× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cb1db6c4a785c2b5a0c1e97452b6c55eaa214b3b203cd1efcf98c45a0e269dc1
File name: EhEiDg63hTEQzwyXZZo.exe
Detection ratio: 33 / 66
Analysis date: 2018-11-06 04:38:16 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40705328 20181106
ALYac Trojan.GenericKD.40705328 20181106
Arcabit Trojan.Generic.D26D1D30 20181106
Avast Win32:BankerX-gen [Trj] 20181106
AVG Win32:BankerX-gen [Trj] 20181106
Bkav HW32.Packed. 20181102
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.889565 20180225
Cylance Unsafe 20181106
Emsisoft Trojan.GenericKD.40705328 (B) 20181106
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.CPZQ 20181106
F-Secure Trojan.GenericKD.40705328 20181106
Fortinet W32/GenKryptik.CPZQ!tr 20181106
GData Trojan.GenericKD.40705328 20181106
Ikarus Trojan.Win32.Krypt 20181105
Sophos ML heuristic 20180717
K7AntiVirus Trojan ( 005406151 ) 20181105
K7GW Trojan ( 005406151 ) 20181105
Kaspersky Trojan-Banker.Win32.Emotet.bnxr 20181106
MAX malware (ai score=100) 20181106
McAfee RDN/Generic.grp 20181106
McAfee-GW-Edition BehavesLike.Win32.Backdoor.cc 20181106
Microsoft Trojan:Win32/Emotet.AC!bit 20181106
Palo Alto Networks (Known Signatures) generic.ml 20181106
Panda Trj/RnkBend.A 20181105
Qihoo-360 Win32/Trojan.88c 20181106
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANY 20181106
Symantec Trojan.Emotet 20181105
TACHYON Banker/W32.Emotet.131072.AM 20181106
Webroot W32.Trojan.Emotet 20181106
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bnxr 20181106
AegisLab 20181106
AhnLab-V3 20181106
Alibaba 20180921
Antiy-AVL 20181106
Avast-Mobile 20181105
Avira (no cloud) 20181105
Babable 20180918
Baidu 20181105
CAT-QuickHeal 20181105
ClamAV 20181106
CMC 20181106
Cyren 20181106
DrWeb 20181106
eGambit 20181106
F-Prot 20181106
Jiangmin 20181106
Kingsoft 20181106
eScan 20181106
NANO-Antivirus 20181106
Rising 20181106
SUPERAntiSpyware 20181031
Symantec Mobile Insight 20181105
Tencent 20181106
TheHacker 20181104
TotalDefense 20181105
TrendMicro 20181106
TrendMicro-HouseCall 20181106
Trustlook 20181106
VBA32 20181105
VIPRE 20181105
ViRobot 20181105
Yandex 20181102
Zillya 20181105
Zoner 20181106
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name perca
File version 1.0
Description PerkalView
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1996-06-16 21:58:56
Entry Point 0x00003980
Number of sections 6
PE sections
PE imports
AdjustTokenPrivileges
RegOpenUserClassesRoot
AllocateLocallyUniqueId
MapGenericMask
GetRandomRgn
GetCurrentObject
CloseEnhMetaFile
PathToRegion
GetInterfaceInfo
GetNamedPipeClientProcessId
TransmitCommChar
SetThreadPriorityBoost
TerminateThread
AddAtomA
IsSystemResumeAutomatic
GetProcessIdOfThread
GetPriorityClass
GetCommandLineW
FreeConsole
GetNumberOfConsoleMouseButtons
CompareStringOrdinal
AddRefActCtx
acmMetrics
VarBstrCat
NdrAsyncServerCall
SetupDiBuildDriverInfoList
StrCmpNIW
GetCursorPos
DrawEdge
NotifyWinEvent
OpenInputDesktop
InternalGetWindowText
GetWindowThreadProcessId
GetActiveWindow
SetCaretBlinkTime
IsDlgButtonChecked
GetSystemMenu
ToUnicode
SetMenuDefaultItem
GetForegroundWindow
SetScrollPos
SendMessageCallbackW
DeleteUrlCacheEntry
mmioOpenA
setlocale
ReleaseStgMedium
PdhBindInputDataSourceW
Number of PE resources by type
RT_STRING 3
RT_VERSION 1
Number of PE resources by language
NORWEGIAN BOKMAL 4
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
13.0

ImageVersion
0.1

FileVersionNumber
1.6.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
PerkalView

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

Ht
Microsoft Corporation. All r

EntryPoint
0x3980

MIMEType
application/octet-stream

FileVersion
1.0

TimeStamp
1996:06:16 21:58:56+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
perca

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Micro

TVersion
1.0

CodeSize
12288

FileSubtype
0

ProductVersionNumber
1.6.0.0

InitializedDataSize
147456

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 6957335382a9b3a4d98ccff6e1dca50e
SHA1 7f1f118889565c231fd886005f1a585d1e0c38d8
SHA256 cb1db6c4a785c2b5a0c1e97452b6c55eaa214b3b203cd1efcf98c45a0e269dc1
ssdeep
3072:qbyBEqFLnBYH7sngDTqa6gjuv77jEjvPt3iufnd:qbyBjBYbs0OtgjuvoNR

authentihash 2d730875f50438744d28d85ab74fc3ae32f0e8e54676ad281a2d56ad580518ac
imphash 41af1ac5f271d6f6a600ee4338d926e8
File size 128.0 KB ( 131072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-04 15:00:08 UTC ( 3 months, 2 weeks ago )
Last submission 2018-11-04 15:00:08 UTC ( 3 months, 2 weeks ago )
File names perca
EhEiDg63hTEQzwyXZZo.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!