× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5fed462da441385f898ae7070a782e4ff036fbe53763a83ab8dc5191acbc7d0c
File name: BA2RQP.exe
Detection ratio: 22 / 68
Analysis date: 2018-09-16 06:45:18 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
AVG FileRepMalware 20180916
BitDefender Trojan.MaliciousTools.GenericKDS.31217738 20180916
CAT-QuickHeal Trojan.Emotet.X4 20180915
Comodo .UnclassifiedMalware 20180916
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180916
Endgame malicious (high confidence) 20180730
GData Win32.Trojan-Spy.Emotet.KYOV7S 20180916
Sophos ML heuristic 20180717
Kaspersky Trojan-Banker.Win32.Emotet.bdtm 20180916
McAfee RDN/Generic.grp 20180916
McAfee-GW-Edition BehavesLike.Win32.Generic.fm 20180916
Microsoft Trojan:Win32/Emotet.AC!bit 20180916
Palo Alto Networks (Known Signatures) generic.ml 20180916
Qihoo-360 HEUR/QVM20.1.E3F5.Malware.Gen 20180916
Rising Trojan.Emotet!8.B95 (TFE:3:l35169ztlxK) 20180916
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/Generic-S 20180916
Symantec ML.Attribute.HighConfidence 20180915
TrendMicro-HouseCall Suspicious_GEN.F47V0915 20180916
Webroot W32.Trojan.Emotet 20180916
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180916
Ad-Aware 20180913
AegisLab 20180916
AhnLab-V3 20180915
Alibaba 20180713
ALYac 20180916
Antiy-AVL 20180916
Arcabit 20180916
Avast 20180916
Avast-Mobile 20180916
Avira (no cloud) 20180915
AVware 20180916
Babable 20180907
Baidu 20180914
Bkav 20180915
ClamAV 20180916
CMC 20180915
Cybereason 20180225
Cyren 20180916
DrWeb 20180916
eGambit 20180916
Emsisoft 20180916
ESET-NOD32 20180915
F-Prot 20180916
F-Secure 20180916
Fortinet 20180916
Ikarus 20180915
Jiangmin 20180915
K7AntiVirus 20180916
K7GW 20180916
Kingsoft 20180916
Malwarebytes 20180916
MAX 20180916
eScan 20180916
NANO-Antivirus 20180916
Panda 20180915
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180916
Tencent 20180916
TheHacker 20180914
TotalDefense 20180915
TrendMicro 20180916
Trustlook 20180916
VBA32 20180914
VIPRE 20180916
ViRobot 20180915
Yandex 20180915
Zillya 20180914
Zoner 20180915
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

Product Mozilla
Internal name uconv
File version Personal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-16 05:31:20
Entry Point 0x00020C0F
Number of sections 6
PE sections
PE imports
GetSidSubAuthorityCount
InitiateSystemShutdownA
GetSidSubAuthority
GetServiceDisplayNameW
GetUserNameA
ObjectDeleteAuditAlarmW
LookupPrivilegeDisplayNameA
GetSecurityDescriptorSacl
CreateRestrictedToken
GetOldestEventLogRecord
EqualSid
GetFileSecurityA
LookupAccountNameW
GetWindowsAccountDomainSid
DeleteAce
DecryptFileW
GetCurrentHwProfileW
GetClusterResourceNetworkName
GetFileTitleA
GetOpenFileNameW
CryptHashCertificate
GetPixelFormat
GetWindowOrgEx
GetRgnBox
FloodFill
GetTextCharset
GetOutlineTextMetricsA
PaintRgn
DeleteDC
GetCharacterPlacementW
GetCharWidthW
GetObjectW
GetFontLanguageInfo
GdiComment
FillRgn
ExtTextOutW
FillPath
DeleteColorSpace
GetPath
GetOutlineTextMetricsW
GetDIBits
GetRasterizerCaps
ExtEscape
GetClipRgn
ExtCreatePen
Escape
GetFontData
DeleteObject
EnumSystemCodePagesW
DeviceIoControl
GetVolumePathNameW
GetStdHandle
FlushConsoleInputBuffer
GlobalDeleteAtom
FindFirstChangeNotificationA
FindVolumeClose
GetThreadPriority
DeleteTimerQueueEx
LoadLibraryA
LockFile
ExitThread
GetPrivateProfileStructW
GetProcessId
DeleteCriticalSection
FileTimeToDosDateTime
GetConsoleMode
GetFileSize
GetCalendarInfoW
GetWindowsDirectoryA
GetVolumeInformationW
GetStartupInfoW
GetLogicalDrives
GetProcAddress
GetConsoleScreenBufferInfo
WriteProfileStringW
WritePrivateProfileStringW
GetTempFileNameW
lstrcpyW
RaiseException
GetModuleHandleA
DeleteVolumeMountPointW
GetExitCodeThread
GetCurrentProcessId
GlobalFlags
FindResourceExW
_lopen
Module32NextW
IsValidLocale
GetSystemDirectoryA
GetStringTypeW
GetLongPathNameW
GetFileAttributesExW
WriteProfileSectionA
GetProfileIntW
FindCloseChangeNotification
SetCommConfig
GetCurrencyFormatA
GetTempPathW
GetCommState
GetLogicalDriveStringsW
FindNextVolumeMountPointW
GetProfileIntA
GetTickCount
GetVersion
LocalAlloc
MprAdminMIBEntryGetFirst
LoadRegTypeLib
GetErrorInfo
SafeArrayDestroyDescriptor
GetCurrentPowerPolicies
RasEnumConnectionsW
I_RpcAsyncAbortCall
SetupCloseLog
GetUserNameExA
GetCursorInfo
DrawTextExW
GetPropW
DrawStateA
EnumWindows
FindWindowW
GetClassInfoExA
DestroyMenu
GetClipboardData
GetRawInputDeviceInfoW
FreeDDElParam
MessageBoxW
GetTabbedTextExtentA
InsertMenuItemW
LookupIconIdFromDirectory
MessageBoxIndirectA
DrawIcon
LoadCursorFromFileA
GetDlgItemTextA
GetScrollRange
GetClipboardFormatNameW
GetProcessWindowStation
GetMenuItemID
InsertMenuItemA
ReleaseDC
LockWorkStation
DestroyIcon
LoadStringA
GetWindowPlacement
GetClientRect
GetKeyboardLayoutList
DrawMenuBar
MessageBoxIndirectW
DeleteMenu
GetUpdateRgn
LoadCursorW
GetSystemMenu
GetFocus
GetUpdateRect
GetKeyboardType
GetFileVersionInfoSizeA
VerFindFileW
FindNextUrlCacheEntryW
FindCloseUrlCache
GetUrlCacheEntryInfoA
GetUrlCacheEntryInfoW
GetPrinterW
GetPrinterDriverDirectoryA
FindFirstPrinterChangeNotification
GetPrinterDataW
FindClosePrinterChangeNotification
DeletePrinterDriverW
DeletePortW
XcvDataW
WintrustGetRegPolicyFlags
fputc
vprintf
strcspn
fwrite
localeconv
fseek
free
ftell
fwprintf
ungetwc
fgetws
PdhBrowseCountersW
IsValidURL
FindMimeFromData
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
259584

EntryPoint
0x20c0f

MIMEType
application/octet-stream

LegalCopyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

FileVersion
Personal

TimeStamp
2018:09:16 07:31:20+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
uconv

ProductVersion
Personal

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mozilla, Netscape

LegalTrademarks
Mozilla, Netscape

ProductName
Mozilla

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 09833d56faab7391bdfce43dfaa93c74
SHA1 b2a683b25fd228306b97d8d9ce65b49d6aaca637
SHA256 5fed462da441385f898ae7070a782e4ff036fbe53763a83ab8dc5191acbc7d0c
ssdeep
3072:x5szLCPizrf2tuobfyXZuecQbFkA3iRDJmgSvbjoBTWL02qe7HGpL9vAI0Pi8Tt6:c3Ii3f2coUAvQJxSiIdXleC3CtiR4

authentihash 5c604a4ee297f4b5e204dc368e6ba76a3412aa6f16e2c544aeeb8e8b8007c1b0
imphash 9e669eb085219521c9dc55b601af560d
File size 382.5 KB ( 391680 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (33.7%)
Win64 Executable (generic) (29.8%)
Microsoft Visual C++ compiled executable (generic) (17.8%)
Win32 Dynamic Link Library (generic) (7.1%)
Win32 Executable (generic) (4.8%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-15 22:34:19 UTC ( 5 months, 1 week ago )
Last submission 2018-09-15 22:34:19 UTC ( 5 months, 1 week ago )
File names 18803160.exe
lX1BqqlZm1y.exe
BA2RQP.exe
uconv
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs