× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7e62a5ca20cfb5da90fe7402f413321c9ede7e230e8b4fa2f1a4e516e8ae8e34
File name: Chrome Font v7.51.exe
Detection ratio: 9 / 59
Analysis date: 2017-02-18 17:39:02 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170217
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170130
Endgame malicious (high confidence) 20170217
Fortinet W32/Kryptik.FOMG!tr 20170218
Invincea ddos.win32.nitol.a 20170203
Malwarebytes Ransom.Spora 20170218
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20170218
Rising Malware.Generic.2!tfe (thunder:2:Rjnw1U3OqMR) 20170218
Symantec ML.Attribute.HighConfidence 20170217
Ad-Aware 20170218
AegisLab 20170218
AhnLab-V3 20170218
Alibaba 20170217
ALYac 20170218
Antiy-AVL 20170218
Arcabit 20170218
Avast 20170218
AVG 20170218
Avira (no cloud) 20170218
AVware 20170218
BitDefender 20170218
Bkav 20170218
CAT-QuickHeal 20170218
ClamAV 20170218
CMC 20170218
Comodo 20170218
Cyren 20170218
DrWeb 20170218
Emsisoft 20170218
ESET-NOD32 20170218
F-Prot 20170218
F-Secure 20170218
GData 20170218
Ikarus 20170218
Jiangmin 20170218
K7AntiVirus 20170218
K7GW 20170218
Kaspersky 20170218
Kingsoft 20170218
McAfee 20170218
McAfee-GW-Edition 20170218
Microsoft 20170218
eScan 20170218
NANO-Antivirus 20170218
nProtect 20170218
Panda 20170218
Sophos 20170218
SUPERAntiSpyware 20170218
Tencent 20170218
TheHacker 20170217
TotalDefense 20170218
TrendMicro 20170218
TrendMicro-HouseCall 20170218
Trustlook 20170218
VBA32 20170217
VIPRE 20170218
ViRobot 20170218
Webroot 20170218
WhiteArmor 20170215
Yandex 20170217
Zillya 20170218
Zoner 20170218
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-10 01:21:04
Entry Point 0x000014B9
Number of sections 4
PE sections
PE imports
CDLocateRng
CDBuildVect
MD5Final
MD5Init
MD5Update
ReplaceFileA
GetShortPathNameW
SetEvent
TlsAlloc
RemoveDirectoryA
GetFileAttributesW
GetLocalTime
GetStartupInfoA
OpenFileMappingW
GetCurrentProcessId
GetCurrentDirectoryA
SetErrorMode
GetCommandLineA
GetProcAddress
GetThreadContext
CompareStringW
lstrcpyW
CreateSemaphoreA
SetEnvironmentVariableW
GetModuleHandleA
WriteFile
GetDiskFreeSpaceA
ReadConsoleA
lstrcmp
FindFirstVolumeA
OutputDebugStringW
OpenEventW
AddAtomW
LocalFileTimeToFileTime
FormatMessageA
CreateFileA
GetCurrentThreadId
SleepEx
CPDeriveKey
CPCreateHash
CPDecrypt
MessageBoxExA
DrawTextExW
DefDlgProcA
wsprintfW
GetWindowTextW
IsDialogMessageW
SetCursorPos
GetMessageW
DefWindowProcA
CharToOemA
PE exports
Number of PE resources by type
RT_VERSION 2
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:08:10 02:21:04+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
6.0

Warning
Possibly corrupt Version resource

EntryPoint
0x14b9

InitializedDataSize
28672

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 6fc30d8a8d354f2a8128874cf84d0353
SHA1 17b1f74015b37beb1b5181b7116454063a59d085
SHA256 7e62a5ca20cfb5da90fe7402f413321c9ede7e230e8b4fa2f1a4e516e8ae8e34
ssdeep
768:mGaCcVwfqIcC+fkkQ3miL2X8TRay2TxaqFHH4A/xypfcKIZJD:mGLcmfqnFfe2iL2Mdn2TxfJH4A5mfq

authentihash 93528345ed5572df5fb09c371bd5319d6783ecc8fad2a650b29d85db1f533fb5
imphash f635bc15d21931d6a0849c1914f57fe5
File size 76.0 KB ( 77824 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.2%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-02-18 17:39:02 UTC ( 2 months, 1 week ago )
Last submission 2017-02-22 13:44:44 UTC ( 2 months ago )
File names Chrome Font v7.51.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications