× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bfd5bfd30bc2c237ae618b531aaf3d8ea549718268c0cb8dc0308d99697fed7f
File name: document-classification-sdk.exe
Detection ratio: 5 / 69
Analysis date: 2019-04-22 08:28:23 UTC ( 1 month ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) win/malicious_confidence_60% (W) 20190212
Cybereason malicious.66a1c7 20190417
Endgame malicious (moderate confidence) 20190403
Sophos ML heuristic 20190313
SentinelOne (Static ML) DFI - Malicious PE 20190420
Acronis 20190419
Ad-Aware 20190422
AegisLab 20190422
AhnLab-V3 20190422
Alibaba 20190401
ALYac 20190422
Arcabit 20190422
Avast 20190422
Avast-Mobile 20190415
AVG 20190422
Avira (no cloud) 20190422
Baidu 20190318
BitDefender 20190422
CAT-QuickHeal 20190422
ClamAV 20190422
CMC 20190321
Comodo 20190422
Cylance 20190422
Cyren 20190422
DrWeb 20190422
eGambit 20190422
Emsisoft 20190422
ESET-NOD32 20190422
F-Prot 20190422
F-Secure 20190421
FireEye 20190422
Fortinet 20190422
GData 20190422
Ikarus 20190422
Jiangmin 20190422
K7AntiVirus 20190422
K7GW 20190422
Kaspersky 20190422
Kingsoft 20190422
Malwarebytes 20190422
MAX 20190422
MaxSecure 20190420
McAfee 20190422
McAfee-GW-Edition 20190422
Microsoft 20190422
eScan 20190422
NANO-Antivirus 20190422
Palo Alto Networks (Known Signatures) 20190422
Panda 20190422
Qihoo-360 20190422
Rising 20190422
Sophos AV 20190422
SUPERAntiSpyware 20190418
Symantec 20190422
Symantec Mobile Insight 20190418
TACHYON 20190422
Tencent 20190422
TheHacker 20190421
TotalDefense 20190416
Trapmine 20190325
TrendMicro 20190422
TrendMicro-HouseCall 20190422
Trustlook 20190422
VBA32 20190422
ViRobot 20190422
Webroot 20190422
Yandex 20190419
Zillya 20190419
ZoneAlarm by Check Point 20190422
Zoner 20190421
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
F-PROT appended, Unicode, ZIP, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-08-14 19:15:54
Entry Point 0x0000FCE7
Number of sections 6
PE sections
Overlays
MD5 d4e8760ff6d93e8347c99e7799fcb254
File type application/zip
Offset 204288
Size 254940
Entropy 8.00
PE imports
GetStdHandle
FileTimeToSystemTime
WaitForSingleObject
FindNextFileA
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
OpenFileMappingW
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
GetLocaleInfoW
SetStdHandle
SetFilePointerEx
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
AllocConsole
TlsGetValue
MoveFileW
SetFileAttributesW
SetLastError
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FoldStringW
GetFullPathNameW
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TzSpecificLocalTimeToSystemTime
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
RtlUnwind
DecodePointer
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
ExpandEnvironmentStringsW
FindFirstFileExA
FindNextFileW
FreeConsole
FindFirstFileW
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
AttachConsole
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
GetConsoleCP
FindResourceW
CompareStringW
GetEnvironmentStringsW
IsDBCSLeadByte
GlobalAlloc
FileTimeToLocalFileTime
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
UnmapViewOfFile
GetTempPathW
Sleep
GetOEMCP
Number of PE resources by type
RT_STRING 10
RT_DIALOG 6
RT_ICON 4
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 23
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:08:14 21:15:54+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
135168

LinkerVersion
14.0

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0xfce7

InitializedDataSize
250368

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 09410369c299ec72a1108cdab724a86f
SHA1 0de182066a1c7446db788c20bd18c8afb74c2907
SHA256 bfd5bfd30bc2c237ae618b531aaf3d8ea549718268c0cb8dc0308d99697fed7f
ssdeep
12288:lUBgyoyvfNacziEhAilUNRwxr62DLBQDWqgK:lUXvfNa2DAiaNYrBDLBC1

authentihash 9d3e2e3e8c95965050027b436b3acc59351f4767edd08bef90a6010afacae3ce
imphash 49091c5c46d1ed156931ed11f43d3afa
File size 448.5 KB ( 459228 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-04-25 08:36:39 UTC ( 2 years, 1 month ago )
Last submission 2018-10-09 06:24:00 UTC ( 7 months, 2 weeks ago )
File names document-classification-sdk.exe
document-classification-sdk.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
UDP communications