× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 776bfe2536d5d8daa9fbd95ae15effccf57a25686024b583a08056b46079626f
File name: 776bfe2536d5d8daa9fbd95ae15effccf57a25686024b583a08056b46079626f
Detection ratio: 22 / 68
Analysis date: 2018-09-16 01:53:43 UTC ( 5 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180916
AVG FileRepMalware 20180916
CAT-QuickHeal Trojan.Emotet.X4 20180915
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180723
Cylance Unsafe 20180916
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.CLEU 20180915
Fortinet W32/GenKryptik.CLEU!tr 20180916
GData Win32.Trojan-Spy.Emotet.PTYWLN 20180916
Sophos ML heuristic 20180717
Kaspersky Trojan-Banker.Win32.Emotet.bdtg 20180916
McAfee RDN/Generic.grp 20180916
McAfee-GW-Edition BehavesLike.Win32.Fareit.fm 20180915
Microsoft Trojan:Win32/Emotet.AC!bit 20180915
Palo Alto Networks (Known Signatures) generic.ml 20180916
Qihoo-360 HEUR/QVM20.1.E2C5.Malware.Gen 20180916
Rising Trojan.Emotet!8.B95 (CLOUD) 20180916
SentinelOne (Static ML) static engine - malicious 20180830
Symantec ML.Attribute.HighConfidence 20180915
TrendMicro-HouseCall Suspicious_GEN.F47V0915 20180915
Webroot W32.Trojan.Emotet 20180916
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180915
Ad-Aware 20180913
AegisLab 20180916
AhnLab-V3 20180915
Alibaba 20180713
ALYac 20180916
Antiy-AVL 20180916
Arcabit 20180915
Avast-Mobile 20180915
Avira (no cloud) 20180915
AVware 20180916
Babable 20180907
Baidu 20180914
BitDefender 20180916
Bkav 20180915
ClamAV 20180915
CMC 20180915
Comodo 20180916
Cybereason 20180225
Cyren 20180916
DrWeb 20180916
eGambit 20180916
Emsisoft 20180916
F-Prot 20180916
F-Secure 20180916
Ikarus 20180915
Jiangmin 20180915
K7AntiVirus 20180915
K7GW 20180915
Kingsoft 20180916
Malwarebytes 20180916
MAX 20180916
eScan 20180916
NANO-Antivirus 20180915
Panda 20180915
Sophos AV 20180915
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180916
Tencent 20180916
TheHacker 20180914
TotalDefense 20180915
TrendMicro 20180915
Trustlook 20180916
VBA32 20180914
VIPRE 20180915
ViRobot 20180915
Yandex 20180915
Zillya 20180914
Zoner 20180915
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

Product Mozilla
Internal name uconv
File version Personal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-16 01:35:04
Entry Point 0x0001F0C7
Number of sections 6
PE sections
PE imports
ReadEncryptedFileRaw
TreeResetNamedSecurityInfoW
ObjectDeleteAuditAlarmW
CreateRestrictedToken
ChangeServiceConfig2A
RegSetValueW
DeleteAce
CryptGetHashParam
GetSecurityDescriptorLength
CM_Get_DevNode_Registry_PropertyW
PrintDlgExW
CryptUnregisterOIDFunction
CertCreateSelfSignCertificate
CryptHashCertificate
CertGetStoreProperty
CloseMetaFile
PaintRgn
CreateBitmap
GetTcpStatistics
GetAdaptersInfo
AddVectoredExceptionHandler
SetCommConfig
SetThreadPriority
GetFileSize
GetModuleHandleA
OutputDebugStringW
RaiseException
_lopen
GlobalFindAtomA
HeapAlloc
FoldStringW
FindFirstChangeNotificationA
PeekConsoleInputA
GetTickCount
ResumeThread
MprInfoDelete
MprAdminMIBEntryGetFirst
MprAdminInterfaceGetHandle
NetApiBufferSize
VARIANT_UserUnmarshal
SafeArrayDestroyDescriptor
RasEnumEntriesW
RasEnumConnectionsW
I_RpcAsyncAbortCall
RpcSmDestroyClientContext
RpcBindingToStringBindingA
UuidCreateSequential
RpcAsyncCompleteCall
SetupDiGetDriverInfoDetailA
SetupCloseLog
SetupDiGetClassInstallParamsW
StrCSpnIW
GetPriorityClipboardFormat
ReleaseDC
EnumThreadWindows
ShowWindowAsync
CreateIconFromResourceEx
GetClientRect
VerFindFileW
HttpSendRequestW
waveInGetPosition
mixerGetLineInfoW
XcvDataW
WintrustGetRegPolicyFlags
localeconv
MkParseDisplayName
GetClassFile
OleCreateEmbeddingHelper
PdhBrowseCountersW
PdhEnumObjectsW
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
258560

EntryPoint
0x1f0c7

MIMEType
application/octet-stream

LegalCopyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

FileVersion
Personal

TimeStamp
2018:09:16 03:35:04+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
uconv

ProductVersion
Personal

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mozilla, Netscape

LegalTrademarks
Mozilla, Netscape

ProductName
Mozilla

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 426b952cc3f0662b27c64a86b6aafa7b
SHA1 113d53cc041fbd25b1004f68493ff1b0d0cd6c1f
SHA256 776bfe2536d5d8daa9fbd95ae15effccf57a25686024b583a08056b46079626f
ssdeep
6144:Zyt7HSIdOn4ssoOYdgcmnk2f6gPQl/rRdGK9pJ/iARP8SPeei:AHSIw4ssK7gk2CgSr0Ad8xe

authentihash 29c8418661b6105cd73eccb7a893a0b8e6e0cbad3c9285138775163d63a2c125
imphash e35e4755fde06d136639bf3c895a05bb
File size 374.0 KB ( 382976 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-15 18:39:16 UTC ( 5 months ago )
Last submission 2018-09-15 18:39:16 UTC ( 5 months ago )
File names 29223384.exe
18278872.exe
321.exe
uconv
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs