× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 61f393a214519f94064ec326d7c032ff09b18c9f2ef99d95e8c0606ee20c3166
File name: a008c392fdf40e774f9faa4e291303bf
Detection ratio: 44 / 68
Analysis date: 2018-07-12 15:47:02 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.355553 20180712
AhnLab-V3 Trojan/Win32.Emotet.R230756 20180712
ALYac Gen:Variant.Razy.355553 20180712
Antiy-AVL Trojan/Win32.Dovs 20180712
Arcabit Trojan.Razy.D56CE1 20180712
Avast Win32:Trojan-gen 20180712
AVG Win32:Trojan-gen 20180712
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180712
BitDefender Gen:Variant.Razy.355553 20180712
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180530
Cybereason malicious.fced2b 20180225
Cylance Unsafe 20180712
Cyren W32/Trojan.ECBF-2772 20180712
DrWeb Trojan.EmotetENT.255 20180712
Emsisoft Gen:Variant.Razy.355553 (B) 20180712
Endgame malicious (high confidence) 20180711
ESET-NOD32 a variant of Win32/Kryptik.GIII 20180712
F-Secure Gen:Variant.Razy.355553 20180712
Fortinet W32/Kryptik.GIII!tr 20180712
GData Gen:Variant.Razy.355553 20180712
Ikarus Trojan.Win32.Emotet 20180712
Sophos ML heuristic 20180601
K7AntiVirus Trojan ( 005360eb1 ) 20180712
K7GW Trojan ( 005360eb1 ) 20180712
Kaspersky HEUR:Trojan.Win32.Generic 20180712
Malwarebytes Spyware.PasswordStealer 20180712
MAX malware (ai score=89) 20180712
McAfee Emotet-FHK!A008C392FDF4 20180712
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20180712
Microsoft Trojan:Win32/Skeeyah.A!rfn 20180712
eScan Gen:Variant.Razy.355553 20180712
NANO-Antivirus Trojan.Win32.Dovs.fetapu 20180712
Panda Trj/Genetic.gen 20180712
Qihoo-360 HEUR/QVM20.1.74CD.Malware.Gen 20180712
Rising Trojan.Emotet!8.B95 (TFE:dGZlOgOK0k3qXAzFgw) 20180712
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/EncPk-ANX 20180712
SUPERAntiSpyware Trojan.Agent/Gen-FalDesc 20180712
Symantec Packed.Generic.517 20180712
TrendMicro TSPY_EMOTET.TTIBBJD 20180712
TrendMicro-HouseCall TSPY_EMOTET.TTIBBJD 20180712
VBA32 Malware-Cryptor.Limpopo 20180712
Webroot W32.Trojan.Emotet 20180712
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180712
AegisLab 20180712
Alibaba 20180712
Avast-Mobile 20180712
Avira (no cloud) 20180710
AVware 20180712
Babable 20180406
Bkav 20180712
CAT-QuickHeal 20180712
ClamAV 20180712
CMC 20180712
Comodo 20180712
eGambit 20180712
F-Prot 20180712
Jiangmin 20180712
Kingsoft 20180712
Palo Alto Networks (Known Signatures) 20180712
TACHYON 20180712
Tencent 20180712
TheHacker 20180712
TotalDefense 20180712
Trustlook 20180712
VIPRE 20180712
ViRobot 20180712
Yandex 20180712
Zillya 20180711
Zoner 20180711
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copy

Product CPUID Hardware Monitor
Original name HWMonitor.exe
File version 1, 3, 5, 0
Description Microsof
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-28 23:57:17
Entry Point 0x000014B1
Number of sections 4
PE sections
PE imports
RegEnableReflectionKey
WriteEncryptedFileRaw
InitializeSecurityDescriptor
SelectClipPath
CreateDiscardableBitmap
SetRectRgn
DisconnectNamedPipe
SetThreadPreferredUILanguages
SetCurrentConsoleFontEx
SetTimeZoneInformation
LoadLibraryW
ConvertFiberToThread
SetFileApisToOEM
LocalFileTimeToFileTime
FindAtomA
CloseHandle
GetCommandLineA
FindVolumeMountPointClose
CreateConsoleScreenBuffer
FindFirstFileNameW
UnRegisterTypeLib
RasHangUpA
UrlCompareW
GetMenuPosFromID
TileWindows
GetLastInputInfo
LockWorkStation
GetMenuInfo
GetWindowRect
MessageBoxIndirectA
RegisterHotKey
DrawIconEx
LoadCursorFromFileA
GetScrollPos
DlgDirListW
WindowFromPoint
GetWindowModuleFileNameW
SetCursor
SetForegroundWindow
GetDlgItemTextW
CharNextW
GetKeyState
fwrite
fprintf
putc
toupper
Number of PE resources by type
RT_STRING 25
RT_DIALOG 3
RT_BITMAP 2
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 31
FRENCH 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:06:29 00:57:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
10.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x14b1

InitializedDataSize
65536

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 a008c392fdf40e774f9faa4e291303bf
SHA1 61cb2c9fced2b7e5b67caf07696b19d6d80df42a
SHA256 61f393a214519f94064ec326d7c032ff09b18c9f2ef99d95e8c0606ee20c3166
ssdeep
1536:1QKu3rBWb4bRGsmedi4q7KmYRAodIHmDgfnIP9EjTRUMZNT:G/3FWbZs3dzqsRxKKCA9EPRUMzT

authentihash 450435c4d92618ab891a09521d2a1479476e6f413fa45ebaeb5f63a036513c91
imphash 5927c9a7eaf7bbf790010d7cbe904ad4
File size 108.0 KB ( 110592 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-12 15:47:02 UTC ( 3 months ago )
Last submission 2018-07-12 15:47:02 UTC ( 3 months ago )
File names HWMonitor.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!