× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d171acea3af3a65054dbc1478a4a7b444178810852c17a8f0c5f74d05458b15b
File name: d171acea3af3a65054dbc1478a4a7b444178810852c17a8f0c5f74d05458b15b
Detection ratio: 16 / 70
Analysis date: 2018-12-14 15:38:04 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Avira (no cloud) HEUR/AGEN.1033191 20181214
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.84cb03 20180225
Cylance Unsafe 20181214
eGambit Unsafe.AI_Score_99% 20181214
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181214
K7GW Spyware ( 005068aa1 ) 20181214
Microsoft Trojan:Win32/Fuerboos.A!cl 20181214
Qihoo-360 HEUR/QVM20.1.DCCB.Malware.Gen 20181214
Rising Trojan.Fuerboos!8.EFC8 (TFE:2:xBEn8WEcuzM) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANX 20181214
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181213
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
Emsisoft 20181214
ESET-NOD32 20181214
F-Prot 20181214
F-Secure 20181214
Fortinet 20181214
GData 20181214
Ikarus 20181214
Jiangmin 20181214
Kaspersky 20181214
Kingsoft 20181214
Malwarebytes 20181214
MAX 20181214
McAfee 20181214
McAfee-GW-Edition 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TotalDefense 20181214
TrendMicro 20181214
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
VIPRE 20181213
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-14 23:32:01
Entry Point 0x00007742
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
ExcludeClipRect
GetColorAdjustment
GetCharWidth32A
GetSystemPaletteUse
GetTextCharsetInfo
GetTextExtentPointA
GetRgnBox
GetTextColor
GetCharWidthA
GdiSetBatchLimit
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
VirtualProtect
GetThreadLocale
GetEnvironmentStringsW
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
FormatMessageA
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
lstrcpyA
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
GetTempPathW
VirtualQueryEx
DeleteTimerQueue
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractAssociatedIconW
ExtractIconW
GetUserNameExW
GetComputerObjectNameW
GetWindowRgn
EnumWindowStationsA
GetOpenClipboardWindow
LockWorkStation
GetMenu
GetPriorityClipboardFormat
GetMenuItemCount
DrawIcon
DefMDIChildProcW
GetDlgItemTextA
LoadAcceleratorsW
GetKeyboardLayoutNameW
GetDlgItem
GetWindowTextLengthA
GetClipboardOwner
GetWindowLongW
IsWindow
GetCaretPos
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:14 15:32:01-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x7742

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 99b2dcf94a0e2f810220c3f347bcf72d
SHA1 884742684cb03939967ea0db0534a5a16262dcff
SHA256 d171acea3af3a65054dbc1478a4a7b444178810852c17a8f0c5f74d05458b15b
ssdeep
3072:guokLTqUPkPH+l47HXoaiBS1j5VxItagQb6rbzESx:gzkvkPE+HaBSB5rRgW0bTx

authentihash 63b5b07cbbfeb0bba49897de1281db680f0a9457618a3f3b0aac01ee54315e94
imphash 2b2d16d8550fc43b5d4a6748b1f518b6
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 15:38:04 UTC ( 2 months, 1 week ago )
Last submission 2018-12-21 14:24:47 UTC ( 2 months ago )
File names 36.exe
437.exe
passballoon.exe
output.114713627.txt
99b2dcf94a0e2f810220c3f347bcf72d
693.exe
rolehop.exe
output.114713286.txt
jitsymbol.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!