× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6ef11c6c533e17311684a0c453905da935545ffef1b5c00e8166c22b1af5375d
File name: output.113046242.txt
Detection ratio: 47 / 68
Analysis date: 2018-04-10 00:21:04 UTC ( 10 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30487375 20180409
AegisLab Troj.Spy.W32.Ursnif!c 20180409
AhnLab-V3 Trojan/Win32.Agent.C2445877 20180409
ALYac Trojan.GenericKD.30487375 20180409
Antiy-AVL Trojan[Spy]/Win32.Ursnif 20180409
Arcabit Trojan.Generic.D1D1334F 20180409
Avast Win32:Malware-gen 20180409
AVG Win32:Malware-gen 20180409
Avira (no cloud) TR/AD.Ursnif.sgcmf 20180409
AVware Trojan.Win32.Generic!BT 20180409
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9897 20180409
BitDefender Trojan.GenericKD.30487375 20180409
CAT-QuickHeal Trojan.IGENERIC 20180410
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20170201
Cylance Unsafe 20180410
DrWeb Trojan.PWS.Banker1.27280 20180409
Emsisoft Trojan.GenericKD.30487375 (B) 20180409
Endgame malicious (high confidence) 20180403
ESET-NOD32 a variant of Win32/Kryptik.GEXV 20180410
F-Secure Trojan.GenericKD.30487375 20180409
Fortinet W32/Ursnif.GEXV!tr 20180409
GData Trojan.GenericKD.30487375 20180409
Ikarus Trojan.Win32.Krypt 20180409
K7AntiVirus Trojan ( 0052be7b1 ) 20180409
K7GW Trojan ( 0052be7b1 ) 20180409
Kaspersky Trojan-Spy.Win32.Ursnif.yla 20180409
Malwarebytes Backdoor.Agent 20180409
MAX malware (ai score=98) 20180410
McAfee Generic.dre 20180409
McAfee-GW-Edition Generic.dre 20180409
Microsoft Trojan:Win32/Tiggre!rfn 20180409
eScan Trojan.GenericKD.30487375 20180409
NANO-Antivirus Trojan.Win32.Ursnif.ezfonf 20180409
Palo Alto Networks (Known Signatures) generic.ml 20180410
Panda Trj/RnkBend.A 20180409
Qihoo-360 Trojan.Generic 20180410
Sophos AV Mal/Generic-S 20180410
Symantec Trojan.Gen.2 20180410
Tencent Win32.Trojan-spy.Ursnif.Ednw 20180410
TrendMicro TSPY_URSNIF.TIBAIBE 20180410
TrendMicro-HouseCall TSPY_URSNIF.TIBAIBE 20180410
VBA32 TrojanSpy.Ursnif 20180409
VIPRE Trojan.Win32.Generic!BT 20180410
ViRobot Trojan.Win32.S.Agent.1092096.B 20180409
Webroot W32.Trojan.Emotet 20180410
Yandex TrojanSpy.Ursnif!1UPwXYU43zc 20180408
ZoneAlarm by Check Point Trojan-Spy.Win32.Ursnif.yla 20180409
Alibaba 20180409
Avast-Mobile 20180409
Bkav 20180409
ClamAV 20180409
CMC 20180409
Comodo 20180409
Cybereason 20180225
Cyren 20180409
eGambit 20180410
F-Prot 20180409
Sophos ML 20180121
Jiangmin 20180409
Kingsoft 20180410
nProtect 20180409
Rising 20180410
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180410
Symantec Mobile Insight 20180406
TheHacker 20180404
TotalDefense 20180410
Trustlook 20180410
WhiteArmor 20180408
Zillya 20180409
Zoner 20180409
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
ABIS Plant

Product Strange Paper
File version 5, 0, 2568, 8971
Description Strange Paper
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-03-27 17:09:51
Entry Point 0x0002E651
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegCreateKeyW
SetBkMode
MoveToEx
IntersectClipRect
ImmReleaseContext
ImmSetCompositionFontW
ImmNotifyIME
ImmGetCompositionStringW
ImmGetContext
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetLocaleInfoW
GetModuleFileNameW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleHandleW
RtlUnwind
FindFirstChangeNotificationW
IsProcessorFeaturePresent
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
WriteProfileStringA
UnhandledExceptionFilter
GetCommandLineW
GetCPInfo
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
SetStdHandle
RaiseException
WideCharToMultiByte
LoadLibraryW
TlsFree
GetSystemDirectoryW
ReadFile
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetProcAddress
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
OutputDebugStringW
SetLastError
CreateFileW
VirtualFree
TlsGetValue
Sleep
GetFileType
ReadConsoleW
TlsSetValue
EncodePointer
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
WriteConsoleW
ResetEvent
PathIsNetworkPathW
PathCombineW
PathFindFileNameW
PathIsFileSpecW
PathFindNextComponentW
GetCursorPos
SetFocus
CallWindowProcW
GetClassNameW
SendMessageW
CheckRadioButton
IntersectRect
RegisterClassExW
SetClipboardData
SendDlgItemMessageW
InflateRect
AppendMenuW
GetFocus
CheckMenuItem
CheckMenuRadioItem
SetForegroundWindow
LoadImageW
IsWindowEnabled
ExitWindowsEx
DispatchMessageW
GetClassInfoExW
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CLSIDFromString
Number of PE resources by type
RT_ICON 10
YO 1
STRETC 1
RT_MANIFEST 1
CAPITA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.0.2568.8971

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Strange Paper

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
890880

EntryPoint
0x2e651

MIMEType
application/octet-stream

LegalCopyright
ABIS Plant

FileVersion
5, 0, 2568, 8971

TimeStamp
2014:03:27 18:09:51+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5, 0, 2568, 8971

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Unknown (0x4004)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Lay

CodeSize
267264

ProductName
Strange Paper

ProductVersionNumber
5.0.2568.8971

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 89c4828cdecfbe9c4e3a0ab3d5783b87
SHA1 5fda006ead91ca360159ff9968e48d825b16d288
SHA256 6ef11c6c533e17311684a0c453905da935545ffef1b5c00e8166c22b1af5375d
ssdeep
12288:hvo5SsIrbmJADqShcOYirw5He9B8vcacIStvl6i2RFExhNkHmiIdxeMELZ387NoP:hvo5E2qDZ9c+92DcR9or+PlxeMEVsJc

authentihash de3d96cfce59eb8e435517d6089cabb660964e128768021b3baf170abc8ebc97
imphash 89d1cb9305128f3a1224c160bd1360f4
File size 1.0 MB ( 1092096 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-03-27 22:51:22 UTC ( 10 months, 3 weeks ago )
Last submission 2018-04-17 11:51:09 UTC ( 10 months ago )
File names output.113046242.txt
eneken10.class
testv.php?l=eneken1.class
eneken4.class
eneken3.class
output.113046187.txt
31830.exe
eneken8.class
eneken7.class
eneken2.class
output.113046239.txt
eneken6.class
eneken5.class
eneken1.class
eneken9.class
(1).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!