× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a6818505f1fb750daae2e24f9bfb080ba3cbfd5bb1f3e1b480062c5fb3c08499
File name: (PCegJ3)_The_Mummy.exe
Detection ratio: 1 / 65
Analysis date: 2018-11-08 20:07:00 UTC ( 5 months, 2 weeks ago )
Antivirus Result Update
TheHacker Posible_Worm32 20181108
Ad-Aware 20181108
AegisLab 20181108
AhnLab-V3 20181108
Alibaba 20180921
ALYac 20181108
Antiy-AVL 20181108
Arcabit 20181108
Avast 20181108
Avast-Mobile 20181108
AVG 20181108
Avira (no cloud) 20181108
Babable 20180918
Baidu 20181108
BitDefender 20181108
Bkav 20181108
CAT-QuickHeal 20181108
ClamAV 20181108
CMC 20181108
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181108
Cyren 20181108
DrWeb 20181108
Emsisoft 20181108
Endgame 20181108
ESET-NOD32 20181108
F-Prot 20181108
F-Secure 20181108
Fortinet 20181108
GData 20181108
Ikarus 20181108
Sophos ML 20181108
Jiangmin 20181108
K7AntiVirus 20181108
K7GW 20181108
Kaspersky 20181108
Kingsoft 20181108
Malwarebytes 20181108
MAX 20181108
McAfee 20181108
McAfee-GW-Edition 20181108
Microsoft 20181108
eScan 20181108
NANO-Antivirus 20181108
Palo Alto Networks (Known Signatures) 20181108
Panda 20181108
Qihoo-360 20181108
Rising 20181108
SentinelOne (Static ML) 20181011
Sophos AV 20181108
SUPERAntiSpyware 20181107
Symantec 20181108
Symantec Mobile Insight 20181108
TACHYON 20181108
Tencent 20181108
TrendMicro 20181108
TrendMicro-HouseCall 20181108
Trustlook 20181108
VBA32 20181108
ViRobot 20181108
Webroot 20181108
Yandex 20181108
Zillya 20181107
ZoneAlarm by Check Point 20181108
Zoner 20181108
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT RAR, UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-12-26 15:34:24
Entry Point 0x00021C30
Number of sections 3
PE sections
Overlays
MD5 2c37c10b48408033e19eeaadcc615665
File type application/x-rar
Offset 52736
Size 1317
Entropy 7.78
PE imports
RegCloseKey
GetOpenFileNameA
DeleteObject
LoadLibraryA
ExitProcess
GetProcAddress
OleInitialize
SHGetMalloc
SetMenu
Number of PE resources by type
RT_DIALOG 6
RT_STRING 4
RT_ICON 4
RT_RCDATA 1
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 17
NEUTRAL 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2004:12:26 16:34:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
5.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x21c30

InitializedDataSize
8192

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
90112

File identification
MD5 c5b938fbafeee009ca2e6ddc00f372f7
SHA1 6460399bf3fe5c70b2cf3848c69c1153d5c4d982
SHA256 a6818505f1fb750daae2e24f9bfb080ba3cbfd5bb1f3e1b480062c5fb3c08499
ssdeep
1536:Nywse9QdA95BAL3rukI8b71hMGr7nVXzr6qVHXCLXo:OKr5B4DTBXzr6g64

authentihash ef18bfb10ad7964487f3c1b3403cbf20c855185b8d3fada83b408c7c9b828f89
imphash b602426ec706e7b23572160bb5b68285
File size 52.8 KB ( 54053 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID WinRAR Self Extracting archive (87.9%)
UPX compressed Win32 Executable (4.5%)
Win32 EXE Yoda's Crypter (4.5%)
Win32 Dynamic Link Library (generic) (1.1%)
Win32 Executable (generic) (0.7%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2015-02-06 03:45:37 UTC ( 4 years, 2 months ago )
Last submission 2018-11-08 20:07:00 UTC ( 5 months, 2 weeks ago )
File names (PCegJ3)_The_Mummy.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs