× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6412c7a2cc8481173532e9ccfd065b783ece3d42be2c43c3e2d487d6ef04894c
File name: .
Detection ratio: 27 / 70
Analysis date: 2019-02-08 19:19:38 UTC ( 1 month, 1 week ago )
Antivirus Result Update
Acronis suspicious 20190208
Ad-Aware Trojan.Agent.DOZG 20190208
AhnLab-V3 Malware/Win32.Generic.C2994419 20190208
ALYac Trojan.Agent.DOZG 20190208
Antiy-AVL Trojan[Banker]/Win32.IcedID 20190208
Arcabit Trojan.Agent.DOZG 20190208
Avast Win32:Malware-gen 20190208
AVG Win32:Malware-gen 20190208
BitDefender Trojan.Agent.DOZG 20190208
DrWeb Trojan.Inject3.12617 20190208
Emsisoft Trojan.Agent.DOZG (B) 20190208
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPJK 20190208
Fortinet W32/Kryptik.GPJK!tr 20190208
GData Trojan.Agent.DOZG 20190208
Malwarebytes Trojan.IcedID 20190208
MAX malware (ai score=87) 20190208
McAfee GenericR-OSN!AC8CCCB4473E 20190208
McAfee-GW-Edition GenericR-OSN!AC8CCCB4473E 20190208
Microsoft TrojanSpy:Win32/IcedId.C 20190208
eScan Trojan.Agent.DOZG 20190208
NANO-Antivirus Trojan.Win32.Inject3.fmqwdl 20190208
Panda Trj/GdSda.A 20190208
Rising Trojan.Kryptik!8.8 (TFE:dGZlOgVVQuidk4sr+w) 20190208
Trapmine suspicious.low.ml.score 20190123
Webroot W32.Trojan.Gen 20190208
Zillya Trojan.IcedId.Win32.496 20190208
AegisLab 20190208
Alibaba 20180921
Avast-Mobile 20190208
Avira (no cloud) 20190208
Babable 20180918
Baidu 20190202
Bkav 20190201
CAT-QuickHeal 20190208
ClamAV 20190208
CMC 20190208
Comodo 20190208
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cyren 20190208
eGambit 20190208
F-Prot 20190208
F-Secure 20190208
Ikarus 20190208
Sophos ML 20181128
Jiangmin 20190208
K7AntiVirus 20190208
K7GW 20190208
Kaspersky 20190208
Kingsoft 20190208
Palo Alto Networks (Known Signatures) 20190208
Qihoo-360 20190208
SentinelOne (Static ML) 20190203
Sophos AV 20190208
SUPERAntiSpyware 20190206
Symantec 20190208
Symantec Mobile Insight 20190207
TACHYON 20190208
Tencent 20190208
TheHacker 20190203
TotalDefense 20190206
TrendMicro 20190208
TrendMicro-HouseCall 20190208
Trustlook 20190208
VBA32 20190208
VIPRE 20190207
ViRobot 20190208
Yandex 20190208
ZoneAlarm by Check Point 20190208
Zoner 20190208
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2003-2013, Cvent hill statedry

Product Throughmost
Original name Measuremove.exe
Internal name Throughmost
Description Throughmost
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-01-31 10:03:44
Entry Point 0x00009B92
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
SetSecurityDescriptorDacl
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StartServiceCtrlDispatcherA
OpenServiceA
SetServiceStatus
QueryServiceStatus
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
ControlService
SetEntriesInAclA
RegCreateKeyExA
FreeSid
RegOpenKeyExA
OpenSCManagerA
RegisterServiceCtrlHandlerA
CreateServiceW
CreatePatternBrush
GetBkColor
GetSystemTime
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetModuleFileNameW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
RtlUnwind
DeleteCriticalSection
GetCurrentProcess
GetDateFormatA
GetStartupInfoW
SizeofResource
GetFileType
GetConsoleMode
DecodePointer
GetCurrentProcessId
OpenProcess
UnhandledExceptionFilter
GetCPInfo
ExitProcess
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
VirtualProtectEx
GetProcessHeap
SetStdHandle
RaiseException
WideCharToMultiByte
TlsFree
GetModuleHandleA
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
WriteFile
CloseHandle
IsProcessorFeaturePresent
GetVolumeInformationA
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TerminateProcess
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
CreateFileW
TlsGetValue
Sleep
SetLastError
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
WriteConsoleW
LeaveCriticalSection
BeginDeferWindowPos
CreateMenu
LoadCursorA
AppendMenuA
TrackPopupMenu
UnregisterHotKey
GetActiveWindow
RegisterWindowMessageA
PostMessageA
DeferWindowPos
TranslateMessage
GetWindow
FillRect
DrawFrameControl
IsDialogMessageA
waveInOpen
timeEndPeriod
waveInClose
waveInUnprepareHeader
waveInStart
timeBeginPeriod
WTSEnumerateSessionsA
WTSCloseServer
WTSOpenServerA
WTSLogoffSession
Number of PE resources by type
RT_ICON 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 6
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
Throughmost provewhose rub

FileDescription
Throughmost

InitializedDataSize
145408

ImageVersion
0.0

ProductName
Throughmost

FileVersionNumber
14.8.41.24

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
12.0

FileTypeExtension
exe

OriginalFileName
Measuremove.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
2015:01:31 11:03:44+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Throughmost

SubsystemVersion
6.0

ProductVersion
14.8.41.24

UninitializedDataSize
0

OSVersion
6.0

FileOS
Win32

LegalCopyright
Copyright (c) 2003-2013, Cvent hill statedry

MachineType
Intel 386 or later, and compatibles

CompanyName
Cvent

CodeSize
81408

FileSubtype
0

ProductVersionNumber
14.8.41.24

EntryPoint
0x9b92

ObjectFileType
Executable application

File identification
MD5 ac8cccb4473ecf5665ababae05d84786
SHA1 4381deae8215ed971e66d8d5c90e154221a450f1
SHA256 6412c7a2cc8481173532e9ccfd065b783ece3d42be2c43c3e2d487d6ef04894c
ssdeep
3072:IIF2JI22pBMOqV89TA9/q02VSkN61+M1JQRc+X94:IIwW220OqV89YCkgqW94

authentihash 144046f7b2db23b105110b3c20edb81907fa597ea1cdf41ddd4ab84a65535a4a
imphash 94cda286bb32303f61e33abb0fd3c627
File size 167.0 KB ( 171008 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-08 19:19:38 UTC ( 1 month, 1 week ago )
Last submission 2019-02-08 19:19:38 UTC ( 1 month, 1 week ago )
File names Throughmost
Measuremove.exe
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!