× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 615ac6bfc9d62934bbd1c91d1c18fbd23fa463ad4ca2f50bd283b95e08485e63
File name: (4).exe
Detection ratio: 26 / 67
Analysis date: 2018-06-22 22:41:30 UTC ( 7 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40293507 20180622
AhnLab-V3 Trojan/Win32.Emotet.R230382 20180622
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180622
BitDefender Trojan.GenericKD.40293507 20180622
ClamAV Win.Trojan.Generic-6584512-1 20180622
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180530
Cylance Unsafe 20180622
Cyren W32/Emotet.CJ.gen!Eldorado 20180622
Emsisoft Trojan.Emotet (A) 20180622
Endgame malicious (high confidence) 20180612
ESET-NOD32 a variant of Win32/Kryptik.GIAR 20180622
F-Prot W32/Emotet.CJ.gen!Eldorado 20180622
Fortinet W32/Kryptik.FVEZ!tr 20180622
GData Win32.Trojan-Spy.Emotet.RS 20180622
Kaspersky UDS:DangerousObject.Multi.Generic 20180622
MAX malware (ai score=81) 20180622
McAfee Emotet-FHP!4007EB0AB95B 20180622
Microsoft Trojan:Win32/Emotet.AC!bit 20180622
eScan Trojan.GenericKD.40293507 20180622
Qihoo-360 HEUR/QVM20.1.042F.Malware.Gen 20180622
Rising Trojan.GenKryptik!8.AA55 (RDM+:cmRtazoG+93PjOFjLd/4/iAtd9DN) 20180622
SentinelOne (Static ML) static engine - malicious 20180618
Symantec Trojan.Emotet 20180622
VBA32 BScope.TrojanDownloader.Stantinko 20180622
Webroot W32.Trojan.Emotet 20180622
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180622
AegisLab 20180622
Alibaba 20180622
ALYac 20180622
Antiy-AVL 20180622
Arcabit 20180622
Avast 20180622
Avast-Mobile 20180622
AVG 20180622
Avira (no cloud) 20180622
AVware 20180622
Babable 20180406
Bkav 20180622
CAT-QuickHeal 20180622
CMC 20180622
Comodo 20180622
Cybereason 20180225
DrWeb 20180622
eGambit 20180622
F-Secure 20180622
Ikarus 20180622
Sophos ML 20180601
Jiangmin 20180622
K7AntiVirus 20180622
K7GW 20180622
Kingsoft 20180622
Malwarebytes 20180622
McAfee-GW-Edition 20180622
NANO-Antivirus 20180622
Palo Alto Networks (Known Signatures) 20180622
Panda 20180622
Sophos AV 20180622
SUPERAntiSpyware 20180622
Symantec Mobile Insight 20180619
TACHYON 20180622
Tencent 20180622
TheHacker 20180622
TrendMicro 20180622
TrendMicro-HouseCall 20180622
Trustlook 20180622
VIPRE 20180622
ViRobot 20180622
Yandex 20180622
Zillya 20180622
Zoner 20180622
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Uniscri
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-22 02:32:36
Entry Point 0x0000100F
Number of sections 6
PE sections
Overlays
MD5 692c8022360661692872fdc730517229
File type ASCII text
Offset 342528
Size 3
Entropy 1.58
PE imports
LookupPrivilegeDisplayNameA
QueryServiceConfigW
CryptReleaseContext
RegEnumKeyW
NotifyBootConfigStatus
ClusterRegSetValue
ClusterRegCreateKey
ImageList_Create
CertCreateCertificateChainEngine
CertGetEnhancedKeyUsage
CertSaveStore
CertFindSubjectInSortedCTL
JetCommitTransaction
GetKerningPairsW
LineTo
SetAbortProc
SetColorAdjustment
CopyEnhMetaFileW
CreateFontIndirectA
DeleteDC
CreateRectRgnIndirect
CreateEnhMetaFileA
CreateDIBSection
GetLayout
EnumFontFamiliesW
GetTextFaceA
ImmConfigureIMEW
GetSystemDefaultLangID
SetVolumeLabelA
WaitForDebugEvent
SetTimeZoneInformation
Process32First
SetCalendarInfoW
GetStartupInfoW
SetEndOfFile
FlushFileBuffers
FlsFree
WinExec
FindActCtxSectionStringW
LZOpenFileW
MprAdminInterfaceDisconnect
MprAdminInterfaceSetInfo
NetServerGetInfo
NetShareEnumSticky
BSTR_UserSize
LHashValOfNameSys
VariantTimeToSystemTime
VariantCopyInd
glTexCoord2f
UuidToStringA
NdrClientInitializeNew
RpcMgmtWaitServerListen
NdrOleAllocate
SetupGetTargetPathW
SetupDiSetDeviceRegistryPropertyA
SetupDiGetINFClassW
CM_Get_Resource_Conflict_DetailsW
SetupDiInstallClassW
SetupDiBuildDriverInfoList
SetupOpenMasterInf
SetupDiGetClassInstallParamsA
SHSetLocalizedName
PathAddBackslashA
SHGetInverseCMAP
PathIsRelativeA
UrlIsW
PathRemoveArgsW
PathRenameExtensionA
PathCanonicalizeW
AcquireCredentialsHandleW
wsprintfA
EnumWindowStationsA
CreateMenu
PeekMessageW
GetScrollRange
GetInputState
AnyPopup
EnumPropsA
MoveWindow
GetDialogBaseUnits
GetMonitorInfoA
GetWindowContextHelpId
BroadcastSystemMessageA
CloseWindowStation
GetClipCursor
FtpOpenFileA
SendDriverMessage
mmioAscend
waveOutGetID
timeBeginPeriod
GetPrinterDriverW
WTHelperProvDataFromStateData
wcstod
fputws
fgetws
iswpunct
CoUnmarshalInterface
WriteClassStm
CoMarshalHresult
StringFromCLSID
CoDisconnectObject
HBITMAP_UserUnmarshal
PdhEnumObjectItemsHW
IsAsyncMoniker
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 21
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
HEBREW DEFAULT 1
HUNGARIAN DEFAULT 1
VIETNAMESE DEFAULT 1
CHINESE SIMPLIFIED 1
SLOVENIAN DEFAULT 1
CZECH DEFAULT 1
FINNISH DEFAULT 1
KOREAN 1
NEUTRAL DEFAULT 1
PORTUGUESE 1
POLISH DEFAULT 1
JAPANESE DEFAULT 1
DANISH DEFAULT 1
SLOVAK DEFAULT 1
GREEK DEFAULT 1
TURKISH DEFAULT 1
ROMANIAN 1
THAI DEFAULT 1
SERBIAN DEFAULT 1
NEUTRAL 1
RUSSIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Uniscri

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
235520

EntryPoint
0x100f

MIMEType
application/octet-stream

TimeStamp
2018:06:22 03:32:36+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0626.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Realtek Semiconductor Corporation

CodeSize
110592

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 4007eb0ab95bf3efc2214922dc9de5b4
SHA1 53d4073e5c47fce803e75dd646daa4767d7f2cc1
SHA256 615ac6bfc9d62934bbd1c91d1c18fbd23fa463ad4ca2f50bd283b95e08485e63
ssdeep
1536:Xa92VFqwzi2y89qY1oYDPgTUZoQxuDC1EABP5PUeVQw7WV1gJ4/d6DpTn3/iAr:K92rRWfDYDdACzPVawWVy+d6DpTq4

authentihash c9522af96a6e217198076365c4f663beb745d9ad34a7d340b9f8f9478d640319
imphash 83934ddd88ffe4a28214b8cc4dfc988a
File size 334.5 KB ( 342531 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-06-22 22:41:30 UTC ( 7 months, 4 weeks ago )
Last submission 2018-09-14 02:28:14 UTC ( 5 months ago )
File names 615ac6bfc9d62934bbd1c91d1c18fbd23fa463ad4ca2f50bd283b95e08485e63.bin
(4).exe
(4)012.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!