× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: be2c8df7127362672641d9988812e70949e3d0f0f2470d521a492a493f228885
File name: KDQGP3.exe
Detection ratio: 29 / 68
Analysis date: 2018-06-20 23:47:32 UTC ( 8 months ago ) View latest
Antivirus Result Update
AegisLab Ml.Attribute.Gen!c 20180620
AhnLab-V3 Trojan/Win32.Emotet.R230293 20180620
Avast Win32:Malware-gen 20180620
AVG Win32:Malware-gen 20180620
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180620
Comodo CloudScanner.Trojan.Gen 20180620
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cylance Unsafe 20180621
Cyren W32/Emotet.CJ.gen!Eldorado 20180620
Emsisoft Trojan.Emotet (A) 20180620
Endgame malicious (high confidence) 20180612
ESET-NOD32 Win32/Emotet.BK 20180620
F-Prot W32/Emotet.CJ.gen!Eldorado 20180620
Fortinet W32/Kryptik.GHOI!tr 20180620
GData Win32.Trojan-Spy.Emotet.RP 20180620
Ikarus Trojan-Banker.Emotet 20180620
Sophos ML heuristic 20180601
Kaspersky Trojan.Win32.Dovs.ovv 20180620
Malwarebytes Trojan.Emotet 20180620
McAfee Emotet-FGR!E7AD0C5248D1 20180620
McAfee-GW-Edition BehavesLike.Win32.ZeroAccess.fm 20180620
Palo Alto Networks (Known Signatures) generic.ml 20180621
Panda Trj/Genetic.gen 20180620
Qihoo-360 HEUR/QVM20.1.F877.Malware.Gen 20180621
Sophos AV Mal/EncPk-ANR 20180620
Symantec ML.Attribute.HighConfidence 20180620
TrendMicro-HouseCall Suspicious_GEN.F47V0620 20180620
Webroot W32.Trojan.Emotet 20180621
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180620
Ad-Aware 20180620
Alibaba 20180620
ALYac 20180620
Antiy-AVL 20180621
Arcabit 20180620
Avast-Mobile 20180620
Avira (no cloud) 20180620
AVware 20180620
Babable 20180406
BitDefender 20180620
Bkav 20180620
CAT-QuickHeal 20180620
ClamAV 20180620
CMC 20180620
Cybereason 20180225
DrWeb 20180620
eGambit 20180621
F-Secure 20180620
Jiangmin 20180620
K7AntiVirus 20180620
K7GW 20180620
Kingsoft 20180621
MAX 20180621
Microsoft 20180620
eScan 20180620
NANO-Antivirus 20180620
Rising 20180620
SentinelOne (Static ML) 20180618
SUPERAntiSpyware 20180620
Symantec Mobile Insight 20180619
TACHYON 20180620
Tencent 20180621
TheHacker 20180619
TotalDefense 20180620
TrendMicro 20180620
Trustlook 20180621
VBA32 20180620
VIPRE 20180620
ViRobot 20180620
Yandex 20180620
Zillya 20180620
Zoner 20180620
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Uniscri
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-20 19:30:53
Entry Point 0x0000100F
Number of sections 6
PE sections
PE imports
NotifyBootConfigStatus
CryptReleaseContext
OpenSCManagerW
RegEnumKeyW
LookupPrivilegeDisplayNameA
QueryServiceConfigW
ClusterRegSetValue
ClusterRegCreateKey
ImageList_Create
CertFindSubjectInSortedCTL
CertCreateCertificateChainEngine
CertSaveStore
CertGetEnhancedKeyUsage
JetCommitTransaction
GetKerningPairsW
LineTo
SetAbortProc
SetColorAdjustment
CopyEnhMetaFileW
SetLayout
CreateFontIndirectA
DeleteDC
CreateRectRgnIndirect
CreateEnhMetaFileA
CreateDIBSection
GetTextFaceA
EnumFontFamiliesW
GetLayout
ImmConfigureIMEW
GetSystemDefaultLangID
SetVolumeLabelA
WinExec
WaitForDebugEvent
SetTimeZoneInformation
Process32First
SetCalendarInfoW
GetStartupInfoW
SetEndOfFile
FlushFileBuffers
GetModuleFileNameA
FlsFree
GetBinaryTypeA
FindActCtxSectionStringW
LZSeek
LZOpenFileW
MprAdminInterfaceDisconnect
MprAdminInterfaceSetInfo
NetServerGetInfo
NetShareEnumSticky
BSTR_UserSize
LHashValOfNameSys
VariantTimeToSystemTime
VariantCopyInd
glTexCoord2f
UuidToStringA
NdrClientInitializeNew
RpcMgmtWaitServerListen
NdrOleAllocate
SetupGetTargetPathW
SetupDiSetDeviceRegistryPropertyA
SetupDiGetINFClassW
CM_Get_Resource_Conflict_DetailsW
SetupDiInstallClassW
SetupDiBuildDriverInfoList
SetupOpenMasterInf
SetupDiGetClassInstallParamsA
SHSetLocalizedName
PathAddBackslashA
SHGetInverseCMAP
PathIsRelativeA
UrlIsW
PathRemoveArgsW
PathRenameExtensionA
PathCanonicalizeW
AcquireCredentialsHandleW
wsprintfA
EnumPropsA
CreateMenu
GetMessagePos
PeekMessageW
GetScrollRange
GetInputState
GetMessageExtraInfo
AnyPopup
MoveWindow
BroadcastSystemMessageA
GetDialogBaseUnits
GetMonitorInfoA
EnumWindowStationsA
GetWindowContextHelpId
CloseWindowStation
GetClipCursor
FtpOpenFileA
SendDriverMessage
mmioAscend
waveOutGetID
timeBeginPeriod
GetPrinterDriverW
WTHelperProvDataFromStateData
wcstod
iswpunct
fgetws
fputws
CoUnmarshalInterface
WriteClassStm
CoMarshalHresult
StringFromCLSID
CoDisconnectObject
HBITMAP_UserUnmarshal
PdhEnumObjectItemsHW
IsAsyncMoniker
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 21
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
HEBREW DEFAULT 1
HUNGARIAN DEFAULT 1
VIETNAMESE DEFAULT 1
CHINESE SIMPLIFIED 1
SLOVENIAN DEFAULT 1
CZECH DEFAULT 1
FINNISH DEFAULT 1
KOREAN 1
NEUTRAL DEFAULT 1
PORTUGUESE 1
POLISH DEFAULT 1
JAPANESE DEFAULT 1
DANISH DEFAULT 1
SLOVAK DEFAULT 1
GREEK DEFAULT 1
TURKISH DEFAULT 1
ROMANIAN 1
THAI DEFAULT 1
SERBIAN DEFAULT 1
NEUTRAL 1
RUSSIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Uniscri

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
236032

EntryPoint
0x100f

MIMEType
application/octet-stream

TimeStamp
2018:06:20 20:30:53+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0626.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Realtek Semiconductor Corporation

CodeSize
109056

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 e7ad0c5248d1411b8bd5e68810d170d1
SHA1 a54633c5fef989f33b170444a043df9d33dd812d
SHA256 be2c8df7127362672641d9988812e70949e3d0f0f2470d521a492a493f228885
ssdeep
1536:Huja+EaN+FkwOLBMNot31NwWGLi1peds3NKUcPvr1WiCc9nxnhS2Xxywl3/Dbu/f:HMg+ZYWFATczJnvM1g/5Jv3m

authentihash 7488885d98b7b7d9511a0aac931b65e767a78f8cbbb6c8b8d7436ba73389da1a
imphash efb9aa8304014b280aed271b674cba3d
File size 333.0 KB ( 340992 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-20 12:32:29 UTC ( 8 months ago )
Last submission 2018-06-20 12:32:29 UTC ( 8 months ago )
File names KDQGP3.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!