× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7e62a5ca20cfb5da90fe7402f413321c9ede7e230e8b4fa2f1a4e516e8ae8e34
File name: Chrome Font v7.51.exe
Detection ratio: 47 / 59
Analysis date: 2017-03-11 04:48:05 UTC ( 2 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.134870 20170311
AegisLab Ml.Attribute.Gen!c 20170311
AhnLab-V3 Trojan/Win32.Spora.R196565 20170310
ALYac Trojan.Ransom.Spora 20170311
Antiy-AVL Trojan/Win32.TSGeneric 20170311
Arcabit Trojan.Razy.D20ED6 20170311
Avast Win32:Malware-gen 20170311
AVG Crypt7.HHR 20170311
Avira (no cloud) TR/Crypt.ZPACK.ikesc 20170311
AVware Trojan.Win32.Generic!BT 20170311
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170309
BitDefender Gen:Variant.Razy.134870 20170311
Bkav W32.Clod69b.Trojan.584e 20170311
CAT-QuickHeal Ransom.Exxroute.A4 20170310
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170130
Cyren W32/Trojan.UGQB-3754 20170311
DrWeb Trojan.PWS.Siggen1.62333 20170311
Emsisoft Trojan-Ransom.Spora (A) 20170311
Endgame malicious (high confidence) 20170222
ESET-NOD32 a variant of Win32/Kryptik.FONK 20170311
F-Prot W32/Ransom.JL 20170311
F-Secure Gen:Variant.Razy.134870 20170311
Fortinet W32/Kryptik.FOMG!tr 20170311
GData Gen:Variant.Razy.134870 20170311
Ikarus Trojan.Win32.Crypt 20170310
Invincea ddos.win32.nitol.a 20170203
Jiangmin Trojan.Generic.aswbk 20170311
K7AntiVirus Trojan ( 00505ef61 ) 20170310
K7GW Trojan ( 00505ef61 ) 20170310
Kaspersky HEUR:Trojan.Win32.Generic 20170311
Malwarebytes Ransom.Spora 20170311
McAfee RDN/Generic.hbg 20170311
McAfee-GW-Edition RDN/Generic.hbg 20170311
Microsoft Ransom:Win32/Spora!rfn 20170311
eScan Gen:Variant.Razy.134870 20170311
NANO-Antivirus Trojan.Win32.Kryptik.elsawc 20170311
Palo Alto Networks (Known Signatures) Virus/Win32.WGeneric.llnkl 20170311
Panda Trj/GdSda.A 20170309
Rising Malware.Generic.2!tfe (thunder:2:Rjnw1U3OqMR) 20170311
Sophos Mal/Generic-S 20170311
Symantec Trojan.Gen.2 20170310
Tencent Win32.Trojan.Raas.Auto 20170311
TrendMicro Ransom_SPORA.F117BK 20170311
VIPRE Trojan.Win32.Generic!BT 20170311
ViRobot Trojan.Win32.Z.Razy.77824.HB[h] 20170311
Yandex Trojan.Kryptik!j3KAtvaug9Y 20170309
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20170311
Alibaba 20170228
ClamAV 20170310
CMC 20170310
Comodo 20170311
Kingsoft 20170311
nProtect 20170311
Qihoo-360 20170311
SUPERAntiSpyware 20170311
TheHacker 20170308
Trustlook 20170311
VBA32 20170310
Webroot 20170311
WhiteArmor 20170303
Zillya 20170310
Zoner 20170311
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-10 01:21:04
Entry Point 0x000014B9
Number of sections 4
PE sections
PE imports
CDLocateRng
CDBuildVect
MD5Final
MD5Init
MD5Update
ReplaceFileA
GetShortPathNameW
SetEvent
TlsAlloc
RemoveDirectoryA
GetFileAttributesW
GetLocalTime
GetStartupInfoA
OpenFileMappingW
GetCurrentProcessId
GetCurrentDirectoryA
SetErrorMode
GetCommandLineA
GetProcAddress
GetThreadContext
CompareStringW
lstrcpyW
CreateSemaphoreA
SetEnvironmentVariableW
GetModuleHandleA
WriteFile
GetDiskFreeSpaceA
ReadConsoleA
lstrcmp
FindFirstVolumeA
OutputDebugStringW
OpenEventW
AddAtomW
LocalFileTimeToFileTime
FormatMessageA
CreateFileA
GetCurrentThreadId
SleepEx
CPDeriveKey
CPCreateHash
CPDecrypt
MessageBoxExA
DrawTextExW
DefDlgProcA
wsprintfW
GetWindowTextW
IsDialogMessageW
SetCursorPos
GetMessageW
DefWindowProcA
CharToOemA
PE exports
Number of PE resources by type
RT_VERSION 2
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:08:10 02:21:04+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
6.0

Warning
Possibly corrupt Version resource

FileTypeExtension
exe

InitializedDataSize
28672

SubsystemVersion
4.0

EntryPoint
0x14b9

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 6fc30d8a8d354f2a8128874cf84d0353
SHA1 17b1f74015b37beb1b5181b7116454063a59d085
SHA256 7e62a5ca20cfb5da90fe7402f413321c9ede7e230e8b4fa2f1a4e516e8ae8e34
ssdeep
768:mGaCcVwfqIcC+fkkQ3miL2X8TRay2TxaqFHH4A/xypfcKIZJD:mGLcmfqnFfe2iL2Mdn2TxfJH4A5mfq

authentihash 93528345ed5572df5fb09c371bd5319d6783ecc8fad2a650b29d85db1f533fb5
imphash f635bc15d21931d6a0849c1914f57fe5
File size 76.0 KB ( 77824 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.2%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-02-18 17:39:02 UTC ( 3 months, 1 week ago )
Last submission 2017-02-22 13:44:44 UTC ( 3 months ago )
File names Chrome Font v7.51.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications