× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7c25630c2384abcf33bcf7c56a6a56a60cfdac422653d099a06ce68e8f90763
File name: a7c25630c2384abcf33bcf7c56a6a56a60cfdac422653d099a06ce68e8f90763
Detection ratio: 33 / 65
Analysis date: 2018-06-08 03:37:39 UTC ( 8 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKDZ.44417 20180608
AegisLab Troj.W32.Chapak!c 20180608
AhnLab-V3 Trojan/Win32.Gandcrab.C2552114 20180607
ALYac Trojan.GenericKDZ.44417 20180608
Antiy-AVL Trojan/Win32.Chapak 20180608
Arcabit Trojan.Generic.DAD81 20180608
Avast FileRepMetagen [Malware] 20180608
AVG FileRepMetagen [Malware] 20180608
BitDefender Trojan.GenericKDZ.44417 20180608
Bkav W32.eHeur.Malware03 20180607
Cyren W32/Trojan.QVSH-7069 20180608
DrWeb Trojan.Encoder.24384 20180608
Emsisoft Trojan.GenericKDZ.44417 (B) 20180608
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GHKS 20180608
F-Secure Trojan.GenericKDZ.44417 20180608
Fortinet W32/GenKryptik.CBUX!tr 20180608
Ikarus Trojan.Win32.Crypt 20180607
Sophos ML heuristic 20180601
Kaspersky Trojan.Win32.Chapak.aafr 20180608
MAX malware (ai score=98) 20180608
McAfee Packed-FGQ!EE53B672D26D 20180608
McAfee-GW-Edition BehavesLike.Win32.Generic.dc 20180608
NANO-Antivirus Trojan.Win32.Chapak.fdsmph 20180608
Palo Alto Networks (Known Signatures) generic.ml 20180608
Panda Trj/CI.A 20180607
Qihoo-360 Win32/Trojan.c55 20180608
SentinelOne (Static ML) static engine - malicious 20180225
Symantec Packed.Generic.525 20180607
Tencent Win32.Trojan.Chapak.Amlv 20180608
TrendMicro Possible_HPGen-37b 20180608
TrendMicro-HouseCall Possible_HPGen-37b 20180608
ZoneAlarm by Check Point Trojan.Win32.Chapak.aafr 20180608
Alibaba 20180608
Avast-Mobile 20180607
Avira (no cloud) 20180607
AVware 20180608
Babable 20180406
Baidu 20180607
CAT-QuickHeal 20180607
ClamAV 20180607
CMC 20180607
Comodo 20180607
CrowdStrike Falcon (ML) 20180202
Cybereason None
eGambit 20180608
F-Prot 20180608
GData 20180608
Jiangmin 20180607
K7AntiVirus 20180607
K7GW 20180608
Kingsoft 20180608
Microsoft 20180608
eScan 20180608
nProtect 20180608
Rising 20180608
Sophos AV 20180608
SUPERAntiSpyware 20180608
Symantec Mobile Insight 20180605
TheHacker 20180606
TotalDefense 20180607
Trustlook 20180608
VBA32 20180607
VIPRE 20180608
ViRobot 20180607
Webroot 20180608
Yandex 20180529
Zillya 20180607
Zoner 20180607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-04 11:24:56
Entry Point 0x00005E0E
Number of sections 6
PE sections
PE imports
DeviceIoControl
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
GetConsoleOutputCP
FileTimeToSystemTime
GetLastError
GetConsoleCP
CreateMailslotW
SetEvent
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
WaitForSingleObjectEx
RtlUnwind
GetModuleFileNameA
GetCommandLineW
GetStdHandle
HeapAlloc
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
GetFileType
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
LCMapStringW
EnumSystemLocalesW
LoadLibraryExW
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
SetFileShortNameA
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
InitializeSListHead
GetLocaleInfoW
SetStdHandle
RaiseException
WideCharToMultiByte
TlsFree
FindFirstFileExA
SetUnhandledExceptionFilter
GetTempPathW
CloseHandle
GetSystemTimeAsFileTime
FindClose
FindNextFileA
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
ExitProcess
FreeLibrary
GetSystemTimeAdjustment
TerminateProcess
CreateEventW
ResetEvent
GetModuleHandleExW
GetUserDefaultLCID
WriteFile
CreateFileW
FindAtomA
TlsGetValue
SetLastError
TlsSetValue
EncodePointer
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
WriteConsoleW
LeaveCriticalSection
SetPropA
GetMenuStringW
Number of PE resources by type
RT_BITMAP 2
RT_STRING 2
RT_DIALOG 1
RT_VERSION 1
TMKB 1
Number of PE resources by language
NEUTRAL 7
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

FileFlagsMask
0x003f

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:06:04 12:24:56+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
115712

LinkerVersion
14.0

FileSubtype
0

ProductVersionNumber
2.0.4.0

UninitializedDataSize
0

FileTypeExtension
exe

InitializedDataSize
219136

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

FileVersionNumber
2.0.4.0

EntryPoint
0x5e0e

FileOS
Windows NT 32-bit

ObjectFileType
Executable application

File identification
MD5 ee53b672d26d6ab000da0dd4dbdbc342
SHA1 32e34d1b380f4c150830d88b5ac0c2afddef5007
SHA256 a7c25630c2384abcf33bcf7c56a6a56a60cfdac422653d099a06ce68e8f90763
ssdeep
3072:QKjAMb82Ydd2cTyyrqgK1rgGKchPnPLhbAg0FujoKQ12aPnwnwi+kvbwRchl3nhw:OJvTP9K1MGzAOuAafwnwip8Ronhrzg

authentihash d5fcd990f0332fe35dc3d31624bb9a2d8075a74f0d17df40aa07128c93280c0e
imphash e29a06cc590fef0c499feb23c5e6f0f9
File size 288.5 KB ( 295424 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-07 18:18:53 UTC ( 8 months, 2 weeks ago )
Last submission 2018-06-08 03:37:39 UTC ( 8 months, 2 weeks ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs