× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b204adf7e273cc29e05e93ddd6c7c5a7322712f99356d3bd8455036a95a81a1a
File name: b204adf7e273cc29e05e93ddd6c7c5a7322712f99356d3bd8455036a95a81a1a
Detection ratio: 48 / 68
Analysis date: 2018-11-14 07:50:59 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31192066 20181112
AhnLab-V3 Malware/Win32.Generic.R234573 20181114
ALYac Trojan.Agent.Emotet 20181114
Antiy-AVL Trojan[Banker]/Win32.Emotet 20181114
Arcabit Trojan.Generic.D1DBF402 20181114
Avast Win32:MalwareX-gen [Trj] 20181114
AVG Win32:MalwareX-gen [Trj] 20181114
Avira (no cloud) TR/Crypt.EPACK.Gen8 20181114
BitDefender Trojan.GenericKD.31192066 20181114
CAT-QuickHeal Trojan.Emotet.X4 20181113
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20181114
Cyren W32/Emotet.FB.gen!Eldorado 20181114
Emsisoft Trojan.GenericKD.31192066 (B) 20181114
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GJXG 20181114
F-Prot W32/Emotet.FB.gen!Eldorado 20181114
F-Secure Trojan.GenericKD.31192066 20181114
Fortinet W32/Emotet.BAXA!tr 20181114
GData Trojan.GenericKD.31192066 20181114
Ikarus Trojan-Banker.Emotet 20181114
Sophos ML heuristic 20181108
K7AntiVirus Trojan ( 0053a9261 ) 20181113
K7GW Trojan ( 0053a9261 ) 20181114
Kaspersky HEUR:Trojan.Win32.Generic 20181114
Malwarebytes Trojan.Emotet 20181114
MAX malware (ai score=95) 20181114
McAfee RDN/Generic.hra 20181114
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181114
Microsoft Trojan:Win32/Casdet!rfn 20181114
eScan Trojan.GenericKD.31192066 20181114
NANO-Antivirus Virus.Win32.Gen.ccmw 20181114
Palo Alto Networks (Known Signatures) generic.ml 20181114
Panda Trj/CI.A 20181113
Qihoo-360 Win32/Trojan.c84 20181114
Rising Trojan.Cloxer!8.F54F (TFE:2:PlZLAyY5p2B) 20181114
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181114
Symantec Trojan.Gen.2 20181114
Tencent Win32.Trojan-banker.Emotet.Wuhg 20181114
TrendMicro TSPY_EMOTET.TIOIBEAZ 20181114
TrendMicro-HouseCall TSPY_EMOTET.TIOIBEAZ 20181114
VBA32 BScope.Trojan.Emotet 20181113
Webroot W32.Trojan.Emotet 20181114
Yandex Trojan.Agent!XWtAs+PrHhI 20181113
Zillya Trojan.Emotet.Win32.3236 20181113
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181114
Zoner Trojan.Emotet 20181114
AegisLab 20181114
Alibaba 20180921
Avast-Mobile 20181114
Babable 20180918
Baidu 20181114
Bkav 20181113
ClamAV 20181114
CMC 20181114
Cybereason 20180225
DrWeb 20181114
eGambit 20181114
Jiangmin 20181114
Kingsoft 20181114
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
TACHYON 20181114
TheHacker 20181113
TotalDefense 20181114
Trustlook 20181114
VIPRE 20181114
ViRobot 20181114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2007 - 2015 Nir Sofer

Product RegDllView
Original name RegDllView.exe
Internal name RegDllView
File version 1.60
Description RegDllView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-16 16:45:18
Entry Point 0x00021E6A
Number of sections 4
PE sections
PE imports
GetMapMode
GetObjectType
LocaleNameToLCID
GetCommandLineA
GetFileMUIPath
GetSystemDefaultUILanguage
GetConsoleProcessList
IsValidLocale
GetCurrentThreadId
SetConsoleScreenBufferSize
GetNamedPipeClientSessionId
ExtractIconExA
GetPriorityClipboardFormat
GetClipboardViewer
MenuItemFromPoint
SetMenu
GetCapture
GetFocus
IsWindowEnabled
OpenDriver
Number of PE resources by type
RT_STRING 9
RT_DIALOG 4
RT_MENU 4
RT_BITMAP 3
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 15
HEBREW DEFAULT 7
PE resources
ExifTool file metadata
UninitializedDataSize
45056

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
RegDllView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
0

EntryPoint
0x21e6a

OriginalFileName
RegDllView.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2007 - 2015 Nir Sofer

FileVersion
1.6

TimeStamp
2018:08:16 17:45:18+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RegDllView

ProductVersion
1.6

SubsystemVersion
5.1

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NirSoft

CodeSize
0

ProductName
RegDllView

ProductVersionNumber
1.6.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 de7caab9e456438556ff20ef358dcf87
SHA1 ac1afbfa5a72abca41e6ff3395357525772762bf
SHA256 b204adf7e273cc29e05e93ddd6c7c5a7322712f99356d3bd8455036a95a81a1a
ssdeep
3072:wNFL6mL6N7Mb9JUWWIUhWidlNQuy5LBJ/IepvXi3cnuiRC4:wFLLON7MbzDWIpGouyVvthnc

authentihash 1a2a20d0e6d229be9cb7aaefc525238d2eff1fefb83dd029f7c5dce561c8f9e7
imphash 04266918df30f73b1f297c9f9aa51ba3
File size 168.0 KB ( 172032 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-16 16:58:54 UTC ( 6 months ago )
Last submission 2018-08-16 16:58:54 UTC ( 6 months ago )
File names RegDllView.exe
RegDllView
pluginsprime.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!