× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 54505afc6e865a1cfd2a691b32a1bed0a1df45c890a379ad30156ceb696696e6
File name: BvcgInfhkkZ.exe
Detection ratio: 8 / 67
Analysis date: 2018-03-14 10:57:11 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9986 20180314
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20170201
Cylance Unsafe 20180314
Endgame malicious (high confidence) 20180308
Sophos ML heuristic 20180121
Qihoo-360 HEUR/QVM09.0.D0E5.Malware.Gen 20180314
SentinelOne (Static ML) static engine - malicious 20180225
WhiteArmor Malware.HighConfidence 20180223
Ad-Aware 20180314
AegisLab 20180314
AhnLab-V3 20180314
Alibaba 20180314
ALYac 20180314
Antiy-AVL 20180314
Arcabit 20180314
Avast 20180314
Avast-Mobile 20180313
AVG 20180314
Avira (no cloud) 20180314
AVware 20180314
BitDefender 20180314
Bkav 20180314
CAT-QuickHeal 20180314
ClamAV 20180314
CMC 20180314
Comodo 20180314
Cybereason None
Cyren 20180314
DrWeb 20180314
eGambit 20180314
Emsisoft 20180314
ESET-NOD32 20180314
F-Prot 20180314
F-Secure 20180314
Fortinet 20180314
GData 20180314
Ikarus 20180314
Jiangmin 20180314
K7AntiVirus 20180314
K7GW 20180314
Kaspersky 20180314
Kingsoft 20180314
Malwarebytes 20180314
MAX 20180314
McAfee 20180314
McAfee-GW-Edition 20180314
Microsoft 20180314
eScan 20180314
NANO-Antivirus 20180314
nProtect 20180314
Palo Alto Networks (Known Signatures) 20180314
Panda 20180313
Rising 20180314
Sophos AV 20180314
SUPERAntiSpyware 20180314
Symantec 20180314
Symantec Mobile Insight 20180311
Tencent 20180314
TheHacker 20180311
TotalDefense 20180314
TrendMicro 20180314
TrendMicro-HouseCall 20180314
Trustlook 20180314
VBA32 20180314
VIPRE 20180314
ViRobot 20180314
Webroot 20180314
Yandex 20180314
Zillya 20180313
ZoneAlarm by Check Point 20180314
Zoner 20180314
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-14 10:11:19
Entry Point 0x00029FC5
Number of sections 4
PE sections
PE imports
RegOpenKeyExW
FindTextW
QueryPerformanceCounter
GetLastError
IsValidCodePage
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetStartupInfoA
LoadLibraryW
SetEvent
GetVersionExW
GetOEMCP
LCMapStringA
TlsSetValue
CompareStringW
GetTickCount
TlsAlloc
IsValidLocale
GetEnvironmentStringsW
GetVersionExA
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
HeapAlloc
GetCurrentProcess
EnumSystemLocalesA
GetEnvironmentStrings
GetLocaleInfoA
GetCurrentProcessId
SetHandleCount
CreateThread
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetUserDefaultLCID
GetProcessHeap
TlsFree
GetLocaleInfoW
InterlockedDecrement
HeapDestroy
CreateEventW
CompareStringA
GetCPInfo
GetStringTypeA
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
InterlockedIncrement
GetTimeFormatA
GetSystemTimeAsFileTime
GetDateFormatA
GetACP
HeapReAlloc
GetStringTypeW
GetProcAddress
SetEnvironmentVariableA
FreeLibrary
FormatMessageW
TerminateProcess
GetTimeZoneInformation
WideCharToMultiByte
InitializeCriticalSection
HeapCreate
VirtualFree
FatalAppExitA
IsDebuggerPresent
Sleep
GetFileType
SetConsoleCtrlHandler
ExitProcess
GetCurrentThreadId
GetCurrentThread
VirtualAlloc
SetLastError
CloseHandle
OffsetRect
DefWindowProcW
SetMenuItemInfoA
SetWindowLongW
SetCapture
ReleaseCapture
ShowWindowAsync
PostMessageW
GetCursorPos
ReleaseDC
UnregisterClassA
RegisterClassW
LoadStringW
SetWindowTextW
SetTimer
MoveWindow
GetSubMenu
CreateWindowExA
LoadIconA
TrackPopupMenu
GetMenuItemCount
GetClientRect
CreateWindowExW
DestroyWindow
PtInRect
Ord(95)
OleSaveToStream
Number of PE resources by type
RT_DIALOG 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:03:14 11:11:19+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
237568

LinkerVersion
7.1

EntryPoint
0x29fc5

InitializedDataSize
32768

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 f18d7c42381bec3c5091c7cbfe00eb6b
SHA1 2f0d1c06ae1f99dc301eb01ff70704cc02a46413
SHA256 54505afc6e865a1cfd2a691b32a1bed0a1df45c890a379ad30156ceb696696e6
ssdeep
6144:mh+U8KBj1CpAp/NK2rou73Iv6A+bKursdQs:W+kVwp4NK+ICAI9rsdQs

authentihash 4df4c8fcb2ab2878345bc17befd96662bf292e34be353016afdbc5a15de48354
imphash 7f3ad2af892294675d68908fb2a8f2c0
File size 268.0 KB ( 274432 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-14 10:57:11 UTC ( 1 year, 1 month ago )
Last submission 2018-03-19 20:21:08 UTC ( 1 year, 1 month ago )
File names BvcgInfhkkZ.exe
BvcgInfhkkZ.exe
BvcgInfhkkZ.exe
BvcgInfhkkZ.exe
flareFile
BvcgInfhkkZ.exe
BvcgInfhkkZ.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Opened mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.