× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 74d9be25fe247531af215951c87c0388b80c8c400cfdd0a3567637bf0d28224f
File name: SystemCheats-Injector.exe
Detection ratio: 44 / 66
Analysis date: 2017-12-31 01:35:11 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.MSILPerseus.127391 20171225
AegisLab Backdoor.W32.Generic!c 20171231
ALYac Gen:Variant.MSILPerseus.127391 20171231
Antiy-AVL Trojan[Backdoor]/Win32.AGeneric 20171230
Arcabit Trojan.MSILPerseus.D1F19F 20171230
Avast Win32:Malware-gen 20171230
AVG Win32:Malware-gen 20171230
Avira (no cloud) TR/Dropper.MSIL.tfcok 20171230
BitDefender Gen:Variant.MSILPerseus.127391 20171231
CAT-QuickHeal Backdoor.Generic 20171230
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cybereason malicious.1b8fb7 20171103
Cylance Unsafe 20171231
DrWeb Trojan.DownLoader18.40157 20171231
Emsisoft Gen:Variant.MSILPerseus.127391 (B) 20171230
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of MSIL/Kryptik.JKY 20171231
F-Secure Gen:Variant.MSILPerseus.127391 20171231
Fortinet MSIL/Kryptik.LKA!tr 20171231
GData Gen:Variant.MSILPerseus.127391 20171231
Ikarus Trojan.MSIL.Crypt 20171230
Sophos ML heuristic 20170914
Jiangmin Backdoor.Generic.almp 20171231
K7AntiVirus Trojan ( 0050fee01 ) 20171230
K7GW Trojan ( 0050fee01 ) 20171230
Kaspersky HEUR:Backdoor.Win32.Generic 20171230
MAX malware (ai score=99) 20171231
McAfee GenericRXDA-EO!CF81064229AF 20171231
McAfee-GW-Edition BehavesLike.Win32.Trojan.cc 20171230
Microsoft Trojan:Win32/Pynamer.A!ac 20171230
eScan Gen:Variant.MSILPerseus.127391 20171231
NANO-Antivirus Trojan.Win32.Kryptik.evqsfy 20171231
Palo Alto Networks (Known Signatures) generic.ml 20171231
Panda Trj/GdSda.A 20171230
Qihoo-360 HEUR/QVM03.0.9591.Malware.Gen 20171231
Rising Backdoor.Generic!8.CE (TFE:C:rz7VD9D0VKM) 20171230
SentinelOne (Static ML) static engine - malicious 20171224
Sophos AV Mal/Generic-S 20171231
Symantec Trojan.Gen 20171230
Tencent Win32.Backdoor.Generic.Tcbx 20171231
TrendMicro TROJ_GEN.R002C0PL117 20171230
TrendMicro-HouseCall TROJ_GEN.R002C0PL117 20171231
Webroot W32.Trojan.Gen 20171231
ZoneAlarm by Check Point HEUR:Backdoor.Win32.Generic 20171231
Alibaba 20171229
Avast-Mobile 20171230
AVware 20171231
Baidu 20171227
Bkav 20171229
ClamAV 20171230
CMC 20171229
Comodo 20171230
Cyren 20171230
eGambit 20171231
F-Prot 20171231
Kingsoft 20171231
Malwarebytes 20171231
nProtect 20171231
SUPERAntiSpyware 20171230
Symantec Mobile Insight 20171230
TheHacker 20171229
TotalDefense 20171230
Trustlook 20171231
VBA32 20171229
VIPRE 20171230
ViRobot 20171230
WhiteArmor 20171226
Yandex 20171229
Zillya 20171229
Zoner 20171230
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright HDLSim 2017

Product HDLSim
Original name HDLSim.exe
Internal name HDLSim.exe
File version 1.0.0.0
Description HDLSim
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-10-09 19:00:58
Entry Point 0x000D891E
Number of sections 3
.NET details
Module Version ID 51327354-983a-4ad3-918a-49b42a60b218
TypeLib ID 0fb9af84-252c-4ca0-9979-584a2f9faba6
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
2048

ImageVersion
0.0

ProductName
HDLSim

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
HDLSim

CharacterSet
Unicode

LinkerVersion
48.0

FileTypeExtension
exe

OriginalFileName
HDLSim.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.0

TimeStamp
2017:10:09 20:00:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
HDLSim.exe

ProductVersion
1.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright HDLSim 2017

MachineType
Intel 386 or later, and compatibles

CodeSize
879104

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0xd891e

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

Compressed bundles
File identification
MD5 cf81064229af3dab5135ce517edda0e4
SHA1 872b6ea44e92b0e483e77ad6776ba73851b22e6a
SHA256 74d9be25fe247531af215951c87c0388b80c8c400cfdd0a3567637bf0d28224f
ssdeep
24576:uE1qryZIeOL0BmMo9NP/5f2XViDYei2hQh:ULei0Bml91ZJDxfhQ

authentihash d6948fc30c8bf163d6b5e41e592ab718380e738e870e64666c20c2561a7acb68
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 861.0 KB ( 881664 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (82.9%)
Win32 Dynamic Link Library (generic) (7.4%)
Win32 Executable (generic) (5.1%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Tags
peexe assembly

VirusTotal metadata
First submission 2017-12-01 21:39:35 UTC ( 1 year, 3 months ago )
Last submission 2017-12-01 21:39:35 UTC ( 1 year, 3 months ago )
File names HDLSim.exe
SystemCheats-Injector.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!