× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b073af60abc0662910206848516b2feca2fb16e943ce9856baf2ee9616017ad2
File name: b073af60abc0662910206848516b2feca2fb16e943ce9856baf2ee9616017ad2
Detection ratio: 16 / 69
Analysis date: 2019-02-09 11:27:57 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190208
AVG FileRepMalware 20190209
CAT-QuickHeal Trojan.Emotet.X4 20190208
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.930c5c 20190109
Cylance Unsafe 20190209
eGambit Unsafe.AI_Score_88% 20190209
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CYXP 20190209
Sophos ML heuristic 20181128
McAfee-GW-Edition BehavesLike.Win32.BrowseFox.gm 20190209
Microsoft Trojan:Win32/Azden.A!cl 20190209
Qihoo-360 HEUR/QVM20.1.1C87.Malware.Gen 20190209
SentinelOne (Static ML) static engine - malicious 20190203
Symantec ML.Attribute.HighConfidence 20190209
Trapmine malicious.moderate.ml.score 20190123
Ad-Aware 20190209
AegisLab 20190209
AhnLab-V3 20190209
Alibaba 20180921
ALYac 20190209
Antiy-AVL 20190209
Arcabit 20190208
Avast 20190209
Avast-Mobile 20190209
Avira (no cloud) 20190209
Babable 20180918
Baidu 20190202
BitDefender 20190209
Bkav 20190201
ClamAV 20190209
CMC 20190209
Comodo 20190209
Cyren 20190209
DrWeb 20190209
Emsisoft 20190209
F-Prot 20190209
Fortinet 20190209
GData 20190209
Ikarus 20190209
Jiangmin 20190209
K7AntiVirus 20190208
K7GW 20190209
Kaspersky 20190209
Kingsoft 20190209
Malwarebytes 20190209
MAX 20190209
McAfee 20190209
eScan 20190209
NANO-Antivirus 20190209
Palo Alto Networks (Known Signatures) 20190209
Panda 20190209
Rising 20190209
Sophos AV 20190209
SUPERAntiSpyware 20190206
Symantec Mobile Insight 20190207
TACHYON 20190209
Tencent 20190209
TheHacker 20190203
TotalDefense 20190206
TrendMicro 20190209
TrendMicro-HouseCall 20190209
Trustlook 20190209
VBA32 20190208
ViRobot 20190208
Webroot 20190209
Yandex 20190208
Zillya 20190208
ZoneAlarm by Check Point 20190209
Zoner 20190209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-02-09 19:22:27
Entry Point 0x000080EE
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetUserNameW
ImpersonateSelf
IsTokenRestricted
InitializeSecurityDescriptor
GetUserNameA
LookupPrivilegeNameA
GetEventLogInformation
GetOpenFileNameW
GetViewportExtEx
GetTextExtentExPointW
FrameRgn
GetBitmapBits
GetTextExtentPoint32W
GetWorldTransform
GetPath
GetCharWidth32W
RestoreDC
ExtTextOutA
GetPaletteEntries
GetObjectW
SetStretchBltMode
GetTextAlign
GetTextExtentPointW
GetBkColor
GdiSetBatchLimit
DeleteMetaFile
GetTextFaceA
DefineDosDeviceW
GetVolumePathNameW
IsProcessorFeaturePresent
FileTimeToDosDateTime
GetShortPathNameW
VirtualAllocEx
FileTimeToSystemTime
GetOverlappedResult
DeactivateActCtx
GetConsoleCP
GetDefaultCommConfigW
GetExitCodeProcess
FlushProcessWriteBuffers
GetTickCount
EnumUILanguagesW
GetProcessId
GetStartupInfoA
EnumSystemLocalesA
GetWindowsDirectoryW
GlobalGetAtomNameW
GetCompressedFileSizeW
GetConsoleTitleA
Sleep
GetProcAddress
GetProfileSectionA
GetSystemPowerStatus
ApplicationRecoveryInProgress
GetLocaleInfoW
EnumResourceTypesA
GetTimeFormatW
GetTempPathA
LockFileEx
GetPrivateProfileSectionA
LocalFlags
FindFirstFileExA
FreeConsole
GetComputerNameA
GetThreadTimes
IsValidLocale
GetSystemDirectoryA
GetLargestConsoleWindowSize
DecodePointer
GetModuleHandleW
GetBinaryTypeA
FindActCtxSectionStringW
GetFileAttributesExW
LocalFree
ResumeThread
DeviceIoControl
LoadResource
FindResourceW
GetCurrentConsoleFont
LocalHandle
GetVolumePathNamesForVolumeNameW
SleepEx
GetOEMCP
LoadRegTypeLib
GetRecordInfoFromTypeInfo
VarCyMul
GetPwrCapabilities
ExtractIconExW
ExtractAssociatedIconA
FindExecutableA
InitializeSecurityContextA
EnumerateSecurityPackagesW
GetComputerObjectNameW
GetCaretBlinkTime
LoadImageA
UpdateWindow
GetScrollInfo
LoadMenuA
DefWindowProcW
GetClassInfoExA
GetComboBoxInfo
GetShellWindow
FindWindowA
GetCaretPos
LockSetForegroundWindow
FlashWindowEx
LoadMenuW
GetWindowThreadProcessId
GetMenuState
GetTabbedTextExtentA
DdeSetUserHandle
IsRectEmpty
LoadCursorFromFileA
DestroyCursor
DialogBoxParamA
GetSysColor
GetDlgItemInt
GetMenuItemID
LoadBitmapW
GetClassInfoA
DefFrameProcW
wsprintfA
GetTitleBarInfo
LogicalToPhysicalPoint
GetDoubleClickTime
GetWindowPlacement
LoadStringW
GetClassInfoW
GetKeyboardLayoutList
DrawMenuBar
DrawTextW
GetClassLongA
LoadAcceleratorsA
GetMenuContextHelpId
GetMenuStringA
GetClientRect
GetSysColorBrush
ExcludeUpdateRgn
GetSystemMenu
LoadAcceleratorsW
GetWindowRgnBox
GetUpdateRect
ModifyMenuA
DeregisterShellHookWindow
DestroyWindow
GetFileVersionInfoA
FindFirstUrlCacheEntryExW
InternetInitializeAutoProxyDll
DeleteUrlCacheEntryW
DeletePrinterDriverW
FindFirstPrinterChangeNotification
GetPrinterDriverDirectoryA
GetStandardColorSpaceProfileW
fputc
fputws
fread
_time64
_localtime64
fgetws
strspn
strcmp
CoInternetIsFeatureEnabled
FaultInIEFeature
GetClassFileOrMime
Number of PE resources by type
RT_DIALOG 51
RT_GROUP_CURSOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_MENU 1
Number of PE resources by language
ENGLISH US 55
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2019:02:09 20:22:27+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
39936

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x80ee

InitializedDataSize
427520

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 83c6745c88ea55e097fba33987e0ed0a
SHA1 8e76b5f930c5cfd5e821ef02e5ca213797ee2e63
SHA256 b073af60abc0662910206848516b2feca2fb16e943ce9856baf2ee9616017ad2
ssdeep
3072:Iu24Shbp/Y8iY981datjLqHcBPd2Lh99hv4IAcNbm0NkXmh52oigI75ehCb2dbLY:a4Sk8iYW1ddHcBFwXwGnnC

authentihash 85cc8af445eb9e43d51b4eea8a4fdcf7f5e53cac975aba92e5192d0c6e280436
imphash 16632a620825424906f75236d0ccd8ba
File size 449.0 KB ( 459776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (48.1%)
Microsoft Visual C++ compiled executable (generic) (25.4%)
Win32 Dynamic Link Library (generic) (10.1%)
Win32 Executable (generic) (6.9%)
OS/2 Executable (generic) (3.1%)
Tags
peexe

VirusTotal metadata
First submission 2019-02-09 11:27:57 UTC ( 1 month, 1 week ago )
Last submission 2019-02-09 11:27:57 UTC ( 1 month, 1 week ago )
File names BXmmn9FN3N.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!