× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 61338ccd3db633bf1f38bd62f5cf3b0457a172a1e03ca9f6ba54a5dda4e0c401
File name: j0HvnNe.exe
Detection ratio: 34 / 68
Analysis date: 2018-08-14 14:11:45 UTC ( 6 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31166438 20180814
AhnLab-V3 Trojan/Win32.Emotet.R234237 20180814
ALYac Trojan.Autoruns.GenericKDS.31166438 20180814
Arcabit Trojan.Autoruns.GenericS.D1DB8FE6 20180814
Avast Win32:Malware-gen 20180814
AVG FileRepMalware 20180814
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180814
BitDefender Trojan.Autoruns.GenericKDS.31166438 20180814
Comodo CloudScanner.Trojan.Gen 20180814
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180814
Emsisoft Trojan.Autoruns.GenericKDS.31166438 (B) 20180814
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GJTS 20180814
F-Secure Trojan.Autoruns.GenericKDS.31166438 20180814
Fortinet W32/GenKryptik.CHTY!tr 20180814
GData Trojan.Autoruns.GenericKDS.31166438 20180814
Ikarus Trojan.Win32.Emotet 20180814
Sophos ML heuristic 20180717
K7GW Hacktool ( 700007861 ) 20180814
Kaspersky Trojan-Banker.Win32.Emotet.basd 20180814
Malwarebytes Trojan.Emotet 20180814
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.ch 20180814
Microsoft Trojan:Win32/Emotet.AC!bit 20180814
eScan Trojan.Autoruns.GenericKDS.31166438 20180814
Palo Alto Networks (Known Signatures) generic.ml 20180814
Qihoo-360 HEUR/QVM20.1.2797.Malware.Gen 20180814
Rising Trojan.Cloxer!8.F54F (TFE:1:t7i3R4RLjbD) 20180814
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/Generic-S 20180814
Symantec Trojan.Emotet 20180814
TrendMicro-HouseCall Suspicious_GEN.F47V0813 20180814
Webroot W32.Trojan.Emotet 20180814
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.basd 20180814
AegisLab 20180814
Antiy-AVL 20180814
Avast-Mobile 20180814
Avira (no cloud) 20180814
AVware 20180814
Babable 20180725
Bkav 20180814
CAT-QuickHeal 20180814
ClamAV 20180814
CMC 20180812
Cybereason 20180225
Cyren 20180814
DrWeb 20180814
eGambit 20180814
F-Prot 20180814
Jiangmin 20180814
K7AntiVirus 20180814
Kingsoft 20180814
MAX 20180814
McAfee 20180814
NANO-Antivirus 20180814
Panda 20180814
SUPERAntiSpyware 20180814
Symantec Mobile Insight 20180814
TACHYON 20180814
Tencent 20180814
TheHacker 20180813
TotalDefense 20180814
TrendMicro 20180814
Trustlook 20180814
VBA32 20180814
VIPRE 20180814
ViRobot 20180814
Yandex 20180814
Zillya 20180812
Zoner 20180813
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Description Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-13 09:30:40
Entry Point 0x0002416A
Number of sections 5
PE sections
PE imports
BuildTrusteeWithNameW
AbortSystemShutdownA
PageSetupDlgW
DeleteDC
DeleteCriticalSection
FindNextChangeNotification
GetVolumeNameForVolumeMountPointW
SetDefaultCommConfigA
GetCommandLineA
FlsFree
FlsGetValue
NetUserModalsSet
NetServerTransportDel
NetGroupGetInfo
VarR4FromDate
VarBoolFromDate
BSTR_UserSize
VarI2FromDate
RasHangUpA
RasSetAutodialParamA
NDRCContextBinding
RpcServerUseProtseqW
RpcServerUseProtseqEpA
SHStrDupA
GetUpdateRect
GetWindowThreadProcessId
GetMenuContextHelpId
DrawIcon
MessageBoxExW
SetUrlCacheEntryInfoW
CryptSIPRemoveSignedDataMsg
STGMEDIUM_UserSize
CreateGenericComposite
PdhMakeCounterPathW
PdhGetFormattedCounterArrayW
CompareSecurityIds
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 1
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Unicode

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
19456

EntryPoint
0x2416a

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
2018:08:13 11:30:40+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.0

FileOS
Win32

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CodeSize
150016

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 d32fdce69ef19c1eab3f1899a7b62fa4
SHA1 3b8bd4ad86ce01ad8b7a11423793d10b3dc426cc
SHA256 61338ccd3db633bf1f38bd62f5cf3b0457a172a1e03ca9f6ba54a5dda4e0c401
ssdeep
3072:OQNF0Ru9RH3E+y+4ElIcrdCAAWUqYeae73XnnvGlRx:tF50+decBCAAWxYy73Xnnv+

authentihash dc8d095f85c485dc557dea40beb95c91cd2075c0e4618c8c5d6342088deb8c67
imphash 2e808c6af93e7fc428158f251940522e
File size 161.5 KB ( 165376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-13 09:39:23 UTC ( 6 months, 1 week ago )
Last submission 2018-08-13 09:39:23 UTC ( 6 months, 1 week ago )
File names j0HvnNe.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!