× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cd67b58d7b6ead8b6c92470862d03624b551594ff766616a5db1c358bd416235
File name: modulus_y.dll
Detection ratio: 7 / 63
Analysis date: 2017-07-13 12:29:05 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Win32/Injector.DMUK 20170713
Fortinet W32/Generic.AC.3F1B0B!tr 20170629
K7AntiVirus Trojan ( 0050f5271 ) 20170713
K7GW Trojan ( 0050f5271 ) 20170713
NANO-Antivirus Trojan.Win32.GenericKD.epuihb 20170713
Panda Trj/GdSda.A 20170713
Rising Malware.Heuristic!ET#98% (rdm+) 20170713
Ad-Aware 20170713
AegisLab 20170713
AhnLab-V3 20170713
Alibaba 20170713
ALYac 20170713
Antiy-AVL 20170713
Arcabit 20170713
Avast 20170713
AVG 20170713
Avira (no cloud) 20170713
AVware 20170713
Baidu 20170713
BitDefender 20170713
Bkav 20170713
CAT-QuickHeal 20170713
ClamAV 20170713
CMC 20170713
Comodo 20170713
CrowdStrike Falcon (ML) 20170420
Cylance 20170713
Cyren 20170713
DrWeb 20170713
Emsisoft 20170713
Endgame 20170706
F-Prot 20170713
F-Secure 20170713
GData 20170713
Ikarus 20170713
Sophos ML 20170607
Jiangmin 20170713
Kaspersky 20170713
Kingsoft 20170713
Malwarebytes 20170713
MAX 20170713
McAfee 20170713
McAfee-GW-Edition 20170713
Microsoft 20170713
eScan 20170713
nProtect 20170713
Palo Alto Networks (Known Signatures) 20170713
Qihoo-360 20170713
SentinelOne (Static ML) 20170516
Sophos AV 20170713
SUPERAntiSpyware 20170713
Symantec 20170713
Symantec Mobile Insight 20170713
Tencent 20170713
TheHacker 20170712
TrendMicro 20170713
TrendMicro-HouseCall 20170713
Trustlook 20170713
VBA32 20170713
VIPRE 20170713
ViRobot 20170713
Webroot 20170713
WhiteArmor 20170713
Yandex 20170712
Zillya 20170712
ZoneAlarm by Check Point 20170713
Zoner 20170713
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Entry Point 0x00001060
Number of sections 10
PE sections
PE imports
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
GetModuleHandleA
GetLastError
VirtualQuery
TlsGetValue
VirtualProtect
GetProcAddress
LeaveCriticalSection
rand
malloc
_errno
fwrite
__dllonexit
strcmp
abort
free
exp
calloc
fflush
vfprintf
memcpy
_iob
PE exports
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

TimeStamp
0000:00:00 00:00:00

FileType
Win32 DLL

PEType
PE32

CodeSize
5120

LinkerVersion
2.24

FileTypeExtension
dll

InitializedDataSize
10240

SubsystemVersion
4.0

EntryPoint
0x1060

OSVersion
4.0

ImageVersion
1.0

UninitializedDataSize
512

File identification
MD5 31dc65ca056d93b266cfe5433025d9ea
SHA1 6d4eeb5b81a1f3d0515c05bec63543f96dd8b1c3
SHA256 cd67b58d7b6ead8b6c92470862d03624b551594ff766616a5db1c358bd416235
ssdeep
192:yz1Uk3GdOnEgHj4pP+HXGCZU8J6nUX98u:o1Un4pD4pP+HXRZ8UXqu

authentihash 58238f45514b4e27bd866ad83022eb905bb7112a24194a526591c6df53129e56
imphash ea223e59d7d312bf0e8ea2f2f89bf9ea
File size 11.0 KB ( 11264 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
VXD Driver (0.2%)
Tags
pedll

VirusTotal metadata
First submission 2017-07-13 12:29:05 UTC ( 1 year, 8 months ago )
Last submission 2017-07-13 12:29:05 UTC ( 1 year, 8 months ago )
File names modulus_y.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!