× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a8938f19c50ce7ed40850550f41361f01715e519ac2c4f4c6863090744234c26
File name: output.114882753.txt
Detection ratio: 8 / 70
Analysis date: 2019-01-16 21:14:41 UTC ( 3 months ago ) View latest
Antivirus Result Update
Avira (no cloud) TR/Crypt.XPACK.Gen 20190116
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20181023
Cylance Unsafe 20190116
Emsisoft Trojan.Agent (A) 20190116
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Rising Trojan.Propagate!8.FDE7/N3#78% (RDM+:cmRtazp/CPFFHOYqXb53swq9W/T+) 20190116
Trapmine malicious.high.ml.score 20190103
Acronis 20190116
Ad-Aware 20190116
AegisLab 20190116
AhnLab-V3 20190116
Alibaba 20180921
ALYac 20190116
Antiy-AVL 20190116
Arcabit 20190116
Avast 20190116
Avast-Mobile 20190116
AVG 20190116
Babable 20180918
Baidu 20190116
BitDefender 20190116
Bkav 20190116
CAT-QuickHeal 20190116
ClamAV 20190116
CMC 20190116
Comodo 20190116
Cybereason 20190109
Cyren 20190116
DrWeb 20190116
eGambit 20190116
ESET-NOD32 20190116
F-Prot 20190116
F-Secure 20190116
Fortinet 20190116
GData 20190116
Jiangmin 20190116
K7AntiVirus 20190116
K7GW 20190116
Kaspersky 20190116
Kingsoft 20190116
Malwarebytes 20190116
MAX 20190116
McAfee 20190116
McAfee-GW-Edition 20190116
Microsoft 20190116
eScan 20190116
NANO-Antivirus 20190116
Palo Alto Networks (Known Signatures) 20190116
Panda 20190116
Qihoo-360 20190116
SentinelOne (Static ML) 20181223
Sophos AV 20190116
SUPERAntiSpyware 20190109
Symantec 20190116
TACHYON 20190116
Tencent 20190116
TheHacker 20190115
TotalDefense 20190116
TrendMicro 20190116
TrendMicro-HouseCall 20190116
Trustlook 20190116
VBA32 20190116
VIPRE 20190116
ViRobot 20190116
Webroot 20190116
Yandex 20190116
Zillya 20190115
ZoneAlarm by Check Point 20190116
Zoner 20190116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product PE Cloner
Original name PEC.exe
Internal name PEC.exe
File version 0.1
Description PE Cloner
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-12-06 11:25:55
Entry Point 0x0000B04C
Number of sections 5
PE sections
PE imports
VirtualProtect
GetCurrentThreadId
GetStartupInfoA
Sleep
GetModuleHandleA
Ord(1775)
Ord(2827)
Ord(4080)
Ord(537)
Ord(4710)
Ord(3597)
Ord(354)
Ord(755)
Ord(2124)
Ord(3136)
Ord(518)
Ord(6383)
Ord(665)
Ord(5440)
Ord(4699)
Ord(2515)
Ord(6385)
Ord(3798)
Ord(2621)
Ord(3259)
Ord(3610)
Ord(5290)
Ord(939)
Ord(2446)
Ord(2370)
Ord(5303)
Ord(5943)
Ord(1979)
Ord(3402)
Ord(536)
Ord(5277)
Ord(2915)
Ord(815)
Ord(922)
Ord(641)
Ord(1948)
Ord(4353)
Ord(2514)
Ord(4425)
Ord(5199)
Ord(4441)
Ord(1134)
Ord(4465)
Ord(609)
Ord(5300)
Ord(1200)
Ord(4627)
Ord(1168)
Ord(3738)
Ord(4853)
Ord(2982)
Ord(4234)
Ord(825)
Ord(3081)
Ord(3092)
Ord(5307)
Ord(5442)
Ord(3574)
Ord(4424)
Ord(540)
Ord(4078)
Ord(2554)
Ord(6376)
Ord(3741)
Ord(4224)
Ord(1727)
Ord(940)
Ord(823)
Ord(501)
Ord(5186)
Ord(2379)
Ord(2725)
Ord(3874)
Ord(4998)
Ord(5981)
Ord(5621)
Ord(800)
Ord(656)
Ord(3749)
Ord(2512)
Ord(470)
Ord(4274)
Ord(5261)
Ord(3176)
Ord(4079)
Ord(1146)
Ord(3147)
Ord(6375)
Ord(324)
Ord(6052)
Ord(5600)
Ord(3262)
Ord(1576)
Ord(2256)
Ord(2575)
Ord(5856)
Ord(5065)
Ord(4407)
Ord(3663)
Ord(3346)
Ord(858)
Ord(2396)
Ord(3831)
Ord(6394)
Ord(6374)
Ord(5280)
Ord(3825)
Ord(2976)
Ord(1089)
Ord(773)
Ord(2985)
Ord(2726)
Ord(3177)
Ord(3922)
Ord(2818)
Ord(3499)
Ord(4376)
Ord(1776)
Ord(535)
Ord(567)
Ord(3830)
Ord(2385)
Ord(3079)
Ord(4396)
Ord(6334)
Ord(4226)
Ord(2055)
Ord(4837)
Ord(5241)
Ord(353)
Ord(5450)
Ord(2648)
Ord(5714)
Ord(5289)
Ord(4622)
Ord(561)
Ord(1083)
Ord(5715)
Ord(355)
Ord(2302)
Ord(565)
Ord(817)
Ord(924)
Ord(4486)
Ord(3702)
Ord(4698)
Ord(926)
Ord(5163)
Ord(6055)
Ord(6199)
Ord(5265)
Ord(4673)
Ord(5302)
Ord(860)
Ord(5731)
Ord(3318)
__p__fmode
__CxxFrameHandler
memset
__dllonexit
strlen
_except_handler3
_mbscmp
_onexit
exit
_XcptFilter
__setusermatherr
_controlfp
_adjust_fdiv
_acmdln
__p__commode
atoi
__getmainargs
memcpy
_setmbcp
_initterm
_exit
__set_app_type
MCIWndCreateA
GetSystemMetrics
LoadIconA
EnableWindow
DrawIcon
EnumWindows
SendMessageA
GetClientRect
PostQuitMessage
IsIconic
waveOutReset
waveInOpen
mmioWrite
mmioDescend
waveInGetErrorTextA
waveOutOpen
waveInPrepareHeader
mmioClose
mmioCreateChunk
waveOutClose
waveInAddBuffer
waveInClose
mmioAscend
mmioOpenA
mmioRead
waveOutUnprepareHeader
waveOutPrepareHeader
waveInUnprepareHeader
waveInStart
waveOutWrite
waveOutGetErrorTextA
waveInReset
Number of PE resources by type
RT_ICON 3
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 4
ENGLISH UK 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.1.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
PE Cloner

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
143360

EntryPoint
0xb04c

OriginalFileName
PEC.exe

MIMEType
application/octet-stream

FileVersion
0.1

TimeStamp
2016:12:06 03:25:55-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
PEC.exe

ProductVersion
0.1

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
49152

ProductName
PE Cloner

ProductVersionNumber
0.1.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 709de8724ad1ae70797c45bf9a0584cd
SHA1 a664f3301ca7e452966d5d3acec4661b02823435
SHA256 a8938f19c50ce7ed40850550f41361f01715e519ac2c4f4c6863090744234c26
ssdeep
3072:K9dEHSHjkvXpiHnc8owgePClh8JzI1jHsK6fKb8ktlcC0YJwexXPhPcExC:UdBClh8J81j6NccyPGk

authentihash 3dc218dc1eee833ddf91cf120bdb200dc861b4094ce2100c21e07ba32c9d9787
imphash 585010660efa2253e40514b94f816126
File size 192.0 KB ( 196608 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (33.7%)
Win64 Executable (generic) (29.8%)
Microsoft Visual C++ compiled executable (generic) (17.8%)
Win32 Dynamic Link Library (generic) (7.1%)
Win32 Executable (generic) (4.8%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-16 21:14:41 UTC ( 3 months ago )
Last submission 2019-01-16 21:14:41 UTC ( 3 months ago )
File names PEC.exe
output.114882753.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs