHA256 50d336af71e434ac5e15c578a0cc0321c5438b47ad5262d04da0d128ca3a710d
ssdeep
3072:p6+jyo+i7VAWriKLIKQl5/Fd88lmoX4ste+LbR:p6+jL+iZ+Vlq8yaLb

authentihash 6fefa6a1019197d9b26d313dd7e891603b718a50f59f232d250fe09c77ee19db
imphash c15a5a91d8d454524857f6107416c098
File size 408.0 KB ( 417792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-06 01:04:30 UTC ( 2 months, 2 weeks ago )
Last submission 2019-02-07 22:13:59 UTC ( 2 months, 2 weeks ago )
File names jerseyculture.exe
extractr.exe
fKFNUe8.exe
emotet_e1_50d336af71e434ac5e15c578a0cc0321c5438b47ad5262d04da0d128ca3a710d_2019-02-06__011504.exe_
avatarcbs.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!