× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 86b7c8c206ee81e2396a1c16a1014d3759479db9b133cb1906ad33e06cf915e9
File name: HMVw0.exe
Detection ratio: 15 / 63
Analysis date: 2018-11-13 21:23:00 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Bkav HW32.Packed. 20181113
ClamAV Win.Malware.Emotet-6746185-0 20181113
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.634a3f 20180225
Cylance Unsafe 20181113
Endgame malicious (high confidence) 20181108
Fortinet W32/Kryptik.GMOJ!tr 20181113
Sophos ML heuristic 20181108
K7AntiVirus Trojan ( 0053b6a31 ) 20181113
K7GW Trojan ( 0053b6a31 ) 20181113
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181113
Microsoft Trojan:Win32/Fuerboos.E!cl 20181113
Qihoo-360 HEUR/QVM20.1.2F5A.Malware.Gen 20181113
Rising Malware.Heuristic!ET#96% (RDM+:cmRtazq8ypwIStWzaCuyvPnD+bwv) 20181113
Symantec ML.Attribute.HighConfidence 20181113
Ad-Aware 20181112
AegisLab 20181113
AhnLab-V3 20181113
Alibaba 20180921
ALYac 20181113
Antiy-AVL 20181113
Arcabit 20181113
Avast-Mobile 20181113
Avira (no cloud) 20181113
Babable 20180918
Baidu 20181112
BitDefender 20181113
CAT-QuickHeal 20181113
CMC 20181113
Cyren 20181113
DrWeb 20181113
eGambit 20181113
Emsisoft 20181113
ESET-NOD32 20181113
F-Prot 20181113
F-Secure 20181113
GData 20181113
Jiangmin 20181113
Kaspersky 20181113
Kingsoft 20181113
Malwarebytes 20181113
MAX 20181113
McAfee 20181113
eScan 20181113
NANO-Antivirus 20181113
Palo Alto Networks (Known Signatures) 20181113
Panda 20181113
SentinelOne (Static ML) 20181011
Sophos AV 20181113
SUPERAntiSpyware 20181107
Symantec Mobile Insight 20181108
TACHYON 20181113
Tencent 20181113
TheHacker 20181108
TotalDefense 20181113
TrendMicro 20181113
TrendMicro-HouseCall 20181113
Trustlook 20181113
VBA32 20181113
ViRobot 20181113
Yandex 20181113
Zillya 20181113
ZoneAlarm by Check Point 20181113
Zoner 20181113
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft

Product Sola Plug-in
Original name c_gb18030.
Internal name Aban Plug-in
File version 1, 4, 2, 50
Description GB18030 DBCS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1995-06-10 08:02:18
Entry Point 0x00001895
Number of sections 6
PE sections
PE imports
GetTokenInformation
RegEnableReflectionKey
CreateRoundRectRgn
CloseEnhMetaFile
OffsetRgn
GetTextMetricsW
CancelDC
GetSystemTime
OpenFileById
GetCommTimeouts
GetVolumeInformationA
GetThreadPriority
SetCriticalSectionSpinCount
GetUILanguageInfo
LoadLibraryW
GetPrivateProfileIntA
AllocConsole
GetTickCount
GetApplicationRestartSettings
GetNumberOfConsoleMouseButtons
GetCommandLineA
FindFirstFileNameTransactedW
TzSpecificLocalTimeToSystemTime
HeapWalk
GetErrorInfo
EnumerateSecurityPackagesW
IsClipboardFormatAvailable
GetCursorInfo
DialogBoxParamW
IsDlgButtonChecked
IsZoomed
GetWindowDC
DefWindowProcW
AddClipboardFormatListener
DestroyCaret
GetMenuCheckMarkDimensions
fwprintf
malloc
GetClassFile
CoInternetGetSecurityUrl
Number of PE resources by type
RT_DIALOG 19
RT_STRING 10
RT_VERSION 1
Number of PE resources by language
ITALIAN NEUTRAL 3
SWEDISH NEUTRAL 3
CHINESE TRADITIONAL 3
SPANISH NEUTRAL 3
GERMAN NEUTRAL 3
CHINESE SIMPLIFIED 3
JAPANESE DEFAULT 3
FRENCH NEUTRAL 3
ENGLISH US 3
KOREAN 3
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
143360

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.4.2.50

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
GB18030 DBCS

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
12.0

EntryPoint
0x1895

OriginalFileName
c_gb18030.

MIMEType
application/x-java-applet;version=1.3.1|application/x-java-bean;version=1.3.1|application/x-java-applet;version=1.4|application/x-java-bean;version=1.4|application/x-java-applet;version=1.4.1|application/x-java-bean;version=1.4.1

LegalCopyright
Microsoft

FileExtents
|||||

FileOpenName
Aban Applet|JavaBeans|Sola Applet|SolaBeans|Sola Applet|SolaBeans

FileVersion
1, 4, 2, 50

TimeStamp
1995:06:10 10:02:18+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
Aban Plug-in

ProductVersion
1, 4, 2, 50

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AbanSoft / Sun Microsystems, Inc.

CodeSize
0

ProductName
Sola Plug-in

ProductVersionNumber
1.4.2.50

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 e69084ec84c324ff9b8af1294da3e783
SHA1 0b4e6d1634a3f413fce0393e58eb24e09280afc7
SHA256 86b7c8c206ee81e2396a1c16a1014d3759479db9b133cb1906ad33e06cf915e9
ssdeep
1536:POaoZ2XtTzr+9vKvF3Kt/bAftKS2prjS+hO1f2VmFHsI3tju4mQfSWJz1joc:wYtHrsKNyDAftK7O+I1fwNh4mQ/Ic

authentihash 29a774446fb2a884bec33a1c90401c5740058ae6b85c195378734036b8f81d0d
imphash 06f29711c290b986fd548f51a637c767
File size 148.0 KB ( 151552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-13 21:23:00 UTC ( 3 months, 1 week ago )
Last submission 2018-11-14 06:31:58 UTC ( 3 months, 1 week ago )
File names shimssame.exe
webcammachine.exe
chunkcontrol.exe
pwdgrad.exe
nirmalacbgnd.exe
HMVw0.exe
vXm3aKA93auQ.exe
431.exe
mathhexa.exe
tnbyeeKxXoP.exe
strcompon.exe
knownplain.exe
EtTfvge47.exe
Aban Plug-in
hykrZxnZa.exe
shimscofire.exe
614.exe
mtpbtaccess.exe
c_gb18030.
ERCxmNobxb.exe
YSiS9LTnYr.exe
LROWKd3Z3.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!