× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b9d782587e9fa0a6f480fe7f452c25d1bd8cad613df714daa43454d2dbeb684f
File name: img.jpg
Detection ratio: 19 / 72
Analysis date: 2018-12-26 11:23:32 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181224
AVG FileRepMalware 20181226
Bkav HW32.Packed. 20181224
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181022
Cylance Unsafe 20181226
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CVCG 20181226
Fortinet W32/Kryptik.GJCI!tr 20181226
Ikarus Trojan-Ransom.Crypted007 20181226
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20181226
Microsoft Trojan:Win32/Fuerboos.A!cl 20181225
Qihoo-360 HEUR/QVM20.1.1F62.Malware.Gen 20181226
Rising Malware.Heuristic!ET#91% (RDM+:cmRtazqtMdyomF7x9WBWAT7uctRq) 20181226
SentinelOne (Static ML) static engine - malicious 20181223
Symantec Ransom.Troldesh 20181225
Trapmine malicious.moderate.ml.score 20181205
VBA32 BScope.TrojanPSW.Papras 20181222
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181226
Ad-Aware 20181226
AegisLab 20181226
AhnLab-V3 20181226
Alibaba 20180921
ALYac 20181226
Antiy-AVL 20181226
Arcabit 20181226
Avast 20181226
Avast-Mobile 20181225
Avira (no cloud) 20181226
AVware 20180925
Babable 20180918
Baidu 20181207
BitDefender 20181226
CAT-QuickHeal 20181225
ClamAV 20181226
CMC 20181225
Comodo 20181226
Cybereason 20180225
Cyren 20181226
DrWeb 20181226
eGambit 20181226
Emsisoft 20181226
F-Prot 20181226
F-Secure 20181226
GData 20181226
Jiangmin 20181226
K7AntiVirus 20181226
K7GW 20181226
Kingsoft 20181226
Malwarebytes 20181226
MAX 20181226
McAfee 20181226
McAfee-GW-Edition 20181226
eScan 20181226
NANO-Antivirus 20181226
Palo Alto Networks (Known Signatures) 20181226
Panda 20181225
Sophos AV 20181226
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181225
TACHYON 20181226
Tencent 20181226
TheHacker 20181225
TotalDefense 20181223
TrendMicro 20181226
TrendMicro-HouseCall 20181226
Trustlook 20181226
VIPRE 20181225
ViRobot 20181225
Webroot 20181226
Yandex 20181223
Zillya 20181225
Zoner 20181225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Signature verification The digital signature of the object did not verify.
Signing date 11:05 PM 2/28/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-26 10:10:39
Entry Point 0x000026C0
Number of sections 3
PE sections
Overlays
MD5 66bc85d41ea44cea404ad66345216341
File type data
Offset 1069056
Size 3336
Entropy 7.34
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
RevertToSelf
RegCloseKey
OpenProcessToken
FreeSid
ImpersonateSelf
RegQueryValueExA
AccessCheck
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
RegOpenKeyExA
InitializeAcl
RegOpenKeyExW
GetLengthSid
AddAccessAllowedAce
RegEnumKeyExA
SetSecurityDescriptorGroup
IsValidSecurityDescriptor
BeginPath
CreateMetaFileW
GetStdHandle
GetDriveTypeW
GetFileAttributesA
WaitForSingleObject
HeapDestroy
GetFileAttributesW
GetLocalTime
GetCurrentProcess
FileTimeToDosDateTime
LocalAlloc
GetFileInformationByHandle
GetLocaleInfoW
GetFileTime
GetTempPathA
GetCPInfo
GetTempPathW
HeapReAlloc
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
GetEnvironmentVariableA
GlobalHandle
FindClose
MoveFileW
SetLastError
GetSystemTime
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
LoadLibraryA
MultiByteToWideChar
GetPrivateProfileStringW
GetModuleHandleA
GetSystemDirectoryW
GetExitCodeThread
CreateMutexW
TerminateProcess
GlobalAlloc
SetEndOfFile
GetVersion
HeapFree
SetHandleCount
LoadLibraryW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
lstrcmpiW
RtlUnwind
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
DeleteFileA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetTempFileNameW
ExpandEnvironmentStringsW
GetTimeFormatA
GetTempFileNameA
FindFirstFileW
DuplicateHandle
GetProcAddress
CreateEventW
CreateFileW
GetFileType
CreateFileA
HeapAlloc
GetLastError
GetSystemInfo
lstrlenA
GlobalFree
OpenEventW
GlobalUnlock
lstrlenW
VirtualFree
FileTimeToLocalFileTime
GetCurrentProcessId
WideCharToMultiByte
GetCommandLineA
QueryPerformanceFrequency
SetFilePointer
ReadFile
CloseHandle
GlobalLock
GetModuleHandleW
HeapCreate
WriteFile
CreateProcessW
Sleep
VirtualAlloc
ResetEvent
SystemParametersInfoA
SetTimer
LoadCursorA
GetParent
UpdateWindow
SendMessageA
GetMenuItemCount
LoadStringA
PostMessageA
CharUpperW
wsprintfA
KillTimer
IsCharUpperW
GetDlgItem
ReleaseDC
GetDC
SetCursor
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:26 11:10:39+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
10752

LinkerVersion
9.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x26c0

InitializedDataSize
1057280

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 a522a98442203976d5da6f10386ce907
SHA1 f163579cb41c7ea6a787e46005df60abcb1f778b
SHA256 b9d782587e9fa0a6f480fe7f452c25d1bd8cad613df714daa43454d2dbeb684f
ssdeep
24576:ogAQwdFgoiEK5jx2iiJIdUOyET7iTh5kTKo:odZcoiEKCIdBymKxo

authentihash 56ebd5e4060bfd0d50e82dba25d9bb698384c04e065c3c38b676c6fd298f132b
imphash 919a9aec1eff347967bff351784e8b43
File size 1.0 MB ( 1072392 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-12-26 11:23:32 UTC ( 3 months, 3 weeks ago )
Last submission 2018-12-26 11:23:32 UTC ( 3 months, 3 weeks ago )
File names img.jpg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs