× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 72beaafa00b3dbd308396c5f1aa8180ff71fc5222e10c8d45d6fbc3564c2ee1f
File name: a7bwWDBh.exe
Detection ratio: 21 / 67
Analysis date: 2018-11-26 19:20:35 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20181126
AVG FileRepMalware 20181126
Bkav HW32.Packed. 20181126
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.e79881 20180225
eGambit Unsafe.AI_Score_99% 20181126
Endgame malicious (high confidence) 20181108
Fortinet W32/GenKryptik.CRRV!tr 20181126
Sophos ML heuristic 20181108
Kaspersky UDS:DangerousObject.Multi.Generic 20181126
McAfee Emotet-FKM!A65430EE7988 20181126
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20181126
Microsoft Trojan:Win32/Emotet.AC!bit 20181126
Palo Alto Networks (Known Signatures) generic.ml 20181126
Qihoo-360 HEUR/QVM20.1.7842.Malware.Gen 20181126
Rising Malware.Heuristic!ET#89% (RDM+:cmRtazp/l6/DMLI2P222KONhrTA2) 20181126
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ML.Attribute.HighConfidence 20181126
Trapmine malicious.high.ml.score 20181126
Webroot W32.Trojan.Emotet 20181126
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181126
Ad-Aware 20181126
AegisLab 20181126
AhnLab-V3 20181126
Alibaba 20180921
ALYac 20181126
Antiy-AVL 20181126
Arcabit 20181126
Avast-Mobile 20181126
Avira (no cloud) 20181126
Babable 20180918
Baidu 20181126
BitDefender 20181126
CAT-QuickHeal 20181126
ClamAV 20181126
CMC 20181126
Comodo 20181126
Cylance 20181126
Cyren 20181126
DrWeb 20181126
Emsisoft 20181126
ESET-NOD32 20181126
F-Prot 20181126
F-Secure 20181126
GData 20181126
Ikarus 20181126
Jiangmin 20181126
K7AntiVirus 20181126
K7GW 20181126
Kingsoft 20181126
Malwarebytes 20181126
MAX 20181126
eScan 20181126
NANO-Antivirus 20181126
Panda 20181126
Sophos AV 20181126
SUPERAntiSpyware 20181121
Symantec Mobile Insight 20181121
TACHYON 20181126
Tencent 20181126
TheHacker 20181126
TrendMicro 20181126
TrendMicro-HouseCall 20181126
Trustlook 20181126
VBA32 20181126
ViRobot 20181126
Yandex 20181123
Zillya 20181126
Zoner 20181126
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Sort
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-11-19 14:43:13
Entry Point 0x00005070
Number of sections 6
PE sections
PE imports
GetLogColorSpaceA
GetTextExtentExPointA
GetMiterLimit
GetTextColor
GetPaletteEntries
GetFontLanguageInfo
GetSystemTime
GetQueuedCompletionStatus
FindResourceExA
GetThreadPriority
GetPrivateProfileStringA
GetOverlappedResult
WriteProfileStringA
GetSystemDefaultUILanguage
FindVolumeClose
GetTapeStatus
GetExitCodeProcess
GetVolumeInformationW
GlobalGetAtomNameA
GetCommandLineW
FreeConsole
FindFirstFileW
lstrcatW
GetCurrentThread
IsValidLanguageGroup
GetProcessAffinityMask
DeleteSecurityContext
GetUserNameExA
FreeCredentialsHandle
GetScrollRange
GetScrollPos
GetShellWindow
GetWindowRect
IsWindowEnabled
LoadKeyboardLayoutA
DestroyCaret
InsertMenuItemA
GetWindowRgn
GetDlgCtrlID
GetDoubleClickTime
IsZoomed
FindWindowW
DrawFocusRect
IsClipboardFormatAvailable
SetTimer
CountClipboardFormats
GetTopWindow
LoadImageA
GetCursor
GetFocus
DeregisterShellHookWindow
GetUrlCacheEntryInfoExA
GetUrlCacheEntryInfoW
GetPrinterDriverW
SCardGetProviderIdA
GetStandardColorSpaceProfileW
GetColorProfileHeader
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 1
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Sort

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x5070

MIMEType
application/octet-stream

TimeStamp
1995:11:19 14:43:13+00:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TVersion
1.0

CodeSize
20480

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 a65430ee79881e37e6f78bc6d4e1d39e
SHA1 517c5586c4267de405cbc2c5b5f31ae495fb0750
SHA256 72beaafa00b3dbd308396c5f1aa8180ff71fc5222e10c8d45d6fbc3564c2ee1f
ssdeep
3072:ytKqvOgeSJlPrrU1iTHB+/rgwmYc2cqDvQrA83x:yUqmxSJlP/Uiiguc2cOf8

authentihash c1819f33933c92f14d591c5593ad21a163a6663523e417720ec2806d39ff9495
imphash 579701a87579740fbe6695ae9b90d6cc
File size 140.0 KB ( 143360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-26 18:33:41 UTC ( 2 months, 3 weeks ago )
Last submission 2018-11-26 19:20:35 UTC ( 2 months, 3 weeks ago )
File names VblK7IoNeF.exe
mV1LIJwi6O.exe
ENATiXrCukj.exe
3zIYgPLKgz4A.exe
Q62oGcLf.exe
hNhp8eiR.exe
O9FsIRX0.exe
fWfVQkYV.exe
KRB6rJ2f.exe
IvcFS2EKN.exe
a7bwWDBh.exe
bFEtNJqum0.exe
WJjwG7tfOTBI.exe
81am01lW32iP.exe
hA9PJHIZE5Nu.exe
PWgqyLSNNFJg.exe
T0ClYwPFI.exe
XPipLGj8.exe
K8mhjsYgh.exe
TdTsf0oSF.exe
pwr4U3A1Tbh.exe
SDHEkEup.exe
aYlYBLwrgW6j.exe
2ddA8fzM.exe
yEcARdJGPCP.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.