× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5427cafef59b04bcad4fabf7eb8a5fd2b68f9226bc37553e9223f89561d2c587
File name: codexgigas_acc225210a206b81e4b4e8669affbc21407a53fb
Detection ratio: 3 / 67
Analysis date: 2018-05-07 11:46:40 UTC ( 9 months, 3 weeks ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Win32/GenKryptik.BYVZ 20180507
Palo Alto Networks (Known Signatures) generic.ml 20180507
Webroot W32.Trojan.Emotet 20180507
Ad-Aware 20180507
AegisLab 20180507
AhnLab-V3 20180507
Alibaba 20180507
ALYac 20180506
Antiy-AVL 20180507
Arcabit 20180507
Avast 20180507
Avast-Mobile 20180507
AVG 20180507
Avira (no cloud) 20180507
AVware 20180428
Babable 20180406
Baidu 20180507
BitDefender 20180507
Bkav 20180504
CAT-QuickHeal 20180507
ClamAV 20180507
CMC 20180507
Comodo 20180507
CrowdStrike Falcon (ML) 20180418
Cybereason None
Cylance 20180507
Cyren 20180507
DrWeb 20180507
eGambit 20180507
Emsisoft 20180507
Endgame 20180504
F-Prot 20180507
F-Secure 20180507
Fortinet 20180507
GData 20180507
Ikarus 20180507
Sophos ML 20180503
Jiangmin 20180507
K7AntiVirus 20180507
K7GW 20180507
Kaspersky 20180507
Kingsoft 20180507
Malwarebytes 20180507
MAX 20180507
McAfee 20180507
McAfee-GW-Edition 20180507
Microsoft 20180507
eScan 20180507
NANO-Antivirus 20180507
nProtect 20180507
Panda 20180506
Qihoo-360 20180507
Rising 20180507
SentinelOne (Static ML) 20180225
Sophos AV 20180507
SUPERAntiSpyware 20180507
Symantec 20180507
Symantec Mobile Insight 20180505
Tencent 20180507
TheHacker 20180504
TotalDefense 20180507
TrendMicro 20180507
TrendMicro-HouseCall 20180507
Trustlook 20180507
VBA32 20180507
VIPRE 20180507
ViRobot 20180507
Yandex 20180506
Zillya 20180507
ZoneAlarm by Check Point 20180507
Zoner 20180507
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-05-07 10:15:59
Entry Point 0x00192EF3
Number of sections 4
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
ImageList_GetIconSize
GetFileTitleW
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
DeleteObject
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
Escape
ScaleViewportExtEx
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
FrameRgn
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
SelectPalette
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
CreateFontIndirectW
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
Ellipse
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
FileTimeToSystemTime
DeactivateActCtx
WaitForSingleObject
EncodePointer
GetFileAttributesW
lstrcmpW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetProcAddress
InterlockedExchange
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
GetFullPathNameW
SetLastError
GetUserDefaultUILanguage
GlobalFindAtomW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
HeapSetInformation
EnumSystemLocalesA
SetThreadPriority
ActivateActCtx
GetVolumeInformationW
TlsGetValue
MultiByteToWideChar
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
CopyFileW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
GetStartupInfoW
GetUserDefaultLCID
GetTempFileNameW
WriteFile
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindFirstFileW
IsValidLocale
DuplicateHandle
GlobalLock
GlobalAlloc
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
IsValidCodePage
HeapCreate
GetTempPathW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
LresultFromObject
CreateStdAccessibleObject
AccessibleObjectFromWindow
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
DragFinish
ShellExecuteW
SHGetPathFromIDListW
SHSetUnreadMailCountW
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHBrowseForFolderW
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
RedrawWindow
GetForegroundWindow
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
GetMessageTime
SendMessageW
SetActiveWindow
GetDC
GetAsyncKeyState
MapDialogRect
GetDlgCtrlID
GetMenu
GetMenuStringW
GetClientRect
CreateAcceleratorTableW
DefMDIChildProcW
DrawTextW
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
GetKeyboardState
GetTopWindow
CopyAcceleratorTableW
OpenClipboard
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
GetKeyState
DestroyWindow
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
GetMenuState
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
EnumDisplayMonitors
PeekMessageW
SetWindowsHookExW
InsertMenuItemW
SetWindowPlacement
CharUpperW
GetSystemMenu
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetClipboardData
GetMenuItemID
GetIconInfo
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
DrawMenuBar
IsCharLowerW
IsIconic
InvertRect
GetSubMenu
GetScrollRange
SetTimer
GetActiveWindow
ShowOwnedPopups
FillRect
MonitorFromPoint
CopyRect
DeferWindowPos
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
PtInRect
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
ReleaseCapture
EmptyClipboard
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
MapWindowPoints
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetMenuDefaultItem
SetCapture
DrawIcon
DrawTextExW
SendDlgItemMessageW
PostMessageW
GetKeyNameTextW
CheckDlgButton
WaitMessage
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateMenu
GetDlgItem
RemovePropW
BringWindowToTop
ClientToScreen
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
DestroyAcceleratorTable
GetDesktopWindow
IsDialogMessageW
LoadCursorW
LoadIconW
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
NotifyWinEvent
GetMenuItemInfoW
GetCursorPos
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
SetLayeredWindowAttributes
GetScrollInfo
HideCaret
GetKeyboardLayout
ModifyMenuW
GetCapture
ScreenToClient
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
DefFrameProcW
SetMenu
SetRectEmpty
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
ShowScrollBar
WinHelpW
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClassNameW
TranslateMDISysAccel
GetClassInfoW
EnableMenuItem
ValidateRect
IsRectEmpty
IsMenu
GetFocus
EnableWindow
CloseClipboard
IsWindowVisible
TranslateAcceleratorW
UnhookWindowsHookEx
SetCursor
PlaySoundW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
CreateStreamOnHGlobal
OleLockRunning
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoLockObjectExternal
IsAccelerator
CoCreateInstance
OleTranslateAccelerator
OleCreateMenuDescriptor
OleDestroyMenuDescriptor
DoDragDrop
ReleaseStgMedium
RevokeDragDrop
OleGetClipboard
CoInitializeEx
OleDuplicateData
CoTaskMemFree
RegisterDragDrop
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 11
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:05:07 11:15:59+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
1816064

LinkerVersion
10.0

EntryPoint
0x192ef3

InitializedDataSize
720384

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 7813e8da464996b1eec3c1043bd19f9e
SHA1 acc225210a206b81e4b4e8669affbc21407a53fb
SHA256 5427cafef59b04bcad4fabf7eb8a5fd2b68f9226bc37553e9223f89561d2c587
ssdeep
49152:16bWnxWGDHYNvoAEWInUQoJEwIDvettrKfR9rGdgzeoyVcr0PosDgEOGskcJfH:IbWn+voqIUQ5wIDvctrKfR9rGd0XgPXq

authentihash 0858a6659a78217835e4c4775aae0e66d034c7acd264b7070c578a4a67bc2050
imphash eb833aa359ad516df5d8bc83e643d685
File size 2.3 MB ( 2461696 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-07 11:46:40 UTC ( 9 months, 3 weeks ago )
Last submission 2018-05-28 17:48:09 UTC ( 9 months ago )
File names dony9.yarn
dony9.yarn.exe
anee4.yarn
codexgigas_acc225210a206b81e4b4e8669affbc21407a53fb
dony9.yarn.exe
anee1.yarn
dony9.yarn.exe
dony4.yarn
dony5.yarn
anee5.yarn
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Runtime DLLs