× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bc7f80e88fd43c6882e08c98fdf3d02c6efd2d055ecaf187f4284c5af89327fe
File name: bc7f80e88fd43c6882e08c98fdf3d02c6efd2d055ecaf187f4284c5af89327fe
Detection ratio: 40 / 67
Analysis date: 2017-10-23 21:25:13 UTC ( 11 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.6136019 20171023
AegisLab Ml.Attribute.Gen!c 20171023
Antiy-AVL Trojan/Win32.TSGeneric 20171023
Arcabit Trojan.Generic.D5DA0D3 20171023
Avast FileRepMalware 20171023
AVG FileRepMalware 20171023
Avira (no cloud) TR/AD.Emotet.wdonb 20171023
AVware Trojan.Win32.Generic!BT 20171023
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20171023
BitDefender Trojan.GenericKD.6136019 20171023
Comodo UnclassifiedMalware 20171023
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cylance Unsafe 20171023
Cyren W32/Trojan.MNOT-8690 20171023
Emsisoft Trojan.GenericKD.6136019 (B) 20171023
Endgame malicious (high confidence) 20171016
ESET-NOD32 Win32/Emotet.AZ 20171023
F-Secure Trojan.GenericKD.6136019 20171023
Fortinet W32/GenKryptik.AVEL!tr 20171023
GData Trojan.GenericKD.6136019 20171023
Ikarus Trojan.Win32.Emotet 20171023
Sophos ML heuristic 20170914
K7AntiVirus Riskware ( 0040eff71 ) 20171023
K7GW Riskware ( 0040eff71 ) 20171023
Kaspersky Trojan.Win32.Xpun.lke 20171023
MAX malware (ai score=86) 20171023
McAfee Artemis!2A28E2F3E715 20171023
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.dt 20171023
Microsoft Trojan:Win32/Emotet.P 20171023
eScan Trojan.GenericKD.6136019 20171023
Panda Trj/Genetic.gen 20171023
Rising Malware.Heuristic!ET#97% (RDM+:cmRtazq5ZtRzexA7J8v+5jS+fBjk) 20171023
SentinelOne (Static ML) static engine - malicious 20171019
Sophos AV Mal/EncPk-ANR 20171023
Symantec SecurityRisk.gen1 20171023
TrendMicro TROJ_GEN.R03FC0DJN17 20171023
TrendMicro-HouseCall TROJ_GEN.R03FC0DJN17 20171023
VIPRE Trojan.Win32.Generic!BT 20171023
Webroot W32.Trojan.Emotet 20171023
ZoneAlarm by Check Point Trojan.Win32.Xpun.lke 20171023
AhnLab-V3 20171023
Alibaba 20170911
ALYac 20171023
Avast-Mobile 20171023
Bkav 20171023
CAT-QuickHeal 20171020
ClamAV 20171023
CMC 20171023
DrWeb 20171023
eGambit 20171023
F-Prot 20171023
Jiangmin 20171023
Kingsoft 20171023
Malwarebytes 20171023
NANO-Antivirus 20171023
nProtect 20171023
Palo Alto Networks (Known Signatures) 20171023
Qihoo-360 20171023
SUPERAntiSpyware 20171023
Symantec Mobile Insight 20171011
Tencent 20171023
TheHacker 20171017
TotalDefense 20171023
Trustlook 20171023
VBA32 20171023
ViRobot 20171023
WhiteArmor 20171016
Yandex 20171023
Zillya 20171023
Zoner 20171023
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name XCOPY.EXE
Internal name xcopy
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Extended Copy Utility
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-10-22 12:00:58
Entry Point 0x0000101E
Number of sections 8
PE sections
PE imports
OpenSCManagerW
GetMUILanguage
CryptExportPublicKeyInfo
GetUserDefaultUILanguage
GetLastError
GetConsoleOutputCP
GetOEMCP
QueryPerformanceCounter
FlushProcessWriteBuffers
GetTickCount
FindNLSString
GlobalUnlock
LoadLibraryA
GetConsoleWindow
HeapSetInformation
SwitchToThread
LocalAlloc
GetCommandLineW
GlobalLock
GetCurrentThread
GetTimeFormatW
RaiseException
InterlockedExchange
GetSystemTimeAsFileTime
GetProcAddress
FreeLibrary
LocalFree
TerminateProcess
GlobalAlloc
GetCurrentThreadId
SHAppBarMessage
DeviceCapabilitiesA
WSAIsBlocking
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
255.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
4294967295

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
26752

EntryPoint
0x101e

OriginalFileName
XCOPY.EXE

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2017:10:22 13:00:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
xcopy

ProductVersion
6.1.7600.16385

FileDescription
Extended Copy Utility

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
0

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 2a28e2f3e715f36b17d3f4ed89618c24
SHA1 001022f4f9d59e418ed05e18d8327c826fe20ff1
SHA256 bc7f80e88fd43c6882e08c98fdf3d02c6efd2d055ecaf187f4284c5af89327fe
ssdeep
3072:lidD65PQuImIQ0Rgf4xy0kstQ2xjmrhG+kb:ie54uIm0WQxPkstQ2xKdG+i

authentihash 4b3f130ba4cf64e76cf16de042efe64db87b03d684e030d2399a3cd32c2c4e46
imphash 05f721986f77847cf8380bfd3c4f767f
File size 224.0 KB ( 229376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2017-10-22 12:06:18 UTC ( 11 months, 1 week ago )
Last submission 2017-11-22 14:13:00 UTC ( 10 months ago )
File names dnssec.exe
1002-001022f4f9d59e418ed05e18d8327c826fe20ff1
XCOPY.EXE
xcopy
dcomsys.exe
iHnF9BbvE6z2l.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications