× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bb82bcef4bfcb5b06a6f8e2de74321468212feea31ec2f132fa842271f045071
File name: fbwnk.exe
Detection ratio: 9 / 68
Analysis date: 2017-12-07 11:52:00 UTC ( 1 year, 5 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20171207
AVG FileRepMalware 20171207
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20171016
Cylance Unsafe 20171207
Endgame malicious (high confidence) 20171130
Sophos ML heuristic 20170914
Palo Alto Networks (Known Signatures) generic.ml 20171207
Qihoo-360 HEUR/QVM20.1.AF79.Malware.Gen 20171207
SentinelOne (Static ML) static engine - malicious 20171207
Ad-Aware 20171207
AegisLab 20171207
AhnLab-V3 20171207
Alibaba 20171207
ALYac 20171207
Antiy-AVL 20171207
Arcabit 20171207
Avast-Mobile 20171207
Avira (no cloud) 20171207
AVware 20171207
Baidu 20171207
BitDefender 20171207
Bkav 20171207
CAT-QuickHeal 20171206
ClamAV 20171207
CMC 20171207
Comodo 20171207
Cybereason 20171103
Cyren 20171207
DrWeb 20171207
eGambit 20171207
Emsisoft 20171207
ESET-NOD32 20171207
F-Prot 20171207
F-Secure 20171207
Fortinet 20171207
GData 20171207
Ikarus 20171207
Jiangmin 20171207
K7AntiVirus 20171205
K7GW 20171207
Kaspersky 20171207
Kingsoft 20171207
Malwarebytes 20171207
MAX 20171207
McAfee 20171207
McAfee-GW-Edition 20171207
Microsoft 20171207
eScan 20171207
NANO-Antivirus 20171207
nProtect 20171207
Panda 20171206
Rising 20171207
Sophos AV 20171207
SUPERAntiSpyware 20171207
Symantec 20171207
Symantec Mobile Insight 20171207
Tencent 20171207
TheHacker 20171205
TotalDefense 20171207
TrendMicro 20171207
TrendMicro-HouseCall 20171207
Trustlook 20171207
VBA32 20171207
VIPRE 20171207
ViRobot 20171207
Webroot 20171207
WhiteArmor 20171204
Yandex 20171207
Zillya 20171206
ZoneAlarm by Check Point 20171207
Zoner 20171207
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-03 13:00:57
Entry Point 0x0000CA00
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
SetHandleCount
GetOEMCP
HeapDestroy
HeapAlloc
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetEnvironmentStrings
GetCurrentDirectoryW
GetFileSize
GetModuleHandleW
WideCharToMultiByte
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetCommandLineA
lstrcatW
SetStdHandle
SetFilePointer
lstrcpyW
GetCPInfo
GetModuleHandleA
ReadFile
WriteFile
GetStartupInfoA
CloseHandle
GetACP
GetVersion
TerminateProcess
InitializeCriticalSection
HeapCreate
GetTempPathW
CreateFileW
VirtualFree
TlsGetValue
Sleep
GetFileType
GetTickCount
TlsSetValue
ExitProcess
GetCurrentThreadId
GetProcAddress
VirtualAlloc
SetLastError
LeaveCriticalSection
SetFocus
MapWindowPoints
UpdateWindow
EndDialog
LoadBitmapW
SetWindowTextW
DefWindowProcW
GetScrollPos
GetMessageW
PostQuitMessage
ShowWindow
LoadMenuW
SetWindowPos
GetSystemMetrics
SetWindowLongW
GetWindowRect
EndPaint
DialogBoxParamW
TranslateMessage
SetDlgItemTextW
DispatchMessageW
GetCursorPos
BeginPaint
EndDeferWindowPos
SendMessageW
RegisterClassW
GetWindowLongW
GetWindowPlacement
LoadStringW
GetClientRect
EnableMenuItem
GetScrollInfo
InvalidateRect
SetTimer
GetClassNameW
GetActiveWindow
ModifyMenuW
GetWindowTextW
CreateWindowExW
LoadAcceleratorsW
RegisterClassExW
TranslateAcceleratorW
DestroyWindow
Number of PE resources by type
RT_BITMAP 3
RT_DIALOG 1
RT_ICON 1
RT_MANIFEST 1
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
FINNISH DEFAULT 8
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
7.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.12.4.2

LanguageCode
Unknown (504E)

FileFlagsMask
0x0000

FileDescription
ChesterFrank Ltd. GuiStart application

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unknown (80B0)

InitializedDataSize
159744

EntryPoint
0xca00

OriginalFileName
ChesterFrank

MIMEType
application/octet-stream

LegalCopyright
ChesterFrank. All rights reserved. 2017

FileVersion
2.12.4.2

TimeStamp
2016:04:03 15:00:57+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2.12.4.2

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
ChesterFrank Ltd.

CodeSize
295936

ProductName
ChesterFrank GUIRT

ProductVersionNumber
2.12.4.2

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 617bc0874780659c2a482b45bc4f83d5
SHA1 75bc8b6a3e6e13e6fc1b9eb73f7e87e053000f9e
SHA256 bb82bcef4bfcb5b06a6f8e2de74321468212feea31ec2f132fa842271f045071
ssdeep
6144:CPRgwXAEW2s+nIxxYVIzEWvkuTSBSYrGM8zj+ht/tRPxIqtZDd1ZbeAfHz:CFAEW2sjHYqwC3CGJP0zPm89rZygT

authentihash db6952e7279c9f194cae5ce02a35ec5712a27b98482400a9623f0cfae042b817
imphash 5f9483446269a7d3c0643869a14eda89
File size 440.5 KB ( 451072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-12-07 11:52:00 UTC ( 1 year, 5 months ago )
Last submission 2019-04-03 03:04:57 UTC ( 1 month, 3 weeks ago )
File names df07c078-dca6-11e7-b966-80e65024849a.file
617bc0874780659c2a482b45bc4f83d5_exe
617bc087.gxe
3599b6a6-df56-11e7-8a80-80e65024849a.file
3599b6a6-df56-11e7-8a80-80e65024849a.file
fbwnk.exe
eg07d078-eda7-22f7-b977-80f76035859a.exe
myfile.exe
Ejjmdejh9.exe
056_12_15_2017_16_06_05_ser0712.png.malware.MRG
617bc0874780659c2a482b45bc4f83d5.exe
vuoqi.exe
3599b6a6-df56-11e7-8a80-80e65024849a.exe
df07c078-dca6-11e7-b966-80e65024849a.file
ser0712.png
df07c078-dca6-11e7-b966-80e65024849a.exe
617BC0874780659C2A482B45BC4F83D5.exe
df07c078-dca6-11e7-b966-80e65024849a.file
vunqh.exe
output.112568852.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs
UDP communications