× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5ac10964f514da9eef6fe68446e5e5a51c47dfb898c633019db7aabbc5934017
File name: 0f4116623415ad76e9539fdc7fee1814
Detection ratio: 44 / 69
Analysis date: 2018-12-17 01:07:36 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31410774 20181216
AegisLab Trojan.Win32.Emotet.4!c 20181214
AhnLab-V3 Malware/Gen.Generic.C2895153 20181216
ALYac Trojan.Agent.Emotet 20181216
Arcabit Trojan.Generic.D1DF4A56 20181216
Avast Win32:MalwareX-gen [Trj] 20181216
AVG Win32:MalwareX-gen [Trj] 20181216
BitDefender Trojan.GenericKD.31410774 20181216
Comodo Malware@#1z1eadjhqpic9 20181216
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20181217
Cyren W32/Emotet.LC.gen!Eldorado 20181216
Emsisoft Trojan.Emotet (A) 20181216
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CTWT 20181216
F-Secure Trojan.GenericKD.31410774 20181216
Fortinet Malicious_Behavior.SB 20181216
GData Trojan.GenericKD.31410774 20181216
Ikarus Trojan-Banker.Emotet 20181216
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 0054394f1 ) 20181216
K7GW Trojan ( 0054394f1 ) 20181216
Kaspersky Trojan-Banker.Win32.Emotet.buwo 20181216
Malwarebytes Trojan.Emotet 20181216
MAX malware (ai score=100) 20181217
McAfee Emotet-FKK!0F4116623415 20181216
McAfee-GW-Edition Emotet-FKK!0F4116623415 20181216
Microsoft Trojan:Win32/Emotet.AC!bit 20181216
eScan Trojan.GenericKD.31410774 20181216
NANO-Antivirus Trojan.Win32.Emotet.fldfxv 20181216
Palo Alto Networks (Known Signatures) generic.ml 20181217
Panda Trj/RnkBend.A 20181216
Qihoo-360 HEUR/QVM19.1.D159.Malware.Gen 20181217
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/Generic-S 20181216
Symantec Trojan.Gen.2 20181216
TACHYON Banker/W32.Emotet.512000.B 20181214
Tencent Win32.Trojan-banker.Emotet.Hfd 20181217
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.EMOTET.THABACAH 20181216
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABACAH 20181217
VBA32 BScope.Trojan.Refinka 20181214
Webroot W32.Trojan.Emotet 20181217
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.buwo 20181216
Alibaba 20180921
Antiy-AVL 20181216
Avast-Mobile 20181216
Avira (no cloud) 20181216
Babable 20180918
Baidu 20181207
Bkav 20181214
CAT-QuickHeal 20181216
ClamAV 20181216
CMC 20181216
Cybereason 20180225
DrWeb 20181216
eGambit 20181217
F-Prot 20181216
Jiangmin 20181216
Kingsoft 20181217
Rising 20181216
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181215
TheHacker 20181216
TotalDefense 20181216
Trustlook 20181217
ViRobot 20181217
Yandex 20181214
Zillya 20181215
Zoner 20181216
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-12 22:12:35
Entry Point 0x000031A4
Number of sections 5
PE sections
PE imports
RegNotifyChangeKeyValue
GetSaveFileNameW
CryptMsgVerifyCountersignatureEncodedEx
CryptSIPGetSignedDataMsg
CertCloseStore
CertGetValidUsages
SelectPalette
GetNamedPipeClientProcessId
FlushProcessWriteBuffers
GlobalDeleteAtom
GetVersionExW
UnregisterApplicationRestart
FindNextFileA
GetCommConfig
FlsFree
GetModuleHandleW
MprAdminMIBServerConnect
DrawDibEnd
DsCrackNamesW
VariantTimeToDosDateTime
NdrConvert
SetupGetMultiSzFieldW
SetupGetStringFieldA
SetupDiOpenDeviceInfoW
SetupDiBuildDriverInfoList
SetFocus
IsCharUpperA
GetScrollBarInfo
GetKeyboardLayout
RegisterClassW
IsCharAlphaA
PackDDElParam
IsWindowEnabled
GetInputState
CreateUrlCacheEntryW
waveOutGetPitch
FindNextPrinterChangeNotification
EnumJobsW
GetJobW
SCardSetCardTypeProviderNameA
CoCreateInstanceEx
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.20.3.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Event Generator

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
ASCII

InitializedDataSize
487424

EntryPoint
0x31a4

MIMEType
application/octet-stream

LegalCopyright
Copyright Stirling Technologies, 1993-1997

TimeStamp
2018:12:12 23:12:35+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5.20.003 32bit

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Stirling Technologies, Inc.

CodeSize
28673

ProductName
DemoShield

ProductVersionNumber
5.20.3.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 0f4116623415ad76e9539fdc7fee1814
SHA1 40c2ed68162da9668b0c66eac1e1174b3c59eb23
SHA256 5ac10964f514da9eef6fe68446e5e5a51c47dfb898c633019db7aabbc5934017
ssdeep
3072:sk6vb25g3GAciO0lHphZJbhfT6eiDHEmaH8P3Si51i:sk6vb2KnOyJbhL6bDkrkc

authentihash c659901217a3cf949fd98758cac09344d6b62d9cab0feffbb90f525e9bea9842
imphash 332dd173c123b39bf03abbca780cadb1
File size 500.0 KB ( 512000 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-12 14:18:26 UTC ( 2 months, 1 week ago )
Last submission 2019-01-22 09:11:14 UTC ( 1 month ago )
File names 96562.exe
24696.exe
J5msNlRInRieTBTT0sK.exe
294.exe
44337162.exe
0f4116623415ad76e9539fdc7fee1814
2176182.exe
7.exe
56638.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!