× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6ef11c6c533e17311684a0c453905da935545ffef1b5c00e8166c22b1af5375d
File name: output.113046187.txt
Detection ratio: 47 / 66
Analysis date: 2018-04-06 03:05:50 UTC ( 10 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30487375 20180405
AegisLab Troj.Spy.W32.Ursnif!c 20180406
AhnLab-V3 Trojan/Win32.Agent.C2445877 20180406
ALYac Trojan.GenericKD.30487375 20180405
Antiy-AVL Trojan[Spy]/Win32.Ursnif 20180405
Arcabit Trojan.Generic.D1D1334F 20180405
Avast Win32:Malware-gen 20180405
AVG Win32:Malware-gen 20180405
Avira (no cloud) TR/AD.Ursnif.sgcmf 20180405
AVware Trojan.Win32.Generic!BT 20180405
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9897 20180404
BitDefender Trojan.GenericKD.30487375 20180405
CAT-QuickHeal Trojan.IGENERIC 20180405
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20170201
Cylance Unsafe 20180406
Cyren W32/Trojan.TOFH-5964 20180405
DrWeb Trojan.PWS.Banker1.27280 20180405
Emsisoft Trojan.GenericKD.30487375 (B) 20180405
Endgame malicious (high confidence) 20180402
ESET-NOD32 a variant of Win32/Kryptik.GEXV 20180406
F-Secure Trojan.GenericKD.30487375 20180405
Fortinet W32/Ursnif.GEXV!tr 20180406
GData Trojan.GenericKD.30487375 20180405
Ikarus Trojan.Win32.Krypt 20180405
K7AntiVirus Trojan ( 0052be7b1 ) 20180404
K7GW Trojan ( 0052be7b1 ) 20180405
Kaspersky Trojan-Spy.Win32.Ursnif.yla 20180406
Malwarebytes Backdoor.Agent 20180405
MAX malware (ai score=98) 20180406
McAfee Generic.dre 20180406
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.th 20180405
Microsoft Trojan:Win32/Tiggre!rfn 20180405
eScan Trojan.GenericKD.30487375 20180406
NANO-Antivirus Trojan.Win32.Ursnif.ezfonf 20180405
Palo Alto Networks (Known Signatures) generic.ml 20180406
Panda Trj/RnkBend.A 20180405
Qihoo-360 Trojan.Generic 20180406
Sophos AV Mal/Generic-S 20180406
Symantec Trojan.Gen.2 20180405
Tencent Win32.Trojan-spy.Ursnif.Ednw 20180406
TrendMicro TSPY_URSNIF.TIBAIBE 20180405
TrendMicro-HouseCall TSPY_URSNIF.TIBAIBE 20180406
VBA32 TrojanSpy.Ursnif 20180405
VIPRE Trojan.Win32.Generic!BT 20180406
ViRobot Trojan.Win32.S.Agent.1092096.B 20180405
Yandex TrojanSpy.Ursnif!1UPwXYU43zc 20180405
ZoneAlarm by Check Point Trojan-Spy.Win32.Ursnif.yla 20180405
Alibaba 20180404
Avast-Mobile 20180405
Bkav 20180405
ClamAV 20180405
CMC 20180405
Comodo 20180406
Cybereason None
eGambit 20180406
F-Prot 20180406
Sophos ML 20180120
Jiangmin 20180406
Kingsoft 20180406
nProtect 20180406
Rising 20180406
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180405
Symantec Mobile Insight 20180401
TheHacker 20180404
TotalDefense 20180405
Trustlook 20180406
WhiteArmor 20180405
Zillya 20180405
Zoner 20180405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
ABIS Plant

Product Strange Paper
File version 5, 0, 2568, 8971
Description Strange Paper
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-03-27 17:09:51
Entry Point 0x0002E651
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegCreateKeyW
SetBkMode
MoveToEx
IntersectClipRect
ImmReleaseContext
ImmSetCompositionFontW
ImmNotifyIME
ImmGetCompositionStringW
ImmGetContext
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetLocaleInfoW
GetModuleFileNameW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleHandleW
RtlUnwind
FindFirstChangeNotificationW
IsProcessorFeaturePresent
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
WriteProfileStringA
UnhandledExceptionFilter
GetCommandLineW
GetCPInfo
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
SetStdHandle
RaiseException
WideCharToMultiByte
LoadLibraryW
TlsFree
GetSystemDirectoryW
ReadFile
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetProcAddress
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
SetLastError
CreateFileW
VirtualFree
TlsGetValue
Sleep
GetFileType
ReadConsoleW
TlsSetValue
EncodePointer
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
WriteConsoleW
ResetEvent
PathIsNetworkPathW
PathCombineW
PathFindFileNameW
PathIsFileSpecW
PathFindNextComponentW
GetCursorPos
SetFocus
CallWindowProcW
GetClassNameW
SendMessageW
CheckRadioButton
IntersectRect
RegisterClassExW
SetClipboardData
SendDlgItemMessageW
InflateRect
AppendMenuW
GetFocus
CheckMenuItem
CheckMenuRadioItem
SetForegroundWindow
LoadImageW
IsWindowEnabled
ExitWindowsEx
DispatchMessageW
GetClassInfoExW
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CLSIDFromString
Number of PE resources by type
RT_ICON 10
YO 1
STRETC 1
RT_MANIFEST 1
CAPITA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.0.2568.8971

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Strange Paper

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
890880

EntryPoint
0x2e651

MIMEType
application/octet-stream

LegalCopyright
ABIS Plant

FileVersion
5, 0, 2568, 8971

TimeStamp
2014:03:27 18:09:51+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5, 0, 2568, 8971

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Unknown (0x4004)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Lay

CodeSize
267264

ProductName
Strange Paper

ProductVersionNumber
5.0.2568.8971

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 89c4828cdecfbe9c4e3a0ab3d5783b87
SHA1 5fda006ead91ca360159ff9968e48d825b16d288
SHA256 6ef11c6c533e17311684a0c453905da935545ffef1b5c00e8166c22b1af5375d
ssdeep
12288:hvo5SsIrbmJADqShcOYirw5He9B8vcacIStvl6i2RFExhNkHmiIdxeMELZ387NoP:hvo5E2qDZ9c+92DcR9or+PlxeMEVsJc

authentihash de3d96cfce59eb8e435517d6089cabb660964e128768021b3baf170abc8ebc97
imphash 89d1cb9305128f3a1224c160bd1360f4
File size 1.0 MB ( 1092096 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-27 22:51:22 UTC ( 10 months, 3 weeks ago )
Last submission 2018-04-17 11:51:09 UTC ( 10 months ago )
File names output.113046242.txt
eneken10.class
testv.php?l=eneken1.class
eneken4.class
eneken3.class
output.113046187.txt
31830.exe
eneken8.class
eneken7.class
eneken2.class
output.113046239.txt
eneken6.class
eneken5.class
eneken1.class
eneken9.class
(1).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!