× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6e748e99e864e4741156e9c47804bd64d04945be2115cdba2a3ca5668bd69f90
File name: 6E748E99E864E4741156E9C47804BD64D04945BE2115CDBA2A3CA5668BD69F90
Detection ratio: 18 / 70
Analysis date: 2018-12-28 05:39:50 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
Avast FileRepMalware 20181228
AVG FileRepMalware 20181228
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181228
Endgame malicious (high confidence) 20181108
Fortinet W32/Kryptik.GJCI!tr 20181228
Ikarus Trojan-Ransom.Crypted007 20181228
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20181228
Microsoft Ransom:Win32/Troldesh.A 20181228
Qihoo-360 HEUR/QVM20.1.2929.Malware.Gen 20181228
Rising Malware.Heuristic!ET#92% (RDM+:cmRtazqIpsianJO7wAaTk0fqlG25) 20181228
SentinelOne (Static ML) static engine - malicious 20181223
Symantec Ransom.Troldesh 20181227
Trapmine malicious.high.ml.score 20181205
VBA32 BScope.TrojanSpy.Ursnif 20181227
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181228
Ad-Aware 20181228
AegisLab 20181228
AhnLab-V3 20181227
Alibaba 20180921
ALYac 20181228
Antiy-AVL 20181228
Arcabit 20181228
Avast-Mobile 20181227
Avira (no cloud) 20181228
Babable 20180918
Baidu 20181207
BitDefender 20181228
Bkav 20181227
CAT-QuickHeal 20181227
ClamAV 20181228
CMC 20181228
Comodo 20181228
Cybereason 20180225
Cyren 20181228
DrWeb 20181228
eGambit 20181228
Emsisoft 20181228
ESET-NOD32 20181228
F-Prot 20181228
F-Secure 20181228
GData 20181228
Jiangmin 20181228
K7AntiVirus 20181227
K7GW 20181228
Kingsoft 20181228
Malwarebytes 20181228
MAX 20181228
McAfee 20181228
McAfee-GW-Edition 20181228
eScan 20181228
NANO-Antivirus 20181228
Palo Alto Networks (Known Signatures) 20181228
Panda 20181227
Sophos AV 20181228
SUPERAntiSpyware 20181226
Symantec Mobile Insight 20181225
TACHYON 20181228
Tencent 20181228
TheHacker 20181225
TrendMicro 20181228
TrendMicro-HouseCall 20181228
Trustlook 20181228
VIPRE 20181228
ViRobot 20181227
Webroot 20181228
Yandex 20181227
Zillya 20181227
Zoner 20181228
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Signature verification The digital signature of the object did not verify.
Signing date 7:34 AM 4/9/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-28 03:53:35
Entry Point 0x00002BB0
Number of sections 3
PE sections
Overlays
MD5 48224b7a45bd88422d980eb7b0bfb9cf
File type data
Offset 1074176
Size 3336
Entropy 7.35
PE imports
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExW
GetUserNameA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
CreateToolbarEx
InitCommonControlsEx
SelectObject
GetGlyphOutline
GetStockObject
GetTextMetricsA
Polyline
EndPath
FillPath
BeginPath
DeleteObject
CreateMetaFileW
GetStdHandle
WaitForSingleObject
HeapDestroy
GetTapeParameters
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
FreeEnvironmentStringsW
EnumTimeFormatsA
GetCPInfo
LoadLibraryW
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetThreadPriority
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
EnumDateFormatsA
SetLastError
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentThreadId
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
DeleteFileA
GetProcAddress
GetProcessHeap
CompareStringW
FindFirstFileA
lstrcpyA
CompareStringA
FindNextFileA
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
VirtualAllocEx
lstrlenA
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
CloseHandle
GetACP
GetModuleHandleW
FreeResource
SizeofResource
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
FindResourceA
VirtualAlloc
ExtractIconA
SHQueryRecycleBinW
ExtractAssociatedIconExW
SHPathPrepareForWriteA
SHPathPrepareForWriteW
SHLoadNonloadedIconOverlayIdentifiers
ShellExecuteExA
DuplicateIcon
ShellExecuteEx
ExtractIconEx
SHEmptyRecycleBinA
SHGetFileInfoW
SHGetIconOverlayIndexW
SHGetSpecialFolderPathA
ExtractAssociatedIconA
SHCreateProcessAsUserW
SHGetSpecialFolderPathW
SHGetDataFromIDListW
SHAddToRecentDocs
ExtractIconExA
SHGetFileInfo
DragQueryPoint
SHGetSpecialFolderLocation
ShellExecuteA
DoEnvironmentSubstW
StrStrA
StrCmpNW
StrStrIA
StrRChrW
StrChrIA
StrRStrIW
ChangeDisplaySettingsW
GetForegroundWindow
DestroyMenu
PostQuitMessage
SetWindowPos
GetClipboardViewer
IsWindow
DispatchMessageA
ScreenToClient
VkKeyScanA
GetDC
GetCursorPos
ReleaseDC
GetMenu
SendMessageA
GetClientRect
GetDlgItemTextW
GetWindowTextLengthA
CharToOemW
GetWindowTextA
ChangeDisplaySettingsA
DestroyWindow
GetMessageA
DdeDisconnectList
UpdateWindow
EqualRect
GetUserObjectInformationA
ShowWindow
DlgDirListComboBoxA
EnableWindow
CharUpperW
GetDlgItemTextA
CharToOemBuffW
IsCharAlphaA
TranslateMessage
GetWindow
CharUpperA
ActivateKeyboardLayout
GetIconInfo
LoadStringA
GetMenuItemRect
CharLowerA
GetWindowPlacement
MapVirtualKeyExA
InvalidateRgn
EnableMenuItem
RegisterClassA
OpenDesktopA
GetWindowLongA
CreateWindowExA
UnhookWinEvent
IsDialogMessageW
GetSysColorBrush
CreateWindowExW
EndPaint
GetWindowInfo
IsDialogMessageA
SetFocus
SendNotifyMessageA
GetKeyboardLayoutNameA
DdeAddData
BeginPaint
KillTimer
DefWindowProcA
ToAsciiEx
GetClipboardData
GetSystemMetrics
GetWindowRect
DrawEdge
EnumDisplayDevicesW
PostMessageA
CharLowerW
SetWindowLongA
PostMessageW
InvalidateRect
SetWindowTextA
CheckMenuItem
GetSubMenu
SetTimer
ClientToScreen
LoadCursorA
LoadIconA
TrackPopupMenu
GetMenuItemCount
GetMenuState
LoadIconW
SetForegroundWindow
LoadMenuA
CreateDialogIndirectParamA
MessageBeep
RemoveMenu
GetWindowThreadProcessId
BeginDeferWindowPos
MoveWindow
MessageBoxA
GetClassNameA
GetSysColor
IsWindowVisible
MonitorFromRect
wsprintfA
IsCharUpperA
CloseDesktop
CallWindowProcA
IsCharUpperW
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
CoTaskMemRealloc
CoCreateInstance
StgOpenStorage
CoFreeUnusedLibraries
CLSIDFromProgID
CoRegisterClassObject
StgCreateDocfile
CoGetMalloc
CoTaskMemFree
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:12:28 04:53:35+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
11776

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
1061376

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x2bb0

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 600414f647ea7e87eb12ea3039d07e7c
SHA1 33b3e4209f069b2f810911f49cde784473864c10
SHA256 6e748e99e864e4741156e9c47804bd64d04945be2115cdba2a3ca5668bd69f90
ssdeep
12288:Ni94bywx1Dj5+h7ZCn0P5T7lHDbIi9dszYjN5HbPiLsptcyx7tbFEujtgR:NHx13SZW0x5j5dsYnHeYpuyx7tx/tgR

authentihash 1df8086603862016dbe4559f9f16121e459542a0d2644f467135cd128f53dd05
imphash 954c3643b1eeaebc8777384b80e33052
File size 1.0 MB ( 1077512 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-12-28 04:29:13 UTC ( 3 months, 3 weeks ago )
Last submission 2018-12-30 06:56:34 UTC ( 3 months, 3 weeks ago )
File names output.114591102.txt
csrss.exe
output.114812938.txt
output.114577902.txt
sserv.jpg
output.114812946.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections