× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 65bc667cb2bb3d8cb21da9b89da9d9f4a82b99cbc422a2b58d53e60ae3528096
File name: 65bc667cb2bb3d8cb21da9b89da9d9f4a82b99cbc422a2b58d53e60ae3528096
Detection ratio: 46 / 68
Analysis date: 2018-06-24 08:57:35 UTC ( 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31001511 20180624
AhnLab-V3 Trojan/Win32.Emotet.R230382 20180623
ALYac Trojan.Agent.Emotet 20180624
Antiy-AVL Trojan/Win32.TSGeneric 20180624
Arcabit Trojan.Generic.D1D90BA7 20180624
Avast FileRepMalware 20180624
AVG FileRepMalware 20180624
AVware Trojan.Win32.Generic!BT 20180624
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180622
BitDefender Trojan.GenericKD.31001511 20180624
CAT-QuickHeal Trojan.Emotet 20180623
ClamAV Win.Trojan.Generic-6584512-1 20180624
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cylance Unsafe 20180624
Cyren W32/Emotet.CJ.gen!Eldorado 20180624
DrWeb Trojan.Emotet.255 20180624
Emsisoft Trojan.Emotet (A) 20180624
Endgame malicious (high confidence) 20180612
ESET-NOD32 Win32/Emotet.BK 20180624
F-Prot W32/Emotet.CJ.gen!Eldorado 20180624
Fortinet W32/Kryptik.GHOI!tr 20180624
GData Win32.Trojan-Spy.Emotet.RS 20180624
Ikarus Trojan-Banker.Emotet 20180623
Sophos ML heuristic 20180601
K7AntiVirus Trojan ( 005337711 ) 20180624
K7GW Trojan ( 005337711 ) 20180624
Kaspersky Trojan.Win32.Dovs.oxi 20180624
Malwarebytes Spyware.Emotet 20180624
MAX malware (ai score=98) 20180624
McAfee Emotet-FHP!2C40968EE057 20180624
McAfee-GW-Edition Artemis 20180624
Microsoft Trojan:Win32/Emotet.AC!bit 20180624
eScan Trojan.GenericKD.31001511 20180624
NANO-Antivirus Trojan.Win32.Dovs.fejskm 20180624
Palo Alto Networks (Known Signatures) generic.ml 20180624
Panda Trj/GdSda.A 20180624
Qihoo-360 Win32/Trojan.787 20180624
Sophos AV Mal/Generic-S 20180624
Symantec Trojan.Emotet 20180623
TrendMicro TROJ_GEN.R002C0OFN18 20180624
TrendMicro-HouseCall TROJ_GEN.R002C0OFN18 20180624
VBA32 BScope.Trojan.Yakes 20180622
VIPRE Trojan.Win32.Generic!BT 20180624
ViRobot Trojan.Win32.Z.Emotet.339971.A 20180623
Webroot W32.Trojan.Emotet 20180624
ZoneAlarm by Check Point Trojan.Win32.Dovs.oxi 20180624
AegisLab 20180622
Alibaba 20180622
Avast-Mobile 20180623
Avira (no cloud) 20180624
Babable 20180406
Bkav 20180623
CMC 20180624
Comodo 20180624
Cybereason 20180225
eGambit 20180624
F-Secure 20180624
Jiangmin 20180624
Kingsoft 20180624
Rising 20180624
SentinelOne (Static ML) 20180618
SUPERAntiSpyware 20180624
Symantec Mobile Insight 20180619
TACHYON 20180624
Tencent 20180624
TheHacker 20180624
TotalDefense 20180624
Trustlook 20180624
Yandex 20180622
Zillya 20180622
Zoner 20180623
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Uniscri
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-21 19:40:54
Entry Point 0x0000100F
Number of sections 6
PE sections
Overlays
MD5 692c8022360661692872fdc730517229
File type ASCII text
Offset 339968
Size 3
Entropy 1.58
PE imports
LookupPrivilegeDisplayNameA
NotifyBootConfigStatus
CryptReleaseContext
RegEnumKeyW
QueryServiceConfigW
CM_Get_Resource_Conflict_DetailsW
ClusterRegSetValue
ClusterRegCreateKey
ImageList_Create
CertCreateCertificateChainEngine
CertFindSubjectInSortedCTL
CertSaveStore
CertGetEnhancedKeyUsage
JetCommitTransaction
GetKerningPairsW
LineTo
DeleteDC
SetAbortProc
CopyEnhMetaFileW
SetColorAdjustment
CreateFontIndirectA
CreateRectRgnIndirect
CreateEnhMetaFileA
CreateDIBSection
GetTextFaceA
EnumFontFamiliesW
GetLayout
ImmConfigureIMEW
GetSystemDefaultLangID
SetEndOfFile
WaitForDebugEvent
SetTimeZoneInformation
Process32First
SetCalendarInfoW
GetStartupInfoW
SetVolumeLabelA
FlushFileBuffers
FlsFree
WinExec
FindActCtxSectionStringW
LZOpenFileW
MprAdminInterfaceDisconnect
MprAdminInterfaceSetInfo
NetServerGetInfo
NetShareEnumSticky
BSTR_UserSize
LHashValOfNameSys
VariantTimeToSystemTime
VariantCopyInd
glTexCoord2f
UuidToStringA
NdrOleAllocate
RpcMgmtWaitServerListen
NdrClientInitializeNew
SetupGetTargetPathW
SetupDiSetDeviceRegistryPropertyA
SetupDiGetINFClassW
SetupDiInstallClassW
SetupDiBuildDriverInfoList
SetupOpenMasterInf
SetupDiGetClassInstallParamsA
SHSetLocalizedName
PathAddBackslashA
SHGetInverseCMAP
PathIsRelativeA
UrlIsW
PathRemoveArgsW
PathRenameExtensionA
PathCanonicalizeW
AcquireCredentialsHandleW
wsprintfA
EnumWindowStationsA
CreateMenu
PeekMessageW
GetScrollRange
GetInputState
AnyPopup
EnumPropsA
MoveWindow
GetDialogBaseUnits
GetMonitorInfoA
GetWindowContextHelpId
BroadcastSystemMessageA
CloseWindowStation
GetClipCursor
FtpOpenFileA
SendDriverMessage
mmioAscend
waveOutGetID
timeBeginPeriod
GetPrinterDriverW
WTHelperProvDataFromStateData
wcstod
fputws
fgetws
iswpunct
CoUnmarshalInterface
WriteClassStm
CoMarshalHresult
StringFromCLSID
CoDisconnectObject
HBITMAP_UserUnmarshal
PdhEnumObjectItemsHW
IsAsyncMoniker
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 21
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
HEBREW DEFAULT 1
HUNGARIAN DEFAULT 1
VIETNAMESE DEFAULT 1
CHINESE SIMPLIFIED 1
SLOVENIAN DEFAULT 1
CZECH DEFAULT 1
FINNISH DEFAULT 1
KOREAN 1
NEUTRAL DEFAULT 1
PORTUGUESE 1
POLISH DEFAULT 1
JAPANESE DEFAULT 1
DANISH DEFAULT 1
SLOVAK DEFAULT 1
GREEK DEFAULT 1
TURKISH DEFAULT 1
ROMANIAN 1
THAI DEFAULT 1
SERBIAN DEFAULT 1
NEUTRAL 1
RUSSIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Uniscri

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
235520

EntryPoint
0x100f

MIMEType
application/octet-stream

TimeStamp
2018:06:21 21:40:54+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0626.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Realtek Semiconductor Corporation

CodeSize
108032

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 2c40968ee0576f04c2f945f3dfd323fe
SHA1 bb3e8e7e745ca1b47544227e79f32843945b386a
SHA256 65bc667cb2bb3d8cb21da9b89da9d9f4a82b99cbc422a2b58d53e60ae3528096
ssdeep
1536:zkgibUbGV1advUlWa27RYnTP4DzJnlf3TYGOk504pzznJRU7+0VsBcQr:IgibUytPAanj4Dzp1uk508z7JR1v

authentihash ef7126b9278db1f9a5039326df17f135c2274e74a1cbaa5e579c1d0983588088
imphash bf215942a8d879e1f7333848d51982af
File size 332.0 KB ( 339971 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-06-22 22:41:19 UTC ( 8 months ago )
Last submission 2018-09-14 02:20:50 UTC ( 5 months, 1 week ago )
File names (2)012.exe
(2).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!