× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: be87b6c7afc14145e94fc33a3aa1e5aa7e0bc0ad6d579bd6d1ea2aefb02249f9
File name: zbetcheckin_tracker_de48c27690ae4ca7fa9b25f6d715e2a2
Detection ratio: 26 / 66
Analysis date: 2019-03-26 20:38:47 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190326
Ad-Aware Trojan.Jamg.K 20190326
Arcabit Trojan.Jamg.K 20190326
BitDefender Trojan.Agent.DSLD 20190326
CrowdStrike Falcon (ML) win/malicious_confidence_100% (D) 20190212
Cybereason malicious.7c9cad 20190325
eGambit Unsafe.AI_Score_55% 20190326
Emsisoft Trojan.Agent.DSLD (B) 20190326
Endgame malicious (high confidence) 20190322
ESET-NOD32 a variant of Win32/Kryptik.GRFS 20190326
FireEye Generic.mg.de48c27690ae4ca7 20190326
Fortinet W32/Generic.AP.290658!tr 20190326
GData Trojan.Agent.DSLD 20190326
Ikarus Trojan-Banker.Emotet 20190326
Sophos ML heuristic 20190313
Malwarebytes Trojan.Emotet 20190326
MAX malware (ai score=84) 20190326
McAfee Emotet-FMI!DE48C27690AE 20190326
eScan Trojan.Jamg.K 20190326
Panda Trj/GdSda.A 20190326
Qihoo-360 HEUR/QVM20.1.1BC9.Malware.Gen 20190326
Rising Trojan.Kryptik!8.8 (RDM+:cmRtazr2+zIhcPimiKO8CFFDDpvQ) 20190326
SentinelOne (Static ML) DFI - Malicious PE 20190317
Sophos AV Mal/Emotet-Q 20190326
Trapmine malicious.high.ml.score 20190325
VBA32 BScope.Malware-Cryptor.Emotet 20190326
AegisLab 20190326
AhnLab-V3 20190326
Alibaba 20190306
ALYac 20190326
Antiy-AVL 20190326
Avast 20190326
Avast-Mobile 20190326
AVG 20190326
Avira (no cloud) 20190326
Babable 20180918
Baidu 20190318
Bkav 20190326
CAT-QuickHeal 20190326
ClamAV 20190326
CMC 20190321
Comodo 20190326
Cyren 20190326
DrWeb 20190326
F-Secure 20190326
Jiangmin 20190326
K7AntiVirus 20190326
K7GW 20190326
Kaspersky 20190326
Kingsoft 20190326
McAfee-GW-Edition 20190326
Microsoft 20190326
NANO-Antivirus 20190326
Palo Alto Networks (Known Signatures) 20190326
SUPERAntiSpyware 20190321
Symantec Mobile Insight 20190325
TACHYON 20190326
Tencent 20190326
TheHacker 20190324
TotalDefense 20190326
TrendMicro-HouseCall 20190326
Trustlook 20190326
ViRobot 20190326
Yandex 20190326
Zillya 20190326
ZoneAlarm by Check Point 20190326
Zoner 20190326
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
C)Advanced PDF Converter, All Rights Reserved

File version Version 5.0
Description TODO: <File description>
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 9:10 PM 3/28/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-26 20:23:16
Entry Point 0x0001DC90
Number of sections 4
PE sections
Overlays
MD5 89381f2ca5ea47347e49c63077cea40a
File type data
Offset 236032
Size 3336
Entropy 7.32
PE imports
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmNotifyIME
ImmGetCompositionStringA
ImmGetContext
ImmSetCandidateWindow
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmSetCompositionFontA
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
SetEvent
HeapDestroy
SetFileTime
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
EnumResourceLanguagesW
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
FindResourceExW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GetStringTypeExW
FindClose
InterlockedDecrement
MoveFileW
GetFullPathNameW
WritePrivateProfileStringW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
GlobalFindAtomW
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
lstrcmpiW
EnumSystemLocalesA
SetConsoleCtrlHandler
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
GetPrivateProfileStringW
SetFilePointer
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
UnlockFile
ExitThread
SetEnvironmentVariableA
FindAtomW
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
CreateEventW
SetEndOfFile
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
OpenThread
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetVersionExA
LoadLibraryA
RtlUnwind
GlobalSize
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
LCMapStringW
OpenProcess
GetStartupInfoW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
AddAtomW
GetProcessHeap
GetComputerNameW
WriteFile
GetFileSizeEx
WTSGetActiveConsoleSessionId
GetTimeFormatA
FindFirstFileW
IsValidLocale
DuplicateHandle
GetProcAddress
GetTimeZoneInformation
CreateFileW
GetFileType
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
GlobalDeleteAtom
GetShortPathNameW
VirtualAllocEx
GetConsoleCP
FindResourceW
LCMapStringA
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
Process32NextW
CreateProcessW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
ProcessIdToSessionId
GetCommandLineW
HeapSize
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
SuspendThread
RaiseException
GetModuleHandleA
ReadFile
GlobalFlags
DeleteAtom
CloseHandle
OpenMutexW
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
SetStdHandle
GetLongPathNameW
IsValidCodePage
HeapCreate
GetTempPathW
VirtualFree
Sleep
TerminateProcess
VirtualAlloc
CompareStringA
SetFocus
GetForegroundWindow
SetMenuItemBitmaps
LoadBitmapW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
ScrollWindowEx
SetDlgItemInt
IntersectRect
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
GetDlgItemTextW
SetScrollPos
CallNextHookEx
GetTopWindow
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
GetActiveWindow
DrawTextW
GetMenuItemID
DestroyWindow
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
CheckRadioButton
GetMessageW
ShowWindow
SetPropW
GetDesktopWindow
PeekMessageW
EnableWindow
SetWindowPlacement
CharUpperW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
GetDlgItemInt
GetMenuBarInfo
SetParent
RegisterClassW
ScrollWindow
GetWindowPlacement
LoadStringW
SetWindowLongW
WindowFromPoint
IsIconic
TrackPopupMenuEx
GetSubMenu
GetDCEx
IsDialogMessageW
FillRect
CopyRect
GetSysColorBrush
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetMenuItemInfoW
IsChild
MapWindowPoints
RegisterWindowMessageW
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
MapVirtualKeyW
GetParent
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
GetScrollRange
SendDlgItemMessageW
PostMessageW
GetScrollInfo
CreatePopupMenu
CheckMenuItem
GetClassLongW
GetLastActivePopup
PtInRect
BeginDeferWindowPos
SetWindowTextW
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ClientToScreen
TrackPopupMenu
GetMenuItemCount
IsDlgButtonChecked
CheckDlgButton
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
GetMenuStringW
DrawTextExW
EndDialog
ModifyMenuW
GetCapture
ScreenToClient
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
MessageBoxW
SendMessageW
SetMenu
MoveWindow
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetSysColor
SetDlgItemTextW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
wsprintfW
IsWindowVisible
WinHelpW
UnpackDDElParam
SystemParametersInfoW
UnionRect
SetRect
GetKeyNameTextW
CallWindowProcW
GetClassNameW
GetClientRect
ValidateRect
IsRectEmpty
GetFocus
InsertMenuItemW
UnhookWindowsHookEx
RemovePropW
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 14
RT_DIALOG 12
RT_ICON 5
RT_BITMAP 4
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 60
CHINESE SIMPLIFIED 9
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
115712

ImageVersion
0.0

FileVersionNumber
5.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
9.0

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
Version 5.0

TimeStamp
2019:03:26 21:23:16+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
5.0

FileDescription
TODO: <File description>

OSVersion
5.0

FileOS
Win32

LegalCopyright
C)Advanced PDF Converter, All Rights Reserved

MachineType
Intel 386 or later, and compatibles

CompanyName
TODO: <Company name>

CodeSize
119296

FileSubtype
0

ProductVersionNumber
5.0.0.0

EntryPoint
0x1dc90

ObjectFileType
Executable application

File identification
MD5 de48c27690ae4ca7fa9b25f6d715e2a2
SHA1 1cc44e27c9cadc1ca596895d19180ace0f2819b4
SHA256 be87b6c7afc14145e94fc33a3aa1e5aa7e0bc0ad6d579bd6d1ea2aefb02249f9
ssdeep
3072:ioGbF2ny0ViOfTOp3ORLYkGQXOa+8ZpDySU7fqMvVXAEuwkil0WtapmOgC9RPbk0:UMnyK/TTZEhvB0iIpVRPbkZ9rVy

authentihash 6886ec4c9364d8942304df70046eb7e2f6c1c71366905e9c1de94da1fa492e5c
imphash 8b0dc580501f8c397056bf60d713e31e
File size 233.8 KB ( 239368 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-26 20:38:47 UTC ( 2 months ago )
Last submission 2019-03-27 02:47:03 UTC ( 2 months ago )
File names I2_VJ.exe
emotet_e2_be87b6c7afc14145e94fc33a3aa1e5aa7e0bc0ad6d579bd6d1ea2aefb02249f9_2019-03-26__203002.exe_
zbetcheckin_tracker_de48c27690ae4ca7fa9b25f6d715e2a2
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs