× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6c183cf32126483c718fb6f7e0b786ded6b49e02d9b096ffc436b540b7c95409
File name: d94fdfacb378db6d83fe326a877cce7c
Detection ratio: 48 / 68
Analysis date: 2019-02-25 16:17:11 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
Acronis suspicious 20190222
Ad-Aware Trojan.GenericKD.41031782 20190225
AhnLab-V3 Trojan/Win32.Emotet.R255752 20190225
ALYac Trojan.Agent.Emotet 20190225
Antiy-AVL Trojan/Win32.Agent 20190225
Avast Win32:TrojanX-gen [Trj] 20190225
AVG Win32:TrojanX-gen [Trj] 20190225
Avira (no cloud) TR/Crypt.Agent.cyvuq 20190225
BitDefender Trojan.GenericKD.41031782 20190225
ClamAV Win.Malware.Emotet-6862874-0 20190225
Comodo Malware@#3t2ecwd9ttoph 20190225
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.b517f2 20190109
Cylance Unsafe 20190225
Cyren W32/Agent.AWB.gen!Eldorado 20190225
eGambit Unsafe.AI_Score_99% 20190225
Emsisoft Trojan.GenericKD.41031782 (B) 20190225
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.GPUV 20190225
F-Secure Trojan.TR/Crypt.Agent.cyvuq 20190225
Fortinet W32/Kryptik.GPUV!tr 20190225
GData Trojan.GenericKD.41031782 20190225
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005481231 ) 20190225
K7GW Trojan ( 005481231 ) 20190225
Kaspersky Trojan.Win32.Agent.qwiciz 20190225
Malwarebytes Trojan.Emotet 20190225
MAX malware (ai score=84) 20190225
McAfee Emotet-FLY!D94FDFACB378 20190225
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20190225
Microsoft Trojan:Win32/Emotet.AC!bit 20190225
eScan Trojan.GenericKD.41031782 20190225
NANO-Antivirus Trojan.Win32.Kryptik.fnhfgm 20190225
Palo Alto Networks (Known Signatures) generic.ml 20190225
Panda Trj/GdSda.A 20190224
Qihoo-360 HEUR/QVM20.1.4C73.Malware.Gen 20190225
Rising Trojan.Kryptik!8.8 (CLOUD) 20190225
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190225
Symantec Trojan.Gen.2 20190225
TACHYON Trojan/W32.Agent.155648.CDX 20190225
Tencent Win32.Trojan.Agent.Wrgp 20190225
Trapmine malicious.high.ml.score 20190123
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THBAHAI 20190225
VBA32 BScope.Malware-Cryptor.Emotet 20190225
ViRobot Trojan.Win32.Z.Emotet.155648.DA 20190225
Webroot W32.Trojan.Emotet 20190225
ZoneAlarm by Check Point Trojan.Win32.Agent.qwiciz 20190225
AegisLab 20190225
Alibaba 20180921
Arcabit 20190225
Avast-Mobile 20190225
Babable 20180918
Baidu 20190215
CAT-QuickHeal 20190225
CMC 20190225
DrWeb 20190225
Jiangmin 20190225
Kingsoft 20190225
SUPERAntiSpyware 20190220
Symantec Mobile Insight 20190220
TheHacker 20190225
TotalDefense 20190225
TrendMicro 20190302
Trustlook 20190225
VIPRE 20190225
Yandex 20190222
Zillya 20190225
Zoner 20190225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights res

Product Microsoft® Windows® Operat
Original name mpg4dmo
Internal name mpg4
File version 6.1.7601.19091 (win7sp1_gdr.151
Description Windows Media MPE
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-13 20:26:08
Entry Point 0x00003398
Number of sections 5
PE sections
PE imports
LookupPrivilegeDisplayNameA
LogonUserW
GetWindowOrgEx
SetPixelV
GetCharWidthW
SetTextJustification
ExtCreatePen
GetClipBox
GetLayout
GetProcessId
CancelWaitableTimer
GlobalDeleteAtom
GetLargePageMinimum
VirtualAllocEx
GetStringTypeA
WriteProfileStringA
GetConsoleCursorInfo
GetCommandLineW
SetConsoleHistoryInfo
GetProcessVersion
GetCurrentProcess
DebugBreak
CloseHandle
GetProcessHandleCount
GetConsoleTitleA
GetTempPathA
GetVersion
SysFreeString
VarCyCmp
VarCyFromR8
LoadTypeLibEx
ExtractIconExW
Ord(29)
EnumerateSecurityPackagesW
GetScrollBarInfo
GetKeyNameTextA
GetTitleBarInfo
CreateIconIndirect
WindowFromPoint
UserHandleGrantAccess
GetMenuItemRect
DialogBoxParamA
GetDlgItemTextA
GetKeyboardType
DrawTextExA
GetKeyState
GetPrinterDataExW
fread
vfprintf
system
memset
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
131072

LinkerVersion
4.0

ImageVersion
6.0

FileSubtype
2

FileVersionNumber
5.1.2600.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Windows Media MPE

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x3398

OriginalFileName
mpg4dmo

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights res

FileVersion
6.1.7601.19091 (win7sp1_gdr.151

TimeStamp
1995:11:13 21:26:08+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
mpg4

ProductVersion
6.1.7601

SubsystemVersion
6.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporati

CodeSize
16384

ProductName
Microsoft Windows Operat

ProductVersionNumber
5.1.2600.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 d94fdfacb378db6d83fe326a877cce7c
SHA1 560ea54b517f21f8092f9e6ad14127396ef72d89
SHA256 6c183cf32126483c718fb6f7e0b786ded6b49e02d9b096ffc436b540b7c95409
ssdeep
3072:qED2qyigF1B/WuiplrU0Ujwk76XeuKGYq:q82qy5/B/LiplXNk76Ou8

authentihash 769e98fc91f0bcbb8a0391e6cffa49b322c61b50d035ad3378641ca2b3aed8a4
imphash 9655db905efdc6fa32b06f8b60050aaf
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-20 18:08:38 UTC ( 1 month, 3 weeks ago )
Last submission 2019-02-20 18:08:38 UTC ( 1 month, 3 weeks ago )
File names mpg4dmo
mpg4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!