× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bdbe4e3ff7a86e5ab002f8884a37f06ae45dc53f9b8a4e180f77ee32d9456058
File name: Ms_Office.exe
Detection ratio: 47 / 67
Analysis date: 2018-11-15 08:28:17 UTC ( 6 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Generic.Delph.PWS.E06EBA9A 20181115
AhnLab-V3 Malware/Win32.Generic.C2622462 20181114
ALYac Generic.Delph.PWS.E06EBA9A 20181115
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20181115
Arcabit Generic.Delph.PWS.E06EBA9A 20181115
Avast Win32:Malware-gen 20181115
AVG Win32:Malware-gen 20181115
Avira (no cloud) TR/Crypt.XPACK.Gen 20181115
BitDefender Generic.Delph.PWS.E06EBA9A 20181115
CAT-QuickHeal Trojan.Sigmal.S3989901 20181115
ClamAV Win.Ransomware.Delf-6651871-0 20181115
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181115
DrWeb Trojan.PWS.Stealer.24300 20181115
Emsisoft Generic.Delph.PWS.E06EBA9A (B) 20181115
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/PSW.Delf.OSF 20181115
F-Secure Generic.Delph.PWS.E06EBA9A 20181115
Fortinet W32/Delf.OSF!tr 20181115
GData Generic.Delph.PWS.E06EBA9A 20181115
Sophos ML heuristic 20181108
Jiangmin Trojan.PSW.Coins.buh 20181115
K7AntiVirus Password-Stealer ( 0052f96e1 ) 20181113
K7GW Password-Stealer ( 0052f96e1 ) 20181115
Kaspersky Trojan-Ransom.Win32.Blocker.lckf 20181115
Malwarebytes Trojan.AzorUlt 20181115
MAX malware (ai score=86) 20181115
McAfee GenericRXGI-KI!6B15F2363CCF 20181115
McAfee-GW-Edition BehavesLike.Win32.StartPage.ch 20181115
Microsoft PWS:Win32/Stimilina.E!bit 20181115
eScan Generic.Delph.PWS.E06EBA9A 20181115
NANO-Antivirus Trojan.Win32.Stealer.fflqpr 20181115
Palo Alto Networks (Known Signatures) generic.ml 20181115
Panda Trj/Genetic.gen 20181114
Qihoo-360 Win32/Trojan.Ransom.c78 20181115
Rising Ransom.Blocker!8.12A (RDM+:cmRtazo+t7oincKDKEzUba22pNBn) 20181115
Sophos AV Troj/PWS-CJJ 20181115
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20181114
Symantec Trojan.Coinstealer 20181115
Tencent Win32.Trojan.Blocker.Wogb 20181115
TrendMicro TrojanSpy.Win32.CLIPBANKER.SMMR 20181115
TrendMicro-HouseCall TrojanSpy.Win32.CLIPBANKER.SMMR 20181115
VBA32 BScope.TrojanRansom.Blocker 20181114
VIPRE Trojan.Win32.Generic!BT 20181115
Webroot W32.Trojan.Gen 20181115
Yandex Trojan.Blocker!m3aQMhOteaA 20181113
ZoneAlarm by Check Point Trojan-Ransom.Win32.Blocker.lckf 20181115
AegisLab 20181115
Alibaba 20180921
Avast-Mobile 20181115
Babable 20180918
Baidu 20181115
Bkav 20181114
CMC 20181115
Cybereason 20180225
Cyren 20181115
eGambit 20181115
F-Prot 20181115
Kingsoft 20181115
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181108
TACHYON 20181115
TheHacker 20181113
TotalDefense 20181115
Trustlook 20181115
ViRobot 20181115
Zillya 20181114
Zoner 20181115
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001A1F8
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
FreeSid
DeleteDC
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
EnterCriticalSection
GetSystemInfo
FreeLibrary
QueryPerformanceCounter
ExitProcess
GetThreadLocale
GlobalUnlock
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CopyFileW
DeleteCriticalSection
GetStartupInfoA
GetLocaleInfoA
LocalAlloc
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateDirectoryW
GetCommandLineA
GlobalLock
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindNextFileW
WriteFile
GetCurrentProcess
DeleteFileW
FindFirstFileW
GetCurrentThreadId
LocalFree
InitializeCriticalSection
VirtualFree
GetFileAttributesW
Sleep
GetTickCount
GetVersion
GetProcAddress
VirtualAlloc
GetCurrentProcessId
LeaveCriticalSection
CoCreateInstance
OleInitialize
SysReAllocStringLen
SysFreeString
SysAllocStringLen
ReleaseDC
GetSystemMetrics
CharToOemBuffA
CharNextA
MessageBoxA
GetKeyboardType
GetDC
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
103424

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x1a1f8

InitializedDataSize
10752

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 6b15f2363ccfd0fabe5b2f9869ce0f9f
SHA1 ceea75a0ba833e2b0ed68d4ad825e5142ff8413d
SHA256 bdbe4e3ff7a86e5ab002f8884a37f06ae45dc53f9b8a4e180f77ee32d9456058
ssdeep
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Hxg/:Zzx7ZApszolIo7lf/ipT/H

authentihash c5056f227de380651a924b279d2dcec6769d27db945fb0f11bed945c4bf703d8
imphash 6d1f2b41411eacafcf447fc002d8cb00
File size 112.5 KB ( 115200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-11-15 08:28:17 UTC ( 6 months, 1 week ago )
Last submission 2018-11-15 08:28:17 UTC ( 6 months, 1 week ago )
File names ago.exe
Ms_Office.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections