× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4b0e4f6b3aaf0d0091dc67c1ff9c0f0deabc998d75304d9c82154b05770f08d
File name: a4b0e4f6b3aaf0d0091dc67c1ff9c0f0deabc998d75304d9c82154b05770f08d
Detection ratio: 52 / 68
Analysis date: 2018-11-14 07:50:58 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31173117 20181112
AhnLab-V3 Trojan/Win32.Emotet.R234876 20181114
ALYac Trojan.Agent.Emotet 20181114
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181114
Arcabit Trojan.Autoruns.GenericS.D1DBA9FD 20181114
Avast Win32:GenMalicious-NYM [Trj] 20181114
AVG Win32:GenMalicious-NYM [Trj] 20181114
Avira (no cloud) TR/Crypt.EPACK.Gen8 20181114
BitDefender Trojan.Autoruns.GenericKDS.31173117 20181114
CAT-QuickHeal Trojan.Emotet.X4 20181113
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181022
Cybereason malicious.f03c8e 20180225
Cylance Unsafe 20181114
Cyren W32/Emotet.FS.gen!Eldorado 20181114
Emsisoft Trojan.Autoruns.GenericKDS.31173117 (B) 20181114
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GJYA 20181114
F-Prot W32/Emotet.FS.gen!Eldorado 20181114
F-Secure Trojan.Autoruns.GenericKDS.31173117 20181114
Fortinet W32/GenKryptik.CIJE!tr 20181114
GData Trojan.Autoruns.GenericKDS.31173117 20181114
Ikarus Trojan.Win32.Krypt 20181114
Sophos ML heuristic 20181108
K7AntiVirus Trojan ( 0053aad51 ) 20181113
K7GW Trojan ( 0053aad51 ) 20181114
Kaspersky HEUR:Trojan.Win32.Generic 20181114
Malwarebytes Trojan.Emotet 20181114
MAX malware (ai score=100) 20181114
McAfee Generic.dxq 20181114
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181114
Microsoft Trojan:Win32/Emotet.AC!bit 20181114
eScan Trojan.Autoruns.GenericKDS.31173117 20181114
NANO-Antivirus Virus.Win32.Gen.ccmw 20181114
Palo Alto Networks (Known Signatures) generic.ml 20181114
Panda Trj/CI.A 20181113
Qihoo-360 Win32/Trojan.428 20181114
Rising Trojan.Cloxer!8.F54F (CLOUD) 20181114
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181114
Symantec Trojan.Emotet 20181114
TACHYON Banker/W32.Emotet.172032.E 20181114
Tencent Win32.Trojan.Generic.Hvtv 20181114
TrendMicro TSPY_EMOTET.TIOIBEAZ 20181114
TrendMicro-HouseCall TSPY_EMOTET.TIOIBEAZ 20181114
VBA32 BScope.Trojan.Emotet 20181113
VIPRE Trojan.Win32.Generic!BT 20181114
ViRobot Trojan.Win32.Z.Emotet.172032.I 20181114
Webroot W32.Trojan.Emotet 20181114
Yandex Trojan.Agent!01Foz25uynY 20181113
Zillya Trojan.Autoruns.Win32.62 20181113
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181114
Zoner Trojan.Emotet 20181114
AegisLab 20181114
Alibaba 20180921
Avast-Mobile 20181114
Babable 20180918
Baidu 20181114
Bkav 20181113
ClamAV 20181114
CMC 20181114
DrWeb 20181114
eGambit 20181114
Jiangmin 20181114
Kingsoft 20181114
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
TheHacker 20181113
TotalDefense 20181114
Trustlook 20181114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2007 - 2015 Nir Sofer

Product RegDllView
Original name RegDllView.exe
Internal name RegDllView
File version 1.60
Description RegDllView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1994-06-09 18:16:01
Entry Point 0x00021D56
Number of sections 4
PE sections
PE imports
GetMapMode
GetObjectType
LocaleNameToLCID
GetFileMUIPath
GetConsoleProcessList
GetSystemDefaultUILanguage
IsValidLocale
GetCommandLineA
GetCurrentThreadId
SetConsoleScreenBufferSize
GetNamedPipeClientSessionId
ExtractIconExA
GetPriorityClipboardFormat
GetClipboardViewer
MenuItemFromPoint
SetMenu
GetCapture
GetFocus
IsWindowEnabled
OpenDriver
Number of PE resources by type
RT_STRING 9
RT_DIALOG 4
RT_MENU 4
RT_BITMAP 3
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 15
HEBREW DEFAULT 7
PE resources
ExifTool file metadata
UninitializedDataSize
45056

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
RegDllView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x21d56

OriginalFileName
RegDllView.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2007 - 2015 Nir Sofer

FileVersion
1.6

TimeStamp
1994:06:09 19:16:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RegDllView

ProductVersion
1.6

SubsystemVersion
5.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NirSoft

CodeSize
0

ProductName
RegDllView

ProductVersionNumber
1.6.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2bff8b0f03c8e09c51b6ef3a7643340f
SHA1 45ceb0be8477049cd5340b1f1ebe7227aa0f7c2a
SHA256 a4b0e4f6b3aaf0d0091dc67c1ff9c0f0deabc998d75304d9c82154b05770f08d
ssdeep
3072:Ad7vDDRJt3sf+hjU1eIX9tB5ycEpUrh3cnuiRC4:AxztNQcINt/yXpqOnc

authentihash a39c65a17dc5fe56412f69ddd76fa2023df6c0b07204b78606f747b062cc0dce
imphash 5ac912cea7b7e09562120429d1cb3b10
File size 168.0 KB ( 172032 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-17 09:27:36 UTC ( 6 months ago )
Last submission 2018-08-17 09:27:36 UTC ( 6 months ago )
File names RegDllView.exe
RegDllView
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!