× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 887d92feec5701ad1d40b170070cc6d5da0fa13a45e00511e0b696b7d07153d6
File name: 2015_03Details_zur_Transaktion_7895111____sparkasse____08_02_11__...
Detection ratio: 33 / 57
Analysis date: 2015-03-27 10:37:39 UTC ( 4 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.2250172 20150327
AhnLab-V3 Trojan/Win32.ZBot 20150326
ALYac Trojan.GenericKD.2250172 20150327
AVG Luhe.Fiha.A 20150327
Avira (no cloud) TR/Dropper.VB.29089 20150327
AVware Trojan.Win32.Generic!BT 20150327
Baidu-International Trojan.Win32.VB.cuof 20150326
BitDefender Trojan.GenericKD.2250172 20150327
ByteHero Virus.Win32.Heur.p 20150327
Emsisoft Trojan.GenericKD.2250172 (B) 20150327
ESET-NOD32 Win32/Emotet.AD 20150327
F-Secure Trojan.GenericKD.2250172 20150327
Fortinet W32/Injector.BWFQ!tr 20150327
GData Trojan.GenericKD.2250172 20150327
Ikarus Trojan.Win32.VB 20150327
K7AntiVirus Trojan ( 004b8c611 ) 20150327
K7GW Trojan ( 004b8c611 ) 20150327
Kaspersky Trojan.Win32.VB.cuof 20150327
Malwarebytes Backdoor.Bot 20150327
McAfee RDN/Generic.dx!d2e 20150327
Microsoft Trojan:Win32/Emotet.G 20150327
eScan Trojan.GenericKD.2250172 20150327
Norman VBKrypt.VBP 20150327
nProtect Trojan.GenericKD.2250172 20150327
Panda Generic Suspicious 20150327
Qihoo-360 HEUR/QVM03.0.Malware.Gen 20150327
Sophos AV Mal/VBZbot-H 20150327
Symantec Trojan.Zbot 20150327
Tencent Trojan.Win32.Qudamah.Gen.17 20150327
TrendMicro TROJ_GEN.R011C0DCR15 20150327
TrendMicro-HouseCall TROJ_GEN.R011C0DCR15 20150327
VIPRE Trojan.Win32.Generic!BT 20150327
ViRobot Trojan.Win32.Agent.145283[h] 20150327
AegisLab 20150327
Yandex 20150325
Alibaba 20150327
Antiy-AVL 20150327
Avast 20150327
Bkav 20150327
CAT-QuickHeal 20150327
ClamAV 20150327
CMC 20150325
Comodo 20150327
Cyren 20150327
DrWeb 20150327
F-Prot 20150327
Jiangmin 20150326
Kingsoft 20150327
McAfee-GW-Edition 20150327
NANO-Antivirus 20150327
Rising 20150327
SUPERAntiSpyware 20150327
TheHacker 20150324
TotalDefense 20150326
VBA32 20150326
Zillya 20150327
Zoner 20150326
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Publisher Joyee Flynn
Product Goodreads
Original name NESOPIL.exe
Internal name Callstb
File version 1.00.0909
Description Joyee Flynn writes paranormal erotic romance full of hot men who desire nothing more than each other.
Comments Joyee Flynn has 101 books on Goodreads with 62958 ratings. Joyee Flynn's most popular series is Marius World.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-03-25 22:53:36
Entry Point 0x000014C0
Number of sections 3
PE sections
Overlays
MD5 cc2574957d7f559b5b6e1b6a5aa329d8
File type data
Offset 94208
Size 51075
Entropy 7.97
PE imports
_adj_fdivr_m64
__vbaGenerateBoundsError
_allmul
__vbaGet3
_adj_fprem
__vbaAryMove
__vbaObjVar
__vbaVarAnd
Ord(537)
_adj_fdiv_r
__vbaObjSetAddref
Ord(100)
__vbaHresultCheckObj
__vbaI2Var
_CIlog
__vbaVarMul
Ord(595)
__vbaVarLateMemCallLd
_adj_fptan
__vbaFileClose
__vbaI4Var
__vbaAryCopy
__vbaFreeStr
Ord(631)
Ord(588)
__vbaFreeStrList
_adj_fdiv_m16i
EVENT_SINK_QueryInterface
Ord(516)
__vbaI4Str
__vbaLenBstr
Ord(525)
_adj_fdiv_m32i
Ord(717)
__vbaExceptHandler
__vbaSetSystemError
DllFunctionCall
__vbaUbound
__vbaVarTstLt
__vbaVarSetObjAddref
__vbaFreeVar
__vbaLbound
__vbaFileOpen
__vbaUI1I2
Ord(711)
__vbaAryLock
EVENT_SINK_Release
__vbaVarTstEq
__vbaVarLateMemCallLdRf
__vbaVarSetVar
__vbaStrCat
__vbaVarDup
__vbaChkstk
__vbaVarNeg
__vbaPrintFile
Ord(570)
__vbaAryUnlock
__vbaVarLateMemSt
__vbaVarAbs
__vbaStrVarCopy
__vbaVar2Vec
__vbaVarForNext
__vbaFreeVarList
__vbaStrVarMove
__vbaExitProc
__vbaVarTstNe
__vbaAryConstruct2
__vbaFreeObj
_adj_fdivr_m32
__vbaVarSub
_CIcos
__vbaVarMove
__vbaFPInt
__vbaErrorOverflow
__vbaNew2
__vbaAryDestruct
__vbaStrMove
_adj_fprem1
Ord(563)
_adj_fdiv_m32
Ord(685)
__vbaOnError
_adj_fpatan
EVENT_SINK_AddRef
_adj_fdivr_m32i
__vbaVarForInit
__vbaVarVargNofree
__vbaStrCopy
__vbaFPException
__vbaAryVar
_adj_fdivr_m16i
__vbaVarAdd
_adj_fdiv_m64
__vbaUI1I4
_CIsin
_CIsqrt
_CIatan
__vbaVarDiv
__vbaLateMemCall
__vbaObjSet
__vbaVarCat
_CIexp
_CItan
__vbaFpI4
Number of PE resources by type
RT_ICON 5
RT_VERSION 1
MIXTYPE 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
FINNISH DEFAULT 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
Joyee Flynn has 101 books on Goodreads with 62958 ratings. Joyee Flynn's most popular series is Marius World.

LinkerVersion
6.0

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.0.0.909

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
28672

EntryPoint
0x14c0

OriginalFileName
NESOPIL.exe

MIMEType
application/octet-stream

FileVersion
1.00.0909

TimeStamp
2015:03:25 23:53:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Callstb

SubsystemVersion
4.0

ProductVersion
1.00.0909

FileDescription
Joyee Flynn writes paranormal erotic romance full of hot men who desire nothing more than each other.

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Joyee Flynn

CodeSize
61440

ProductName
Goodreads

ProductVersionNumber
1.0.0.909

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 73f21275655a1f29ad66364680c7fe00
SHA1 c1880cab1409bd5694b113575162eeb5f7cd4a41
SHA256 887d92feec5701ad1d40b170070cc6d5da0fa13a45e00511e0b696b7d07153d6
ssdeep
1536:VS/sWYYSFrefcKTw/U/GAiSshd7W3rnvqFgeEM153OKorUuJ10u4MD7EuNrZgE1S:tWJw/Ubi7sbvlq3qrUuD0u4I7vOyW

authentihash 8e3add68b36e390ab58bac683e6cf0a9726836efbb7ac9bc5a548cea3b57efae
imphash fa3d1f21542499fe2d00ae76c5d391fb
File size 141.9 KB ( 145283 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (69.4%)
Win64 Executable (generic) (23.3%)
Win32 Executable (generic) (3.8%)
Generic Win/DOS Executable (1.6%)
DOS Executable Generic (1.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-03-25 23:26:52 UTC ( 4 years, 1 month ago )
Last submission 2015-03-26 05:12:24 UTC ( 4 years, 1 month ago )
File names UPS_Service_standard_Nummer_032924923480____local___DE___track___000009324823547____time____10_52.exe
{899CEEC1-F892-9EC8-0156-D9507652E5B6}.exe
DHL_Sendungsverfolgung_DE_de_0404950054958373____Status__085__member__user___DHLAdmin___009873.exe
NESOPIL.exe
Callstb
DHL_Sendungsverfolgung_DE_de_0404950054958373____Status__085__member__user___DHLAdmin___00987.exe
2015_03Details_zur_Transaktion_7895111____sparkasse____08_02_11___id_0000239092388.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!