× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5629215f0583fd1a92b2f4fc2de1bdf11bd94cb30401ab914276b9ba0a392fcb
File name: 1.exe
Detection ratio: 17 / 62
Analysis date: 2018-10-10 11:24:05 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20181010
AVG FileRepMalware 20181010
Bkav W32.eHeur.Malware10 20181009
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0053d5971 ) 20181010
K7GW Trojan ( 0053d5971 ) 20181010
McAfee GenericRXGM-JA!9900DA3B47A8 20181010
McAfee-GW-Edition BehavesLike.Win32.Generic.dh 20181010
Microsoft Trojan:Win32/Azden.A!cl 20181010
Qihoo-360 HEUR/QVM10.1.6E4D.Malware.Gen 20181010
Rising Malware.Heuristic!ET#98% (RDM+:cmRtazrytw/fQ9RlsHewShBSKSZk) 20181010
SentinelOne (Static ML) static engine - malicious 20180926
Symantec ML.Attribute.HighConfidence 20181010
VBA32 BScope.Trojan.Dynamer 20181010
Webroot W32.Trojan.Gen 20181010
Ad-Aware 20181010
AegisLab 20181010
AhnLab-V3 20181010
Alibaba 20180921
ALYac 20181010
Antiy-AVL 20181010
Arcabit 20181010
Avast-Mobile 20181010
Avira (no cloud) 20181010
Babable 20180918
Baidu 20181010
BitDefender 20181010
CAT-QuickHeal 20181008
ClamAV 20181010
CMC 20181010
Comodo 20181010
Cybereason 20180225
Cylance 20181010
Cyren 20181010
DrWeb 20181010
eGambit 20181010
Emsisoft 20181010
ESET-NOD32 20181010
F-Prot 20181010
F-Secure 20181010
Fortinet 20181010
GData 20181010
Ikarus 20181010
Jiangmin 20181009
Kaspersky 20181010
Kingsoft 20181010
Malwarebytes 20181010
MAX 20181010
eScan 20181010
NANO-Antivirus 20181010
Palo Alto Networks (Known Signatures) 20181010
Panda 20181009
Sophos AV 20181010
SUPERAntiSpyware 20181006
Symantec Mobile Insight 20181001
TACHYON 20181010
Tencent 20181010
TheHacker 20181008
TrendMicro 20181010
TrendMicro-HouseCall 20181010
Trustlook 20181010
VIPRE 20181010
ViRobot 20181010
Yandex 20181010
Zillya 20181009
ZoneAlarm by Check Point 20181010
Zoner 20181010
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-05-18 02:17:51
Entry Point 0x000050ED
Number of sections 5
PE sections
PE imports
ReportEventA
GetDCBrushColor
AreFileApisANSI
GetLastError
TlsGetValue
HeapFree
GetStdHandle
EnterCriticalSection
GetConsoleOutputCP
SetHandleCount
GetStringTypeA
GetLocaleInfoW
GetModuleFileNameW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
GetCommandLineW
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
EnumSystemLocalesA
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
LCMapStringW
WriteConsoleW
GetModuleHandleW
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
GetCPInfoExA
MultiByteToWideChar
GetStartupInfoW
GetVolumePathNamesForVolumeNameA
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
lstrcatW
GetCalendarInfoA
GetUserDefaultLCID
VirtualProtectEx
HeapSize
SetStdHandle
SetFilePointer
RaiseException
WideCharToMultiByte
TlsFree
GetModuleHandleA
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
SetFirmwareEnvironmentVariableA
CloseHandle
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
GetStringTypeW
GetProcAddress
TerminateProcess
QueryPerformanceCounter
WriteConsoleA
InitializeCriticalSection
HeapCreate
VirtualFree
FindAtomA
InterlockedDecrement
Sleep
GetFileType
GetTickCount
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
SetLastError
InterlockedIncrement
CoMarshalInterface
Number of PE resources by type
RT_STRING 45
RT_ICON 8
RT_BITMAP 5
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
SPANISH NEUTRAL 61
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
1.45.8.4

LanguageCode
English (British)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
175616

EntryPoint
0x50ed

MIMEType
application/octet-stream

FileVersion
4.6.4

TimeStamp
2017:05:18 03:17:51+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.11

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
88064

FileSubtype
0

ProductVersionNumber
7.32.568.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 9900da3b47a84eeb14f762359c3c0f38
SHA1 76c40c2107892f6ada8b4b231659b914bb3b49b4
SHA256 5629215f0583fd1a92b2f4fc2de1bdf11bd94cb30401ab914276b9ba0a392fcb
ssdeep
6144:xWlntlLlejLP4TIlNnvj5rTzu6ALMBgWdq:ETcjLP4irBF

authentihash a988b62287fc0ecd6df44e1fba7f2e64123cf1bd68236137f1e3c4eaf9044891
imphash ac6f3ca7f0f6eae2492df19693451181
File size 250.5 KB ( 256512 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (35.5%)
Win32 Executable MS Visual C++ (generic) (25.7%)
Win64 Executable (generic) (22.8%)
Win32 Dynamic Link Library (generic) (5.4%)
Win32 Executable (generic) (3.7%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-10 11:24:05 UTC ( 5 months, 1 week ago )
Last submission 2018-10-29 03:49:58 UTC ( 4 months, 2 weeks ago )
File names 1.exe
9900da3b47a84eeb14f762359c3c0f38
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections