× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a30ed24d117ab71b256dbe9cb8ee56491e13282f050a3f8b44810da9dced9981
File name: a30ed24d117ab71b256dbe9cb8ee56491e13282f050a3f8b44810da9dced9981
Detection ratio: 13 / 69
Analysis date: 2018-12-14 18:03:12 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.215f8d 20180225
Cylance Unsafe 20181214
eGambit Unsafe.AI_Score_99% 20181214
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181214
K7GW Spyware ( 005068aa1 ) 20181214
Qihoo-360 HEUR/QVM20.1.DD57.Malware.Gen 20181214
Rising Trojan.Fuerboos!8.EFC8 (TFE:dGZlOgJHFPKNzEd+lQ) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Avira (no cloud) 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181214
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
Emsisoft 20181214
ESET-NOD32 20181214
F-Prot 20181214
F-Secure 20181214
Fortinet 20181214
GData 20181214
Ikarus 20181214
Jiangmin 20181214
Kaspersky 20181214
Kingsoft 20181214
Malwarebytes 20181214
MAX 20181214
McAfee 20181214
McAfee-GW-Edition 20181214
Microsoft 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
Sophos AV 20181214
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TotalDefense 20181214
TrendMicro 20181214
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-15 01:53:35
Entry Point 0x00007AB2
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
GetTextCharsetInfo
GetColorAdjustment
GdiSetBatchLimit
GetSystemPaletteUse
ExcludeClipRect
GetTextExtentPointA
GetRgnBox
GetTextColor
GetCharWidthA
GetCharWidth32A
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
VirtualProtect
GetThreadLocale
GetEnvironmentStringsW
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
DeleteTimerQueue
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
GetTempPathW
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
lstrcpyA
VirtualQueryEx
FormatMessageA
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractIconW
ExtractAssociatedIconW
GetComputerObjectNameW
GetUserNameExW
GetWindowRgn
EnumWindowStationsA
IsWindow
GetClipboardOwner
GetMenu
GetPriorityClipboardFormat
GetMenuItemCount
DrawIcon
GetWindowTextLengthA
LockWorkStation
GetDlgItemTextA
GetKeyboardLayoutNameW
GetDlgItem
DefMDIChildProcW
LoadAcceleratorsW
GetWindowLongW
GetOpenClipboardWindow
GetCaretPos
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
strspn
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:15 02:53:35+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x7ab2

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 27f7fda215f8de9528a480c61773a454
SHA1 05b79987b7a29d3eaffea63a3d619b9521376389
SHA256 a30ed24d117ab71b256dbe9cb8ee56491e13282f050a3f8b44810da9dced9981
ssdeep
1536:ugZjdSLH/I1vThrn/BgJxKBL/DSpqh6LGpD279E9yiSzwzzS8wSqsVV6Rce9ESKq:bwbqvNTpXCeDd9yivSYjnVe9E5

authentihash 43504bd8bdd93a806e725e62de8d8f0031a4079f6c6ae0f81f31f830e09cfabe
imphash f126a02d77a3901108e4552d1afbe51b
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 18:03:12 UTC ( 2 months, 1 week ago )
Last submission 2018-12-14 18:03:12 UTC ( 2 months, 1 week ago )
File names rxTM6KOb.exe
gD1D6Ur3ZJ.exe
IJUfHSC73J.exe
hVr3Tvg2Js.exe
iFWJ0Xec.exe
tester12.exe
XuQotG19RPDg.exe
GGt44dBm.exe
t7pMOeY7.exe
dWteYED4IFUU.exe
u9d4Bf1I.exe
TqiWWCIiW3.exe
qqiKGhViDPD.exe
reportstap.exe
jGtvDWHzbk.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!