× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bf6282d96946847239394c27bd7610d028ca11ebe74068c34bbae005c4c3729a
File name: Yg3glC54mX.exe
Detection ratio: 43 / 68
Analysis date: 2018-07-15 17:52:41 UTC ( 7 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31088937 20180715
AegisLab Ml.Attribute.Gen!c 20180715
AhnLab-V3 Trojan/Win32.Emotet.R231661 20180715
ALYac Trojan.GenericKD.31088937 20180715
Antiy-AVL Trojan[Banker]/Win32.Emotet 20180715
Arcabit Trojan.Generic.D1DA6129 20180715
Avast Win32:Malware-gen 20180715
AVG Win32:Malware-gen 20180715
Avira (no cloud) TR/Crypt.Agent.lbwzb 20180714
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180712
BitDefender Trojan.GenericKD.31088937 20180715
ClamAV Win.Trojan.Agent-6609682-0 20180715
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cybereason malicious.761ec3 20180225
Cylance Unsafe 20180715
Cyren W32/Trojan.EEBK-3608 20180715
Emsisoft Trojan.GenericKD.31088937 (B) 20180715
Endgame malicious (high confidence) 20180711
ESET-NOD32 a variant of Win32/Kryptik.GITJ 20180715
F-Secure Trojan.GenericKD.31088937 20180715
Fortinet W32/Kryptik.GITJ!tr 20180715
GData Trojan.GenericKD.31088937 20180715
Ikarus Trojan.Win32.Crypt 20180715
Sophos ML heuristic 20180601
K7AntiVirus Trojan ( 005378611 ) 20180715
K7GW Trojan ( 005378611 ) 20180715
Kaspersky Trojan-Banker.Win32.Emotet.axgl 20180715
Malwarebytes Spyware.Emotet 20180715
MAX malware (ai score=99) 20180715
McAfee Emotet-FHK!C136DD353B05 20180715
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20180715
Microsoft Trojan:Win32/Emotet.AC!bit 20180715
eScan Trojan.GenericKD.31088937 20180715
Palo Alto Networks (Known Signatures) generic.ml 20180715
Panda Trj/GdSda.A 20180715
Qihoo-360 HEUR/QVM20.1.7651.Malware.Gen 20180715
SentinelOne (Static ML) static engine - malicious 20180701
Sophos AV Mal/EncPk-ANX 20180715
Symantec Trojan.Emotet 20180715
TrendMicro TROJ_GEN.R03FC0CGE18 20180715
TrendMicro-HouseCall TROJ_GEN.R03FC0CGE18 20180715
Webroot W32.Trojan.Emotet 20180715
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.axgl 20180715
Alibaba 20180713
Avast-Mobile 20180715
AVware 20180715
Babable 20180406
Bkav 20180713
CAT-QuickHeal 20180714
CMC 20180714
Comodo 20180715
DrWeb 20180715
eGambit 20180715
F-Prot 20180715
Jiangmin 20180715
Kingsoft 20180715
NANO-Antivirus 20180715
Rising 20180715
SUPERAntiSpyware 20180715
TACHYON 20180715
Tencent 20180715
TheHacker 20180712
TotalDefense 20180715
Trustlook 20180715
VBA32 20180713
VIPRE 20180715
ViRobot 20180715
Yandex 20180713
Zillya 20180713
Zoner 20180714
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Borte

Product Borte Physicon a Client
Original name Physicone.exe
File version 2, 0, 7, 0
Description Physicon
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-13 07:51:18
Entry Point 0x0000144E
Number of sections 4
PE sections
PE imports
CMP_WaitNoPendingInstallEvents
CreateDiscardableBitmap
HeapSetInformation
SetFilePointer
GetPriorityClass
GetNumaHighestNodeNumber
ReOpenFile
HeapDestroy
GetVolumeNameForVolumeMountPointW
RequestWakeupLatency
GetConsoleProcessList
GetCommandLineA
Thread32First
SleepEx
Process32FirstW
RpcBindingFromStringBindingW
SetupDiCreateDeviceInterfaceW
PathAddBackslashA
GetSubMenu
ReuseDDElParam
GetScrollInfo
OpenWindowStationW
GetMenuState
SetForegroundWindow
ExcludeUpdateRgn
RealChildWindowFromPoint
GetUpdateRect
GetFocus
SCardGetProviderIdW
Number of PE resources by type
RT_STRING 13
RT_DIALOG 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 14
FRENCH 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:07:13 00:51:18-07:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
11.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x144e

InitializedDataSize
94208

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 c136dd353b0545bfb76c757ee04d4788
SHA1 4a5f3b0761ec34697818626b87f8ebb20c10eaf6
SHA256 bf6282d96946847239394c27bd7610d028ca11ebe74068c34bbae005c4c3729a
ssdeep
1536:WpEhHCzuBYlAru8XiR2VLBT+ZK3IfB0LJQmGwfSmoZs:3iOYuSVRaT+ZK4p0LJ4wSmoa

authentihash 82be5a19a3b24ca02155addf5b39db920969d6992b9cd3d1b3e413714b89ff63
imphash e56a8d8caa4033e8ffee1b31eb87438b
File size 104.0 KB ( 106496 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-07-13 00:54:19 UTC ( 7 months, 1 week ago )
Last submission 2018-07-23 13:25:08 UTC ( 6 months, 4 weeks ago )
File names enumsprime.exe
Yg3glC54mX.exe
Physicone.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!