× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d063bb86015e4800b2a136cb32733bdf3b3da9e5f92dbb509d6687b4e6599f14
File name: 929b979848c2ebd3361fb141e5e6d03fa1a1355b
Detection ratio: 26 / 68
Analysis date: 2018-09-18 05:23:56 UTC ( 5 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180918
AVG FileRepMalware 20180918
CAT-QuickHeal Trojan.Emotet.X4 20180917
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cylance Unsafe 20180918
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.BAUN 20180918
Fortinet W32/GenKryptik.CLJC!tr 20180918
GData Win32.Trojan-Spy.Emotet.CCI5BK 20180918
Ikarus Win32.Outbreak 20180917
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180918
Malwarebytes Trojan.Emotet 20180918
McAfee RDN/Generic.grp 20180918
McAfee-GW-Edition BehavesLike.Win32.Backdoor.fm 20180918
Microsoft Trojan:Win32/Emotet.AC!bit 20180918
Palo Alto Networks (Known Signatures) generic.ml 20180918
Qihoo-360 HEUR/QVM20.1.F0DF.Malware.Gen 20180918
Rising Trojan.Emotet!8.B95 (CLOUD) 20180918
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/Generic-S 20180918
Symantec Trojan.Emotet 20180918
TrendMicro TROJ_FRS.VSN11I18 20180918
TrendMicro-HouseCall TROJ_FRS.VSN11I18 20180918
Webroot W32.Trojan.Emotet 20180918
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180918
Ad-Aware 20180917
AegisLab 20180918
AhnLab-V3 20180917
Alibaba 20180713
ALYac 20180918
Antiy-AVL 20180918
Arcabit 20180918
Avast-Mobile 20180917
Avira (no cloud) 20180917
AVware 20180918
Babable 20180918
Baidu 20180914
BitDefender 20180918
Bkav 20180917
ClamAV 20180918
CMC 20180917
Comodo 20180918
Cybereason 20180225
Cyren 20180918
DrWeb 20180918
eGambit 20180918
Emsisoft 20180918
F-Prot 20180918
F-Secure 20180918
Jiangmin 20180917
K7AntiVirus 20180918
K7GW 20180918
Kingsoft 20180918
MAX 20180918
eScan 20180918
NANO-Antivirus 20180918
Panda 20180917
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180918
Tencent 20180918
TheHacker 20180914
TotalDefense 20180918
Trustlook 20180918
VBA32 20180917
VIPRE 20180918
ViRobot 20180917
Yandex 20180917
Zillya 20180917
Zoner 20180917
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

Product Mozilla
Internal name uconv
File version Personal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-17 21:15:21
Entry Point 0x0001FFF2
Number of sections 8
PE sections
PE imports
CryptDestroyKey
IsValidAcl
InitiateSystemShutdownA
GetFileSecurityW
MakeSelfRelativeSD
CryptSetHashParam
RegDeleteValueA
QueryUsersOnEncryptedFile
DeleteAce
AVIStreamStart
ImageList_SetBkColor
PageSetupDlgA
ChooseFontA
CryptMsgSignCTL
PFXExportCertStoreEx
CryptStringToBinaryA
GetGlyphIndicesW
PaintRgn
SetArcDirection
ArcTo
ImmGetCompositionWindow
GetIpAddrTable
CreateFileMappingW
ReplaceFileA
GetDateFormatA
EnumResourceTypesA
InterlockedDecrement
GetProcessShutdownParameters
SetCommConfig
MapViewOfFileEx
OpenSemaphoreA
_lopen
GetTickCount
TlsSetValue
DeleteTimerQueueTimer
IsDBCSLeadByte
AddRefActCtx
GetStringTypeW
GetModuleHandleA
FindFirstChangeNotificationW
MprAdminPortEnum
MprConfigInterfaceGetInfo
acmStreamOpen
ICSeqCompressFrameStart
ICDrawBegin
NetLocalGroupGetMembers
NetLocalGroupAddMembers
NetApiBufferReallocate
VARIANT_UserFree
SafeArrayAllocDescriptorEx
BSTR_UserFree
RevokeActiveObject
RasGetAutodialAddressA
RasGetEntryPropertiesA
RpcServerTestCancel
NdrSimpleTypeUnmarshall
I_RpcNegotiateTransferSyntax
NdrAsyncServerCall
SetupDiSetDeviceInstallParamsA
CM_Get_Device_Interface_List_SizeW
CM_Get_DevNode_Custom_PropertyW
SetupDiSelectDevice
SetupDiGetClassDescriptionExA
SetupDiGetDeviceInstanceIdW
ShellAboutA
Shell_NotifyIconA
AssocQueryKeyW
PathUnExpandEnvStringsW
StrRChrW
PathFileExistsW
ChrCmpIW
PathGetArgsA
PathFindOnPathW
SHRegOpenUSKeyA
StrStrW
SHRegWriteUSValueW
TranslateNameW
GetUserNameExA
EmptyClipboard
GetSysColorBrush
OemToCharBuffA
ScrollWindowEx
SetRectEmpty
CharLowerW
GetDlgItemInt
SetActiveWindow
CreateCursor
ReleaseDC
GetRawInputDeviceInfoW
GetRawInputData
CharLowerBuffA
BringWindowToTop
SetScrollRange
IsCharLowerW
InvalidateRect
LoadMenuIndirectA
FindWindowExA
GetDesktopWindow
CopyAcceleratorTableW
SetScrollInfo
CloseClipboard
GetMenuContextHelpId
InternetOpenUrlW
CloseDriver
timeGetTime
mciGetCreatorTask
midiOutMessage
timeSetEvent
mixerGetControlDetailsA
CryptCATAdminAddCatalog
CryptCATGetMemberInfo
CryptCATCDFEnumAttributes
WTHelperGetProvCertFromChain
getpeername
getservbyport
SCardListCardsW
SCardGetStatusChangeA
wcscoll
setvbuf
getchar
HGLOBAL_UserFree
RegisterDragDrop
OleIsRunning
CoSwitchCallContext
CoResumeClassObjects
FreePropVariantArray
PropVariantClear
HICON_UserSize
CoGetObjectContext
PdhBrowseCountersW
PdhOpenQueryH
CoInternetIsFeatureEnabledForUrl
RegisterBindStatusCallback
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
258048

EntryPoint
0x1fff2

MIMEType
application/octet-stream

LegalCopyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

FileVersion
Personal

TimeStamp
2018:09:17 22:15:21+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
uconv

ProductVersion
Personal

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mozilla, Netscape

LegalTrademarks
Mozilla, Netscape

ProductName
Mozilla

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 151cea0bdf7b2ca6fad484b45346d5da
SHA1 929b979848c2ebd3361fb141e5e6d03fa1a1355b
SHA256 d063bb86015e4800b2a136cb32733bdf3b3da9e5f92dbb509d6687b4e6599f14
ssdeep
6144:b84TzHC4ZzZlOgZFJnR1f7jHdtiCAN9MTQTS:bxHzz7RnzjH+79ME

authentihash 731737644124e10958accab6044fc19180511954f65f91d1b368c88af89040f8
imphash d0ca54d34f442e7c388ac390797f4e8b
File size 378.0 KB ( 387072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-17 21:18:09 UTC ( 5 months ago )
Last submission 2018-09-18 03:29:43 UTC ( 5 months ago )
File names 3KGtHrGUsaQ.exe
OkcHWVSgM55g.exe
ezZAYSwN.exe
929b979848c2ebd3361fb141e5e6d03fa1a1355b
ukinGifDPwda.exe
qrTMGocztw.exe
255.exe
uconv
ByW9uAec2Bj.exe
zbetcheckin_tracker_Hlathh5I
967.exe
69v8rKzL2b3.exe
BvTfYQjv4.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs