× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 98756d9a29e080abc2fd708d4fe7ad233fb076c7cb9c13c00e55767791f7bace
File name: fU8UgU.exe
Detection ratio: 44 / 69
Analysis date: 2019-01-05 03:05:57 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40905105 20190105
AhnLab-V3 Malware/Gen.Generic.C2913509 20190104
Arcabit Trojan.Generic.D2702991 20190105
Avast Win32:BankerX-gen [Trj] 20190105
AVG Win32:BankerX-gen [Trj] 20190105
Avira (no cloud) TR/Crypt.Agent.wzwvx 20190104
BitDefender Trojan.GenericKD.40905105 20190105
ClamAV Win.Malware.Emotet-6803404-0 20190105
Comodo Malware@#ajusp7vss3cg 20190105
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20190105
Cyren W32/Trojan.LWCI-2023 20190105
eGambit Unsafe.AI_Score_99% 20190105
Emsisoft Trojan.GenericKD.40905105 (B) 20190105
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOGI 20190104
F-Secure Trojan.GenericKD.40905105 20190104
Fortinet W32/Kryptik.GOGC!tr 20190105
GData Trojan.GenericKD.40905105 20190104
Ikarus Trojan.Win32.Crypt 20190104
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00544d321 ) 20190104
K7GW Trojan ( 00544d321 ) 20190104
Kaspersky Trojan-Banker.Win32.Emotet.bxzw 20190104
Malwarebytes Trojan.Emotet 20190104
MAX malware (ai score=83) 20190105
McAfee Emotet-FLM!EE28DB8B7B63 20190104
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20190104
Microsoft Trojan:Win32/Emotet.AC!bit 20190104
eScan Trojan.GenericKD.40905105 20190104
Palo Alto Networks (Known Signatures) generic.ml 20190105
Panda Trj/RnkBend.A 20190104
Qihoo-360 HEUR/QVM20.1.4B9A.Malware.Gen 20190105
Rising Trojan.Kryptik!8.8 (CLOUD) 20190104
Sophos AV Mal/EncPk-AOI 20190104
Symantec Trojan.Emotet 20190104
Tencent Win32.Trojan-banker.Emotet.Alim 20190105
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_FRS.VSN04A19 20190104
TrendMicro-HouseCall TROJ_FRS.VSN04A19 20190104
VBA32 BScope.Trojan.Emotet 20190104
ViRobot Trojan.Win32.Z.Kryptik.167936.ON 20190105
Webroot W32.Trojan.Emotet 20190105
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxzw 20190105
Acronis 20181227
AegisLab 20190104
Alibaba 20180921
Antiy-AVL 20190105
Avast-Mobile 20190104
Babable 20180918
Baidu 20190104
Bkav 20190104
CAT-QuickHeal 20190104
CMC 20190104
Cybereason 20180225
DrWeb 20190105
F-Prot 20190105
Jiangmin 20190104
Kingsoft 20190105
NANO-Antivirus 20190104
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190102
TACHYON 20190104
TheHacker 20190104
TotalDefense 20190104
Trustlook 20190105
Yandex 20181229
Zillya 20190105
Zoner 20190105
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © Microsoft Corporation 1987-2000. All rights reserved.

Product Microsoft® Works 6.0
Original name wkernlng.DLL
Internal name wkernlng
File version 7.1.555.0
Description Microsoft® Works Registration Resources
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-03 15:37:29
Entry Point 0x00009E30
Number of sections 8
PE sections
PE imports
GetSidSubAuthorityCount
GetFileSecurityW
EnumServicesStatusA
GetSecurityDescriptorGroup
DuplicateToken
IsTokenRestricted
EqualDomainSid
LookupPrivilegeDisplayNameA
DeregisterEventSource
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
IsWellKnownSid
GetServiceKeyNameA
LookupPrivilegeNameA
GetCurrentHwProfileW
EqualPrefixSid
GetFileSecurityA
GetClusterResourceNetworkName
GetSaveFileNameW
LineTo
GetCharWidthFloatA
FrameRgn
GetClipRgn
GetTextExtentPoint32A
GetBitmapDimensionEx
GetMetaFileA
GetOutlineTextMetricsW
GetRegionData
ExtCreateRegion
ModifyWorldTransform
GdiComment
GetObjectType
GetCharacterPlacementA
DeviceIoControl
GetVolumePathNameW
EnumSystemCodePagesA
GetUserDefaultLangID
GetSystemInfo
GetCommModemStatus
GetDefaultCommConfigW
GetProcessTimes
EnumUILanguagesW
VirtualProtect
VirtualUnlock
GetPrivateProfileStructW
FindFirstChangeNotificationW
CancelSynchronousIo
GetCurrentProcess
GetPriorityClass
SwitchToThread
GetCurrentDirectoryW
GetLocaleInfoA
LocalAlloc
lstrcatA
GetCommProperties
GetCommandLineW
GetCurrentDirectoryA
EnumResourceTypesA
GetLocalTime
ExpandEnvironmentStringsA
VirtualLock
GetCurrentActCtx
GetCommandLineA
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
GetPrivateProfileStringW
GetProcessHeap
GetComputerNameExA
lstrcpynW
EnumResourceNamesW
ExpandEnvironmentStringsW
GlobalAddAtomW
LocalFlags
GetPrivateProfileSectionA
lstrcmpA
FindFirstFileExA
ReadFile
Module32Next
GetTempFileNameA
lstrcmpW
FindFirstFileExW
GetStringTypeW
IsValidLanguageGroup
EscapeCommFunction
WriteProfileStringW
WriteProfileSectionA
GetThreadPriority
FindResourceW
GetConsoleWindow
GetLogicalDriveStringsW
FindClose
FindNextChangeNotification
VirtualFreeEx
GetVersion
ExtractAssociatedIconW
GetComputerObjectNameW
EnumerateSecurityPackagesW
FreeContextBuffer
DeleteSecurityContext
GetMessageA
GetMessagePos
GetClassInfoExW
GetRawInputData
GetCursorInfo
DrawTextExW
GetPropW
EqualRect
DefWindowProcW
GetKeyboardLayoutNameW
GetUserObjectInformationA
DestroyMenu
GetComboBoxInfo
DefWindowProcA
GetDoubleClickTime
GetPropA
GetClipboardData
GetWindowThreadProcessId
GetMenuState
GetSystemMetrics
InsertMenuItemW
IsGUIThread
ChildWindowFromPoint
GetKeyNameTextA
IsWindowEnabled
GetProcessWindowStation
DestroyCaret
DeferWindowPos
GetMenuItemID
InsertMenuItemA
GetCursorPos
GetClassInfoA
DestroyIcon
LoadStringA
GetQueueStatus
GetLastActivePopup
IsWindowVisible
GetWindowPlacement
GetClassInfoW
MessageBoxIndirectW
DeleteMenu
GetPriorityClipboardFormat
SetPhysicalCursorPos
DefDlgProcA
GetUpdateRgn
GetDesktopWindow
ExcludeUpdateRgn
LoadIconW
GetWindowLongW
DestroyWindow
GetFileVersionInfoA
GetFileVersionInfoSizeW
FindCloseUrlCache
GetUrlCacheEntryInfoExW
GetUrlCacheEntryInfoExA
DeletePortW
FindNextPrinterChangeNotification
DeletePrinterDriverW
DeletePrinterConnectionW
GetStandardColorSpaceProfileW
GetColorProfileHeader
strtol
vprintf
fputws
localeconv
fseek
fputwc
strcmp
vfprintf
Number of PE resources by type
Struct(217) 4
RT_BITMAP 3
RT_DIALOG 3
RT_VERSION 1
Number of PE resources by language
ENGLISH US 11
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.1.555.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Microsoft Works Registration Resources

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
126976

EntryPoint
0x9e30

OriginalFileName
wkernlng.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright Microsoft Corporation 1987-2000. All rights reserved.

FileVersion
7.1.555.0

TimeStamp
2019:01:03 16:37:29+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
wkernlng

ProductVersion
7.01.0555.0

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
40960

ProductName
Microsoft Works 6.0

ProductVersionNumber
7.1.555.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ee28db8b7b630ce57c76892137480a44
SHA1 62d10d616b4772ba0aef9bf7feb5c7abcb380a8e
SHA256 98756d9a29e080abc2fd708d4fe7ad233fb076c7cb9c13c00e55767791f7bace
ssdeep
3072:8Qy/l0d2jPqXR4llESEOJVp/Fe0Jw28gRNyaH6rQschEIfnnxlr:HXRgSOVp9b8ENYQrhvj

authentihash 7492eda8c41b4c6d93e9d14b979c1af9805a044dd6c595356bb3cb317d67be72
imphash dde6281510b87d1d470464c01de48e4d
File size 164.0 KB ( 167936 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (43.3%)
Win32 Dynamic Link Library (generic) (21.7%)
Win32 Executable (generic) (14.9%)
OS/2 Executable (generic) (6.7%)
Generic Win/DOS Executable (6.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-03 08:27:11 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-03 09:47:36 UTC ( 1 month, 2 weeks ago )
File names 9ecdBRNxrQcKsmZzmEn.exe
17EBDEC1.exe
wkernlng
fU8UgU.exe
wkernlng.DLL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!