× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 98450a6b41d8bd23b2fce10f9f9935fb241dd60e78043735188ac8eccd354875
File name: TC.exe
Detection ratio: 36 / 68
Analysis date: 2017-12-15 12:33:27 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Ursu.40455 20171215
AegisLab Uds.Dangerousobject.Multi!c 20171215
AhnLab-V3 Trojan/Win32.Injector.C2298955 20171215
Arcabit Trojan.Ursu.D9E07 20171215
Avast FileRepMalware 20171215
AVG FileRepMalware 20171215
Avira (no cloud) TR/Crypt.ZPACK.ykqxe 20171215
AVware Trojan.Win32.Generic!BT 20171215
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9675 20171215
BitDefender Gen:Variant.Ursu.40455 20171215
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cylance Unsafe 20171215
DrWeb Trojan.Trick.45197 20171215
Emsisoft Gen:Variant.Ursu.40455 (B) 20171215
Endgame malicious (high confidence) 20171130
ESET-NOD32 Win32/TrickBot.Z 20171215
F-Secure Gen:Variant.Ursu.40455 20171215
Fortinet W32/Kryptik.EDXJ!tr 20171215
GData Win32.Trojan-Spy.Trickbot.I 20171215
Ikarus Trojan.Win32.Trickbot 20171215
Sophos ML heuristic 20170914
K7GW Hacktool ( 700007861 ) 20171214
Kaspersky Trojan.Win32.Mansabo.akl 20171215
Malwarebytes Trojan.Downloader 20171215
McAfee RDN/Generic.dx 20171215
McAfee-GW-Edition BehavesLike.Win32.Ransomware.gc 20171215
eScan Gen:Variant.Ursu.40455 20171215
Palo Alto Networks (Known Signatures) generic.ml 20171215
SentinelOne (Static ML) static engine - malicious 20171207
Sophos AV Mal/Generic-S 20171215
Symantec Trojan.Gen.2 20171215
Tencent Suspicious.Heuristic.Gen.b.0 20171215
TrendMicro-HouseCall Suspicious_GEN.F47V1214 20171215
VIPRE Trojan.Win32.Generic!BT 20171215
Webroot W32.Trojan.Gen 20171215
ZoneAlarm by Check Point Trojan.Win32.Mansabo.akl 20171215
Alibaba 20171215
ALYac 20171215
Antiy-AVL 20171215
Avast-Mobile 20171215
Bkav 20171215
CAT-QuickHeal 20171215
ClamAV 20171215
CMC 20171215
Comodo 20171215
Cybereason 20171103
Cyren 20171215
eGambit 20171215
F-Prot 20171215
Jiangmin 20171215
K7AntiVirus 20171215
Kingsoft 20171215
MAX 20171215
Microsoft 20171215
NANO-Antivirus 20171215
nProtect 20171215
Panda 20171214
Qihoo-360 20171215
Rising 20171215
SUPERAntiSpyware 20171215
Symantec Mobile Insight 20171215
TheHacker 20171210
TotalDefense 20171215
TrendMicro 20171215
Trustlook 20171215
VBA32 20171214
ViRobot 20171215
WhiteArmor 20171204
Yandex 20171214
Zillya 20171214
Zoner 20171215
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-07-10 00:27:50
Entry Point 0x0000A6A0
Number of sections 4
PE sections
PE imports
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
GetLastError
GetStartupInfoA
GetFileSize
GetModuleHandleA
lstrcatA
ReadFile
GetCurrentDirectoryA
CloseHandle
CreateFileA
SleepEx
_except_handler3
_acmdln
__p__fmode
??2@YAPAXI@Z
_adjust_fdiv
memset
??3@YAXPAX@Z
memcpy
_controlfp
__setusermatherr
exit
_XcptFilter
__getmainargs
_exit
__p__commode
_initterm
__set_app_type
SetFocus
GetMessageA
SetDlgItemTextA
UpdateWindow
GetScrollInfo
BeginPaint
GetScrollPos
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetSystemMetrics
DispatchMessageA
EndPaint
EndDeferWindowPos
GetWindowLongA
MapWindowPoints
SetWindowLongA
TranslateMessage
RegisterClassExA
GetCursorPos
SetWindowTextA
LoadStringA
GetWindowPlacement
SendMessageA
GetClientRect
CreateWindowExA
InvalidateRect
LoadAcceleratorsA
wsprintfA
SetTimer
LoadIconA
TranslateAcceleratorA
SetDlgItemInt
GetClassNameA
DestroyWindow
Number of PE resources by type
RT_BITMAP 3
RT_STRING 2
RT_ACCELERATOR 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
FINNISH DEFAULT 5
ENGLISH US 3
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
7.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.0.2.17

LanguageCode
Czech

FileFlagsMask
0x0000

FileDescription
Wrapper Ext5 1.1

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unknown (08C0)

InitializedDataSize
297984

EntryPoint
0xa6a0

OriginalFileName
extfive.ex

MIMEType
application/octet-stream

LegalCopyright
FloogMin Corporation. All rights reserv

FileVersion
3.1.2.11 (win7_rtm.030716-1690)

TimeStamp
2016:07:10 01:27:50+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
extfive

ProductVersion
3.0.2.17

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
FloogMin Corporation

CodeSize
157696

ProductName
FloogMin Operating H

ProductVersionNumber
3.0.2.17

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 8e36565e7e87102e70a755f5ba85ae71
SHA1 341e81121cd99a89e92992d091a12e718cd42abd
SHA256 98450a6b41d8bd23b2fce10f9f9935fb241dd60e78043735188ac8eccd354875
ssdeep
6144:bK6BrUJOjK1giZtlsyOHljCHG8n4MsOKmw5sTgiAS1hfz8Es22:W6BkyxUGEoOKmRTgiAYfz9s

authentihash ede7b96ba07c6028d6f38e31e7300ae897d7d194b675050ed07184799218c7d0
imphash f42940f8145f918a18aae0df3bbd5ee8
File size 444.5 KB ( 455168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-14 13:08:13 UTC ( 1 year, 2 months ago )
Last submission 2018-05-28 18:00:20 UTC ( 8 months, 4 weeks ago )
File names TC.exe
775C.tmp.ex_
1002-341e81121cd99a89e92992d091a12e718cd42abd
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs