× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 767741ca17caa9e00736c96a0a7d11eed12b6694c6f7c0972ba2f6ce263e29e7
File name: mb.jpg
Detection ratio: 18 / 70
Analysis date: 2019-02-06 18:02:51 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
AVG FileRepMalware 20190206
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181023
Cylance Unsafe 20190206
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPLG 20190206
Ikarus Trojan.Crypt 20190206
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190206
McAfee GenericRXGX-UZ!8087817BDEFE 20190206
Microsoft Trojan:Win32/Azden.A!cl 20190206
Palo Alto Networks (Known Signatures) generic.ml 20190206
Rising Trojan.Kryptik!8.8/N3#76% (RDM+:cmRtazo8jB3YL1hEw4SBvgWb1E7k) 20190206
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ML.Attribute.HighConfidence 20190206
Trapmine malicious.high.ml.score 20190123
VBA32 BScope.TrojanPSW.Azorult 20190206
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190206
Ad-Aware 20190206
AegisLab 20190206
AhnLab-V3 20190206
Alibaba 20180921
ALYac 20190206
Antiy-AVL 20190206
Arcabit 20190206
Avast 20190206
Avast-Mobile 20190206
Avira (no cloud) 20190206
Babable 20180918
Baidu 20190202
BitDefender 20190206
Bkav 20190201
CAT-QuickHeal 20190206
ClamAV 20190206
CMC 20190206
Comodo 20190206
Cybereason 20190109
Cyren 20190206
DrWeb 20190206
eGambit 20190206
Emsisoft 20190206
F-Prot 20190206
F-Secure 20190206
Fortinet 20190206
GData 20190206
Jiangmin 20190206
K7AntiVirus 20190206
K7GW 20190206
Kingsoft 20190206
Malwarebytes 20190206
MAX 20190206
McAfee-GW-Edition 20190206
eScan 20190206
NANO-Antivirus 20190206
Panda 20190206
Qihoo-360 20190206
Sophos AV 20190206
SUPERAntiSpyware 20190130
TACHYON 20190206
Tencent 20190206
TheHacker 20190203
TotalDefense 20190206
TrendMicro 20190206
TrendMicro-HouseCall 20190206
Trustlook 20190206
ViRobot 20190206
Webroot 20190206
Yandex 20190206
Zillya 20190206
Zoner 20190206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
China Internet Plus Holding Copyright ©.

Product T1 Sqlmaxrows
Description Getroot Software Addsubscription Com3
Comments Getroot Software Addsubscription Com3
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-04 13:12:49
Entry Point 0x000219D6
Number of sections 6
PE sections
PE imports
GetTokenInformation
CreateToolbarEx
Ord(17)
CertGetNameStringA
GetTextMetricsW
SetMapMode
GetSystemPaletteEntries
PatBlt
SetDeviceGammaRamp
EnumFontsA
GetDeviceCaps
GetMapMode
PtInRegion
ChoosePixelFormat
RealizePalette
CreateSolidBrush
CreateEllipticRgn
DescribePixelFormat
CreatePalette
SetViewportOrgEx
SelectPalette
UnrealizeObject
SetArcDirection
SetPixelFormat
SelectClipRgn
CreateCompatibleDC
SwapBuffers
ScaleViewportExtEx
SelectObject
PtVisible
BeginPath
DeleteObject
gluPerspective
GetStdHandle
GetOverlappedResult
WaitForSingleObject
SetEndOfFile
EncodePointer
DisconnectNamedPipe
GetCurrentProcess
GetConsoleMode
UnhandledExceptionFilter
FreeEnvironmentStringsW
InitializeSListHead
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
FindClose
TlsGetValue
GetFullPathNameW
SetLastError
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
HeapSetInformation
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
CreateThread
DeleteCriticalSection
SetUnhandledExceptionFilter
ReadFile
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
VirtualQuery
ReadConsoleW
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetOEMCP
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
RtlUnwind
FreeLibrary
GetStartupInfoW
GetUserDefaultLCID
SetFileInformationByHandle
GetProcessHeap
CompareStringW
FindFirstFileExA
ResetEvent
FindNextFileA
IsValidLocale
GetProcAddress
CreateEventW
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
GetEnvironmentStringsW
WaitForSingleObjectEx
Module32FirstW
GetCurrentProcessId
GetCommandLineW
GetCPInfo
HeapSize
GetCommandLineA
RaiseException
TlsFree
GetModuleHandleA
Module32NextW
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
VirtualAlloc
glPopMatrix
wglCreateContext
glFlush
glBegin
glColor4f
glVertexPointer
glDrawArrays
glEnable
glClear
glScalef
glRotatef
glLoadIdentity
glColorMaterial
wglGetProcAddress
glTranslatef
glShadeModel
glColor3f
wglMakeCurrent
glVertex3f
glViewport
glEnableClientState
wglDeleteContext
glPushMatrix
glMatrixMode
glEnd
glOrtho
PathFindFileNameA
GetMessageA
GetForegroundWindow
GetParent
UpdateWindow
EndDialog
BeginPaint
OffsetRect
PostQuitMessage
DefWindowProcA
ShowWindow
LoadBitmapA
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EndPaint
PostMessageA
AppendMenuW
TranslateMessage
GetDC
GetCursorPos
ReleaseDC
SetWindowTextA
LoadStringA
SendMessageA
CreateWindowExA
GetDlgItem
CreateDialogParamA
BringWindowToTop
RegisterClassA
InvalidateRect
GetWindowLongA
GetWindowTextLengthA
SetTimer
LoadCursorA
LoadIconA
GetSysColorBrush
GetSystemMenu
GetWindowTextA
DestroyWindow
WinHttpOpen
WinHttpConnect
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
setsockopt
socket
bind
inet_addr
WSAAsyncSelect
ioctlsocket
recvfrom
htons
closesocket
CreateItemMoniker
StgOpenStorage
PdhBrowseCountersA
Number of PE resources by type
RT_STRING 9
RT_CURSOR 9
RT_GROUP_CURSOR 6
RT_ICON 6
PNG 4
RT_BITMAP 3
RCDATA 1
RT_MANIFEST 1
TXT 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 42
PE resources
Debug information
ExifTool file metadata
CodeSize
296448

SubsystemVersion
5.1

Comments
Getroot Software Addsubscription Com3

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.3.47.5

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Getroot Software Addsubscription Com3

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
404992

EntryPoint
0x219d6

MIMEType
application/octet-stream

LegalCopyright
China Internet Plus Holding Copyright .

TimeStamp
2019:02:04 14:12:49+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
7.3.47.5

UninitializedDataSize
0

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
China Internet Plus Holding

LegalTrademarks
China Internet Plus Holding Copyright .

ProductName
T1 Sqlmaxrows

ProductVersionNumber
7.3.47.5

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 8087817bdefe860320dbe4a6ed7cdc93
SHA1 7475ddea7dda6eaa6edb0b8f0039f534b5ace3bf
SHA256 767741ca17caa9e00736c96a0a7d11eed12b6694c6f7c0972ba2f6ce263e29e7
ssdeep
12288:f1FTc361DbhhrD2k1bg/f94DKwH9Tm/wWKENceVWb+fbn+OJy:f3TnPg/f94DKwH9Tm2E1Dfg

authentihash 6bf7b7aee2864037a8a1e29920cce5eb0368ac98c2ef63c82444cfca2acc0411
imphash 2cf5b6e964ac1a2751df9cc7573e41a7
File size 686.0 KB ( 702464 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-06 15:43:28 UTC ( 3 months, 1 week ago )
Last submission 2019-02-15 10:13:21 UTC ( 3 months ago )
File names mb.jpg
767741ca17caa9e00736c96a0a7d11eed12b6694c6f7c0972ba2f6ce263e29e7.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!