× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bcc329bf81d82aa6111643d9e5066652bd397b04c023711b20c7ac9f18970dbc
File name: 84f60c637f9449bf6b4d3623b876c558
Detection ratio: 19 / 71
Analysis date: 2019-01-20 18:02:06 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
Avast Win32:Trojan-gen 20190120
AVG Win32:Trojan-gen 20190120
Cylance Unsafe 20190120
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CWUT 20190120
Fortinet W32/GenKryptik.CWUT!tr 20190120
Kaspersky Trojan-Banker.Win32.IcedID.toby 20190120
McAfee GenericRXGV-MG!84F60C637F94 20190120
Microsoft Trojan:Win32/Azden.A!cl 20190120
Palo Alto Networks (Known Signatures) generic.ml 20190120
Panda Trj/GdSda.A 20190120
Qihoo-360 Win32/Trojan.2ff 20190120
Rising Trojan.GenKryptik!8.AA55 (TFE:5:JKccw8AUb2S) 20190120
Symantec ML.Attribute.HighConfidence 20190119
Tencent Win32.Trojan-banker.Icedid.Ecug 20190120
Trapmine malicious.moderate.ml.score 20190102
Webroot W32.Trojan.Gen 20190120
ZoneAlarm by Check Point Trojan-Banker.Win32.IcedID.toby 20190120
Ad-Aware 20190120
AegisLab 20190120
AhnLab-V3 20190120
Alibaba 20180921
ALYac 20190120
Antiy-AVL 20190120
Arcabit 20190120
Avast-Mobile 20190117
Avira (no cloud) 20190120
AVware 20180925
Babable 20180917
Baidu 20190117
BitDefender 20190120
Bkav 20190118
CAT-QuickHeal 20190120
ClamAV 20190120
CMC 20190120
Comodo 20190120
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cyren 20190120
DrWeb 20190120
eGambit 20190120
Emsisoft 20190120
F-Prot 20190120
F-Secure 20190120
GData 20190120
Ikarus 20190120
Sophos ML 20181128
Jiangmin 20190120
K7AntiVirus 20190119
K7GW 20190119
Kingsoft 20190120
Malwarebytes 20190120
MAX 20190120
McAfee-GW-Edition 20190120
eScan 20190120
NANO-Antivirus 20190120
SentinelOne (Static ML) 20190118
Sophos AV 20190119
SUPERAntiSpyware 20190116
TACHYON 20190119
TheHacker 20190118
TotalDefense 20190120
TrendMicro 20190120
TrendMicro-HouseCall 20190120
Trustlook 20190120
VBA32 20190118
ViRobot 20190120
Yandex 20190117
Zillya 20190118
Zoner 20190119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Tour de Force CRM Example Willbreak
Original name Willbreak.exe
Internal name Tour de Force CRM ExampleColorselect Pointinclude
File version 9.5.44.80
Description Willbreak
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-01-17 10:54:58
Entry Point 0x00006EED
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegCreateKeyW
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetLocaleInfoW
GetModuleFileNameA
RtlUnwind
DeleteCriticalSection
GetCurrentProcess
EnumSystemLocalesA
GetLocaleInfoA
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
GetUserDefaultLCID
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
VirtualProtectEx
GetFileType
SetStdHandle
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
SetFilePointer
GetSystemTimeAsFileTime
HeapSetInformation
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CloseHandle
IsProcessorFeaturePresent
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
TerminateProcess
InitializeCriticalSection
HeapCreate
CreateFileW
InterlockedDecrement
Sleep
SetLastError
GetTickCount
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
ExitProcess
WriteConsoleW
LeaveCriticalSection
CoUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
9.5.44.80

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Willbreak

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
176640

EntryPoint
0x6eed

OriginalFileName
Willbreak.exe

MIMEType
application/octet-stream

FileVersion
9.5.44.80

TimeStamp
2011:01:17 11:54:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Tour de Force CRM ExampleColorselect Pointinclude

ProductVersion
9.5.44.80

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tour de Force CRM Example

CodeSize
155648

ProductName
Tour de Force CRM Example Willbreak

ProductVersionNumber
9.5.44.80

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 84f60c637f9449bf6b4d3623b876c558
SHA1 2ad82a3ba7a76da0fdb1a4fd0f88856733be9478
SHA256 bcc329bf81d82aa6111643d9e5066652bd397b04c023711b20c7ac9f18970dbc
ssdeep
3072:yEwrR8gXyxqx92Lg5s2yTGKMt6+YpIkUyg245R2JTW19pk5ub6DyH8qIgjQ5+FwU:yJRjiMv2Lg+qlt6rpIkURrlQcPg4qu

authentihash 15ae2eefd3bc49f68ea566b0bb5f637fd74933703ae40d6754406c2ada1b5190
imphash 23a164d324b741a291d000e9e76af64a
File size 276.0 KB ( 282624 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-20 14:11:53 UTC ( 2 months ago )
Last submission 2019-01-20 14:11:53 UTC ( 2 months ago )
File names Tour de Force CRM ExampleColorselect Pointinclude
Willbreak.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.