× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 76d33629d65fcd3e7df809b04096db68ef60b4ae57cb7ee55b95675cc9df5c26
File name: de345a11dcd9d0b40ac7021be3082973
Detection ratio: 40 / 68
Analysis date: 2018-10-30 18:53:18 UTC ( 5 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Strictor.176111 20181030
AhnLab-V3 Trojan/Win32.Gandcrab.R241226 20181030
ALYac Gen:Variant.Strictor.176111 20181030
Antiy-AVL Trojan/Win32.Vigorf 20181030
Arcabit Trojan.Strictor.D2AFEF 20181030
Avast Win32:MalwareX-gen [Trj] 20181030
AVG Win32:MalwareX-gen [Trj] 20181030
BitDefender Gen:Variant.Strictor.176111 20181030
CrowdStrike Falcon (ML) malicious_confidence_80% (W) 20181022
Cybereason malicious.1dcd9d 20180225
Cylance Unsafe 20181030
DrWeb Trojan.IcedID.13 20181030
Emsisoft Gen:Variant.Strictor.176111 (B) 20181030
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GLZY 20181030
F-Secure Gen:Variant.Strictor.176111 20181030
Fortinet W32/Kryptik.GMAD!tr 20181030
GData Gen:Variant.Strictor.176111 20181030
Sophos ML heuristic 20180717
Jiangmin TrojanSpy.Stealer.lk 20181030
K7AntiVirus Trojan ( 00516fdf1 ) 20181030
K7GW Trojan ( 00516fdf1 ) 20181030
Kaspersky Trojan-Banker.Win32.Jimmy.and 20181030
Malwarebytes Trojan.MalPack.GS 20181030
MAX malware (ai score=82) 20181030
McAfee Trojan-FPST!DE345A11DCD9 20181030
McAfee-GW-Edition BehavesLike.Win32.MultiPlug.ch 20181030
Microsoft Trojan:Win32/Gandcrab.AF 20181030
eScan Gen:Variant.Strictor.176111 20181030
NANO-Antivirus Trojan.Win32.Coins.fjqcyy 20181030
Panda Trj/GdSda.A 20181030
Qihoo-360 Win32/Trojan.IM.ff7 20181030
Rising Downloader.Vigorf!8.F626 (RDM+:cmRtazqOxoTNA0RxgbmsgYj64XKI) 20181030
Sophos AV Mal/Generic-S 20181030
Symantec Packed.Generic.525 20181029
TrendMicro TROJ_GEN.R055C0DJU18 20181030
TrendMicro-HouseCall TROJ_GEN.R055C0DJU18 20181030
VBA32 BScope.TrojanDownloader.Vigorf 20181030
Webroot W32.Adware.Installcore 20181030
ZoneAlarm by Check Point Trojan-Banker.Win32.Jimmy.and 20181030
AegisLab 20181030
Alibaba 20180921
Avast-Mobile 20181030
Avira (no cloud) 20181030
Babable 20180918
Baidu 20181030
Bkav 20181030
CAT-QuickHeal 20181028
ClamAV 20181030
CMC 20181030
Cyren 20181030
eGambit 20181030
F-Prot 20181030
Ikarus 20181030
Kingsoft 20181030
Palo Alto Networks (Known Signatures) 20181030
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181029
Symantec Mobile Insight 20181030
TACHYON 20181030
Tencent 20181030
TheHacker 20181025
TotalDefense 20181030
Trustlook 20181030
VIPRE 20181030
ViRobot 20181030
Yandex 20181030
Zillya 20181030
Zoner 20181030
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-30 03:59:19
Entry Point 0x00001FE4
Number of sections 5
PE sections
PE imports
GetSystemTime
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryA
LoadLibraryW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
ExitProcess
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
WriteConsoleA
FindFirstChangeNotificationW
HeapAlloc
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetConsoleOutputCP
WriteConsoleW
GetCommandLineW
GetCurrentDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetProcAddress
AddAtomW
HeapSize
SetStdHandle
SetFilePointer
RaiseException
GetCPInfo
GetModuleFileNameW
GetStringTypeA
GetModuleHandleA
GetSystemTimeAsFileTime
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CloseHandle
GetMailslotInfo
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TlsFree
TerminateProcess
FindCloseChangeNotification
QueryPerformanceCounter
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
WriteConsoleOutputCharacterA
GetEnvironmentStringsW
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetCurrentProcessId
SetLastError
InterlockedIncrement
ExtractIconW
ValidateRect
RegisterClassExW
PeekMessageA
GetThreadDesktop
GetMonitorInfoA
Number of PE resources by type
RT_DIALOG 1
RT_ICON 1
RT_STRING 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
KAZAK DEFAULT 3
ENGLISH US 3
ENGLISH NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
67584

EntryPoint
0x1fe4

MIMEType
application/octet-stream

FileVersion
1.0.0.2

TimeStamp
2018:03:29 20:59:19-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
tazks.exe

ProductVersion
1.0.0.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Unknown (0x40534)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
97792

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 de345a11dcd9d0b40ac7021be3082973
SHA1 02d4168ac67120315a1ea341710ed8118b5e21c7
SHA256 76d33629d65fcd3e7df809b04096db68ef60b4ae57cb7ee55b95675cc9df5c26
ssdeep
3072:qLYy9PbQyM+JKPBi6qB7g5DyE+Bp+UBW72503G4Lr:qLRbAGO5Fg9Wb3

authentihash add34c02b32b34d830b45dbc7015a697e614aeda41090a09318846196201fa66
imphash 6aa57117ac8eab1dc21cf66ddf478575
File size 154.5 KB ( 158208 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-30 18:53:18 UTC ( 5 months, 3 weeks ago )
Last submission 2018-10-30 18:53:18 UTC ( 5 months, 3 weeks ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs