× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 67fccd872795a7e1bef8b0077bc09dd67d4c3a3f5b1720ac0df77b3fb94aa96e
File name: pro.any
Detection ratio: 29 / 68
Analysis date: 2018-10-19 08:28:27 UTC ( 5 months ago ) View latest
Antivirus Result Update
Avast Win32:Malware-gen 20181019
AVG Win32:Malware-gen 20181019
Avira (no cloud) TR/AD.TrickBot.tfcgf 20181019
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180723
Cybereason malicious.e52dd7 20180225
Cylance Unsafe 20181019
Cyren W32/Trojan.TCXM-8869 20181019
ESET-NOD32 a variant of Win32/Kryptik.GLTF 20181019
Fortinet W32/Kryptik.GLTF!tr 20181019
GData Win32.Trojan.Agent.UQP2V8 20181019
Ikarus Trojan-Banker.TrickBot 20181019
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 0053f2181 ) 20181019
K7GW Trojan ( 0053f2181 ) 20181019
Kaspersky Trojan-Banker.Win32.Trickster.va 20181019
McAfee RDN/Generic.dx 20181019
McAfee-GW-Edition RDN/Generic.dx 20181019
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181019
NANO-Antivirus Trojan.Win32.Kryptik.fjgpud 20181019
Palo Alto Networks (Known Signatures) generic.ml 20181019
Qihoo-360 Win32/Trojan.bdd 20181019
Sophos AV Troj/Trickbo-IZ 20181019
Symantec Trojan Horse 20181018
Tencent Win32.Trojan-banker.Trickster.Piks 20181019
TrendMicro TSPY_TRICKBOT.TIOIBEAN 20181019
TrendMicro-HouseCall TSPY_TRICKBOT.TIOIBEAN 20181019
ViRobot Trojan.Win32.Z.Agent.549823.A 20181019
Webroot W32.Trojan.Trickbot 20181019
ZoneAlarm by Check Point Trojan-Banker.Win32.Trickster.va 20181019
Ad-Aware 20181019
AegisLab 20181019
AhnLab-V3 20181018
Alibaba 20180921
ALYac 20181019
Antiy-AVL 20181019
Arcabit 20181019
Avast-Mobile 20181019
Babable 20180918
Baidu 20181019
BitDefender 20181019
Bkav 20181018
CAT-QuickHeal 20181018
ClamAV 20181019
CMC 20181019
DrWeb 20181019
eGambit 20181019
Emsisoft 20181019
Endgame 20180730
F-Prot 20181019
F-Secure 20181019
Jiangmin 20181019
Kingsoft 20181019
Malwarebytes 20181019
MAX 20181019
eScan 20181019
Panda 20181018
Rising 20181019
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181015
Symantec Mobile Insight 20181001
TACHYON 20181019
TheHacker 20181018
TotalDefense 20181018
Trustlook 20181019
VBA32 20181019
VIPRE 20181019
Yandex 20181018
Zillya 20181018
Zoner 20181018
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-17 15:12:59
Entry Point 0x000014E0
Number of sections 16
PE sections
Overlays
MD5 28545adb57aa18273127e68972670405
File type data
Offset 473088
Size 76735
Entropy 4.31
PE imports
CryptDestroyKey
CryptReleaseContext
CryptEncrypt
CryptImportKey
CryptAcquireContextA
GetLastError
EnterCriticalSection
SuspendThread
ReleaseMutex
TryEnterCriticalSection
ResumeThread
SetEvent
QueryPerformanceCounter
WaitForSingleObject
GetTickCount
TlsAlloc
GetHandleInformation
LoadLibraryA
DeleteCriticalSection
GetAtomNameA
SizeofResource
SetThreadPriority
GetCurrentProcessId
AddAtomA
LockResource
GetCurrentProcess
UnhandledExceptionFilter
TlsGetValue
VirtualProtect
SetProcessAffinityMask
WaitForMultipleObjects
InterlockedCompareExchange
GetThreadContext
GetCurrentThread
LeaveCriticalSection
CreateMutexA
InterlockedExchangeAdd
CreateSemaphoreA
GetModuleHandleA
InterlockedExchange
SetUnhandledExceptionFilter
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
DuplicateHandle
GetThreadPriority
SetThreadContext
TerminateProcess
GetProcessAffinityMask
ReleaseSemaphore
ResetEvent
InitializeCriticalSection
LoadResource
VirtualQuery
CreateEventA
FindAtomA
InterlockedDecrement
Sleep
TlsSetValue
GetCurrentThreadId
FindResourceA
SetLastError
InterlockedIncrement
strncmp
__lconv_init
malloc
realloc
memset
__dllonexit
_cexit
abort
fprintf
_setjmp3
printf
_fmode
_endthreadex
_amsg_exit
fputc
fwrite
_lock
_onexit
__initenv
fputs
_strdup
sprintf
memcmp
strlen
exit
__setusermatherr
_acmdln
longjmp
_unlock
free
vfprintf
__getmainargs
calloc
_write
memcpy
memmove
signal
strchr
_beginthreadex
_initterm
__set_app_type
strcmp
_ftime
_iob
Number of PE resources by type
RT_ICON 2
RT_GROUP_ICON 1
DLL 1
Number of PE resources by language
ENGLISH US 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
4.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:10:17 08:12:59-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
91648

LinkerVersion
2.23

FileTypeExtension
exe

InitializedDataSize
387072

ImageFileCharacteristics
No relocs, Executable, No line numbers, 32-bit

EntryPoint
0x14e0

OSVersion
4.0

ImageVersion
1.0

UninitializedDataSize
1536

Execution parents
File identification
MD5 4fdefb3ce031161a7e55762168bb4eb9
SHA1 95c5628e52dd7d4461e18b44a2634a34a7f52fb5
SHA256 67fccd872795a7e1bef8b0077bc09dd67d4c3a3f5b1720ac0df77b3fb94aa96e
ssdeep
12288:VZgA1+HrQccsJRbdlRu0XD8MLS5nowWnMKyvO+KMMbG9:PIRbdpX6iMK6OdMMbG9

authentihash 2bdb1d3483b1169cb0eb23d1c98988165e34c561a6356efc11fe70e2aff8632e
imphash f0dbb8d9408a7100c43bf916cc75aec2
File size 536.9 KB ( 549823 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (45.0%)
Microsoft Visual C++ compiled executable (generic) (26.9%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-10-17 16:29:46 UTC ( 5 months ago )
Last submission 2018-10-29 07:26:51 UTC ( 4 months, 3 weeks ago )
File names pro.any
4fdefb3ce031161a7e55762168bb4eb9
tpbfo.exe
fhgtpk.exe
<SAMPLE.EXE>
csgpzy.exe
wnzsyb.exe
sxtz.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections