× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 699b3de4678bed5c99336f4fed9674917491656c1062b5ee361b80dd565ebc92
File name: loader.exe
Detection ratio: 14 / 67
Analysis date: 2018-08-20 01:19:39 UTC ( 9 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180819
AVG FileRepMalware 20180820
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180818
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.365fdc 20180225
Cylance Unsafe 20180820
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
McAfee-GW-Edition BehavesLike.Win32.Generic.ch 20180819
Microsoft Trojan:Win32/Vigorf.A 20180819
Rising Malware.Obscure/Heur!1.9E03 (CLASSIC) 20180820
Symantec ML.Attribute.HighConfidence 20180819
VBA32 Malware-Cryptor.Limpopo 20180817
Webroot W32.Adware.Installcore 20180820
Ad-Aware 20180820
AegisLab 20180819
AhnLab-V3 20180819
Alibaba 20180713
ALYac 20180819
Antiy-AVL 20180820
Arcabit 20180819
Avast-Mobile 20180819
Avira (no cloud) 20180819
AVware 20180819
Babable 20180725
BitDefender 20180819
Bkav 20180817
CAT-QuickHeal 20180819
ClamAV 20180819
CMC 20180817
Comodo 20180819
Cyren 20180819
DrWeb 20180819
eGambit 20180820
Emsisoft 20180820
ESET-NOD32 20180819
F-Prot 20180820
F-Secure 20180820
Fortinet 20180820
GData 20180819
Ikarus 20180819
Jiangmin 20180819
K7AntiVirus 20180819
K7GW 20180819
Kaspersky 20180820
Kingsoft 20180820
Malwarebytes 20180820
MAX 20180820
McAfee 20180820
eScan 20180820
NANO-Antivirus 20180819
Palo Alto Networks (Known Signatures) 20180820
Panda 20180819
Qihoo-360 20180820
SentinelOne (Static ML) 20180701
Sophos AV 20180820
SUPERAntiSpyware 20180819
Symantec Mobile Insight 20180814
TACHYON 20180819
Tencent 20180820
TheHacker 20180818
TrendMicro 20180820
TrendMicro-HouseCall 20180820
Trustlook 20180820
VIPRE 20180820
ViRobot 20180819
Yandex 20180818
Zillya 20180817
ZoneAlarm by Check Point 20180820
Zoner 20180819
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-19 18:54:04
Entry Point 0x00005F30
Number of sections 5
PE sections
PE imports
SetSecurityDescriptorDacl
InitiateSystemShutdownA
GetUserNameW
SetSecurityDescriptorControl
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetSecurityDescriptorLength
GetGraphicsMode
GetNativeSystemInfo
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetComputerNameExA
TerminateThread
GetModuleFileNameW
GetConsoleCP
GetExitCodeProcess
QueryPerformanceCounter
HeapAlloc
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
HeapSize
RtlUnwind
GetACP
DeleteCriticalSection
SetProcessWorkingSetSize
GetProcessIoCounters
CompareFileTime
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
GetUserDefaultLCID
EnumSystemLocalesW
WideCharToMultiByte
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetStartupInfoW
SetFilePointerEx
GetFileInformationByHandle
GetCommandLineA
GetProcAddress
EncodePointer
GetLocaleInfoW
GetTempPathA
SetStdHandle
lstrcpyW
RaiseException
GetCPInfo
TlsFree
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
ReadFile
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
IsProcessorFeaturePresent
GetProcessWorkingSetSize
IsValidLocale
DuplicateHandle
HeapReAlloc
DecodePointer
GetModuleHandleW
GetOEMCP
IsDebuggerPresent
GetFileType
TerminateProcess
GetProcessAffinityMask
GetModuleFileNameA
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
CreateFileW
TlsGetValue
Sleep
SetLastError
ReadConsoleW
TlsSetValue
GetProcessTimes
GetCurrentThreadId
GetProcessHeap
LocalAlloc
WriteConsoleW
LeaveCriticalSection
ReleaseDC
ShowScrollBar
SetScrollRange
SetPropA
EndPaint
BeginPaint
GetScrollRange
EnableScrollBar
GetPropA
GetDC
WinHttpSetOption
WinHttpConnect
WinHttpCloseHandle
WinHttpCreateUrl
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
BELARUSIAN DEFAULT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
380928

EntryPoint
0x5f30

MIMEType
application/octet-stream

TimeStamp
2018:08:19 20:54:04+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
tgathryj.exe

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Unknown (0x40534)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
96768

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ef4cc8223d973fc4601f819049a0e380
SHA1 a7d7dcf365fdcc8d1abf0324a4a0a9ee3d74cd7c
SHA256 699b3de4678bed5c99336f4fed9674917491656c1062b5ee361b80dd565ebc92
ssdeep
3072:8n1dbMpR1ZdvBak3eDcE+TERo5UM5IxH9sNmtL0p8O6q94LpX:81h019ak67e5sH9omt6l6qU

authentihash a9ab81c19d39c7cd43363aae362a23e3e8490b90d0aadd78c9ed05b9e767e406
imphash e7ca90830ddbb7779e9ae91118b2d6b0
File size 181.0 KB ( 185344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (40.0%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-20 01:19:39 UTC ( 9 months ago )
Last submission 2018-08-20 01:19:39 UTC ( 9 months ago )
File names loader.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs