× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8afaa6668cbb5c419b59c6e71f1d91efb5f0110f4088bdb963aecbe10b246d3f
File name: 40827960.EXE
Detection ratio: 49 / 68
Analysis date: 2018-06-05 17:44:17 UTC ( 8 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30854266 20180605
AegisLab Ml.Attribute.Gen!c 20180605
ALYac Trojan.GenericKD.30854266 20180605
Antiy-AVL Trojan/Win32.Agent 20180605
Arcabit Trojan.Generic.D1D6CC7A 20180605
Avast Win32:Malware-gen 20180605
AVG Win32:Malware-gen 20180605
Avira (no cloud) TR/Crypt.ZPACK.wuyzg 20180605
AVware Trojan.Win32.Generic!BT 20180605
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9998 20180605
BitDefender Trojan.GenericKD.30854266 20180605
CAT-QuickHeal Trojan.Fuery 20180605
Comodo TrojWare.Win32.Dovs.MO 20180604
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180202
Cylance Unsafe 20180605
Cyren W32/Trojan.YQNA-7958 20180605
Emsisoft Trojan.GenericKD.30854266 (B) 20180605
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GGZH 20180605
F-Secure Trojan.GenericKD.30854266 20180605
Fortinet W32/GenKryptik.CALT!tr 20180605
GData Win32.Trojan-Spy.Emotet.QM 20180605
Ikarus Trojan.Win32.Crypt 20180605
Sophos ML heuristic 20180601
K7AntiVirus Riskware ( 0040eff71 ) 20180605
K7GW Riskware ( 0040eff71 ) 20180605
Kaspersky Trojan.Win32.Agent.qwgoit 20180605
Malwarebytes Trojan.Emotet 20180605
MAX malware (ai score=94) 20180605
McAfee Emotet-FDM!58C08D321DF2 20180605
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20180605
Microsoft Trojan:Win32/Occamy.C 20180605
eScan Trojan.GenericKD.30854266 20180605
NANO-Antivirus Trojan.Win32.Kryptik.fcnmny 20180605
Palo Alto Networks (Known Signatures) generic.ml 20180605
Panda Trj/GdSda.A 20180605
Qihoo-360 Trojan.Generic 20180605
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANX 20180605
Symantec Trojan.Gen.6 20180605
Tencent Win32.Trojan.Agent.Syia 20180605
TrendMicro TSPY_EMOTET.TTIBBHW 20180605
TrendMicro-HouseCall TSPY_EMOTET.TTIBBHW 20180605
VBA32 BScope.Trojan.Cloxer 20180605
VIPRE Trojan.Win32.Generic!BT 20180605
ViRobot Trojan.Win32.Z.Highconfidence.188416.H 20180605
Webroot W32.Trojan.Emotet 20180605
Yandex Trojan.Agent!fg9YDL0L8Jg 20180529
ZoneAlarm by Check Point Trojan.Win32.Agent.qwgoit 20180605
AhnLab-V3 20180605
Alibaba 20180604
Avast-Mobile 20180605
Babable 20180406
Bkav 20180605
ClamAV 20180605
CMC 20180605
Cybereason
DrWeb 20180605
eGambit 20180605
F-Prot 20180605
Jiangmin 20180605
Kingsoft 20180605
Rising 20180605
SUPERAntiSpyware 20180605
Symantec Mobile Insight 20180605
TACHYON 20180605
TheHacker 20180605
TotalDefense 20180605
Trustlook 20180605
Zillya 20180605
Zoner 20180605
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name Wwapi.dll
Internal name Wwapi.dll
File version 08.01.02.00 (win7_rtm.090713-1255)
Description WWAN API
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-23 00:10:14
Entry Point 0x00002348
Number of sections 7
PE sections
PE imports
CryptEncrypt
PropertySheetW
ImageList_AddMasked
CryptAcquireCertificatePrivateKey
JetIndexRecordCount
GetArcDirection
OffsetViewportOrgEx
GetCurrentProcess
DnsHostnameToComputerNameW
lstrlenA
GetSystemDefaultUILanguage
GetConsoleCursorInfo
GetProfileSectionW
GetExitCodeProcess
ExitProcess
GetHandleInformation
HeapReAlloc
FlsFree
LZSeek
SafeArrayDestroyData
I_RpcNsBindingSetEntryNameW
RpcBindingSetAuthInfoExA
SetupDiGetINFClassW
PathCreateFromUrlW
StrCmpIW
DlgDirListW
SetMenuItemInfoW
GetWindowRect
GetInputState
IsDlgButtonChecked
GetSysColorBrush
GetDesktopWindow
ChangeDisplaySettingsExW
GetFocus
IsIconic
DragDetect
SetCursor
midiOutGetVolume
DocumentPropertiesA
CryptCATStoreFromHandle
SCardListReaderGroupsW
Ord(29)
strtol
CoQueryProxyBlanket
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.59

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
8.1.2.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
WWAN API

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
163840

EntryPoint
0x2348

OriginalFileName
Wwapi.dll

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
08.01.02.00 (win7_rtm.090713-1255)

TimeStamp
2018:05:23 02:10:14+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
Wwapi.dll

ProductVersion
08.01.02.00

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
20480

ProductName
Microsoft Windows Operating System

ProductVersionNumber
8.1.2.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 58c08d321df2c93c10d258afd731c402
SHA1 12438bcb2fe0a45482fb70cc862ece22783fd540
SHA256 8afaa6668cbb5c419b59c6e71f1d91efb5f0110f4088bdb963aecbe10b246d3f
ssdeep
1536:A1Ps+7xjj7BceK00BSMSAy7DtMfKNp9TJ0BFEgKTilSaLD3orvhUcvl23mY92WEL:mL1j7BckXxAEvHOBFtaaLuv7g3kj

authentihash 0f17e452d9f37219b4224e96582d03aea8a65c975b146ba4449f2c8baf94b5da
imphash 34c37c363f3eef215e1960b83f2e8b2a
File size 184.0 KB ( 188416 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-22 17:41:57 UTC ( 9 months ago )
Last submission 2018-05-28 09:26:59 UTC ( 8 months, 3 weeks ago )
File names Wwapi.dll
40827960.EXE
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!