× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4d7654b04a83e418d703212751cbc49d570bfd37ad58ca4a68b83d93ed51257
File name: enrollwfp.exe
Detection ratio: 43 / 66
Analysis date: 2019-02-06 11:58:18 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
Ad-Aware Trojan.GenericKD.31595649 20190206
AhnLab-V3 Trojan/Win32.Emotet.R254010 20190206
ALYac Trojan.GenericKD.31595649 20190206
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190206
Arcabit Trojan.Generic.D1E21C81 20190206
Avast Win32:BankerX-gen [Trj] 20190206
AVG Win32:BankerX-gen [Trj] 20190206
Avira (no cloud) HEUR/AGEN.1038686 20190206
Bkav HW32.Packed. 20190201
Comodo Malware@#39vr2m9puzn5c 20190206
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cyren W32/Trojan.GEAW-5566 20190206
DrWeb Trojan.EmotetENT.364 20190206
Emsisoft Trojan.Emotet (A) 20190206
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPDU 20190206
F-Prot W32/Emotet.NQ.gen!Eldorado 20190206
Fortinet W32/PossibleThreat 20190206
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00546b061 ) 20190206
K7GW Trojan ( 00546b061 ) 20190206
Kaspersky Trojan-Banker.Win32.Emotet.ccqa 20190206
Malwarebytes Trojan.Emotet 20190206
MAX malware (ai score=100) 20190206
McAfee RDN/Generic.grp 20190206
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190205
Microsoft Trojan:Win32/Emotet 20190206
eScan Trojan.GenericKD.31595649 20190206
NANO-Antivirus Virus.Win32.Gen.ccmw 20190206
Palo Alto Networks (Known Signatures) generic.ml 20190206
Panda Trj/Genetic.gen 20190205
Qihoo-360 HEUR/QVM20.1.E0F7.Malware.Gen 20190206
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20190206
SentinelOne (Static ML) static engine - malicious 20190203
Sophos AV Mal/Emotet-Q 20190206
Symantec Trojan.Emotet 20190206
Tencent Win32.Trojan-banker.Emotet.Swkt 20190206
Trapmine malicious.high.ml.score 20190123
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THACOAI 20190206
VBA32 BScope.Trojan.Emotet 20190206
Webroot W32.Trojan.Emotet 20190206
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.ccqa 20190206
AegisLab 20190206
Alibaba 20180921
Avast-Mobile 20190206
Babable 20180918
Baidu 20190202
BitDefender 20190206
CAT-QuickHeal 20190205
CMC 20190206
Cybereason 20190109
eGambit 20190206
GData 20190206
Jiangmin 20190206
Kingsoft 20190206
SUPERAntiSpyware 20190130
TACHYON 20190206
TheHacker 20190203
TotalDefense 20190206
TrendMicro 20190206
Trustlook 20190206
ViRobot 20190205
Yandex 20190206
Zillya 20190206
Zoner 20190206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 1995 Microsoft Corporation

Product Microsoft Picstore
Original name amstoune.exe
Internal name amstoune
File version 2.0
Description lispfile
Comments Built-in compression
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-29 21:01:16
Entry Point 0x0000242D
Number of sections 5
PE sections
PE imports
IsTokenRestricted
SetWorldTransform
BeginPath
GetEnhMetaFileW
TransmitCommChar
LockFileEx
SetCriticalSectionSpinCount
InitializeCriticalSection
GetCommandLineW
GetThreadLocale
GetCurrentThreadId
GetTapePosition
CloseHandle
CM_Get_Hardware_Profile_Info_ExW
PathBuildRootA
GetDesktopWindow
SetThreadDesktop
MonitorFromWindow
DestroyAcceleratorTable
SCardGetCardTypeProviderNameA
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
MAORI DEFAULT 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.1

Comments
Built-in compression

InitializedDataSize
4096

ImageVersion
6.0

ProductName
Microsoft Picstore

FileVersionNumber
2.0.0.2

UninitializedDataSize
102400

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
0.0

FileTypeExtension
exe

OriginalFileName
amstoune.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.0

TimeStamp
2019:01:29 22:01:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
amstoune

ProductVersion
2.2

FileDescription
lispfile

OSVersion
6.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright 1995 Microsoft Corporation

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
12288

FileSubtype
0

ProductVersionNumber
2.0.2.0

EntryPoint
0x242d

ObjectFileType
Dynamic link library

File identification
MD5 c71fe78d8eea9d1ea8c28bb7ade5ce9c
SHA1 f137d910546c4b38981a713bc9b20ac1443b5119
SHA256 a4d7654b04a83e418d703212751cbc49d570bfd37ad58ca4a68b83d93ed51257
ssdeep
1536:RWaYImzv7Ou32e7zj0mQIC9VFoLAan4FE5573rRcSWZCTefnzcvxUBLvv7tR+hUC:0aYImzTOne3jAFE55ny77iCuufNFD+

authentihash 231a6e0c82836f66e87283d19b522d908402e0da2b0bb4574a63a3a2637e6305
imphash daf30db2436d4434f6c8037f8fb7aada
File size 132.0 KB ( 135168 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-29 21:07:45 UTC ( 3 months, 3 weeks ago )
Last submission 2019-01-30 03:06:05 UTC ( 3 months, 2 weeks ago )
File names qEBz4ekm.exe
amstoune.exe
enrollwfp.exe
bdeARmh2pozG.exe
hixS705QT.exe
5hnur9JoCtX.exe
9RjOqBR.exe
732.exe
24503384.exe
h1CNhUVj.exe
6PzhbZg2b.exe
jkxXCUo3IqK.exe
emotet_e1_a4d7654b04a83e418d703212751cbc49d570bfd37ad58ca4a68b83d93ed51257_2019-01-29__211002.exe_
amstoune
732.exe
semQIZtPBtS.exe
otlLRViSY.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!