× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d2efc17b48ef160be7360b7e814c4102bc596a2f385eecfe9a29dbd9f3922db7
File name: d2efc17b48ef160be7360b7e814c4102bc596a2f385eecfe9a29dbd9f3922db7
Detection ratio: 39 / 70
Analysis date: 2019-01-12 18:01:46 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.31518535 20190112
AhnLab-V3 Trojan/Win32.Emotet.R251540 20190112
Arcabit Trojan.Generic.D1E0EF47 20190112
Avast Win32:BankerX-gen [Trj] 20190112
AVG Win32:BankerX-gen [Trj] 20190112
BitDefender Trojan.GenericKD.31518535 20190112
CAT-QuickHeal Trojan.Emotet.X4 20190111
Comodo Malware@#1tlt0nmfjfbfr 20190112
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181023
Cybereason malicious.d0f74f 20190109
Cylance Unsafe 20190112
Cyren W32/Trojan.GHNQ-8063 20190112
Emsisoft Trojan.GenericKD.31518535 (B) 20190112
Endgame malicious (moderate confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CWGN 20190112
GData Trojan.GenericKD.31518535 20190112
Ikarus Win32.Outbreak 20190112
Sophos ML heuristic 20181128
K7GW Trojan ( 005456781 ) 20190112
Kaspersky Trojan-Banker.Win32.Emotet.byxt 20190112
Malwarebytes Trojan.Emotet 20190112
MAX malware (ai score=100) 20190112
McAfee Artemis!FACDC76343D6 20190112
McAfee-GW-Edition BehavesLike.Win32.Backdoor.dc 20190112
Microsoft Trojan:Win32/Emotet.AC!bit 20190112
eScan Trojan.GenericKD.31518535 20190112
NANO-Antivirus Virus.Win32.Gen.ccmw 20190112
Palo Alto Networks (Known Signatures) generic.ml 20190112
Qihoo-360 HEUR/QVM20.1.7A5B.Malware.Gen 20190112
Rising Trojan.Emotet!8.B95 (CLOUD) 20190112
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/Generic-S 20190112
Symantec ML.Attribute.HighConfidence 20190112
Tencent Win32.Trojan-banker.Emotet.Egoj 20190112
Trapmine malicious.moderate.ml.score 20190103
TrendMicro TrojanSpy.Win32.EMOTET.SMTHGC.hp 20190112
ViRobot Trojan.Win32.Z.Agent.204800.AUF 20190112
Webroot W32.Trojan.Emotet 20190112
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.byxt 20190112
Acronis 20190111
AegisLab 20190112
Alibaba 20180921
ALYac 20190112
Antiy-AVL 20190112
Avast-Mobile 20190112
Avira (no cloud) 20190112
Babable 20180918
Baidu 20190111
Bkav 20190108
ClamAV 20190112
CMC 20190111
DrWeb 20190112
eGambit 20190112
F-Prot 20190112
F-Secure 20190111
Fortinet 20190112
Jiangmin 20190112
K7AntiVirus 20190112
Kingsoft 20190112
Panda 20190112
SUPERAntiSpyware 20190109
TACHYON 20190112
TheHacker 20190106
TotalDefense 20190112
TrendMicro-HouseCall 20190112
Trustlook 20190112
VBA32 20190111
Yandex 20190111
Zillya 20190111
Zoner 20190112
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 1995-2003 Ahead Software and its licensors

Product Nero Burning ROM
File version 6, 3, 0, 2
Description Nero Library
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-11 22:55:10
Entry Point 0x000052FA
Number of sections 4
PE sections
PE imports
GetCurrentHwProfileW
CreateProcessWithLogonW
IsWellKnownSid
GetTextCharsetInfo
CreatePalette
DPtoLP
GetFontUnicodeRanges
GetUserDefaultUILanguage
HeapFree
GetModuleFileNameW
HeapAlloc
FindNLSString
GlobalUnlock
GetFileAttributesW
GetLocalTime
OpenFile
GetCommTimeouts
EnumSystemLocalesA
Wow64DisableWow64FsRedirection
GetWindowsDirectoryA
GetDateFormatW
MultiByteToWideChar
SetDefaultCommConfigA
GlobalLock
GetProcessHeap
CreateFileMappingW
MapViewOfFile
GetTimeFormatW
CreateThread
LoadLibraryW
GetFileInformationByHandle
InterlockedExchange
GetCurrentProcess
Wow64RevertWow64FsRedirection
QueryIdleProcessorCycleTime
GetModuleHandleW
GetBinaryTypeA
FormatMessageW
IsWow64Process
FreeLibraryAndExitThread
UnmapViewOfFile
GlobalAlloc
FindResourceA
LZSeek
LZInit
BSTR_UserUnmarshal
CM_Get_DevNode_Registry_PropertyA
SetupDiGetINFClassW
StrPBrkW
PathIsFileSpecW
FreeCredentialsHandle
RegisterClassExW
GetForegroundWindow
UpdateWindow
GetMessageW
DefWindowProcW
MoveWindow
PostQuitMessage
SetWinEventHook
MessageBeep
RegisterWindowMessageW
SetWindowPos
SetScrollPos
GetSystemMetrics
SetWindowLongW
PeekMessageW
EnableWindow
SetWindowPlacement
CharUpperW
DialogBoxParamW
GetSystemMenu
PostMessageW
SetActiveWindow
GetDC
CreateDialogParamW
CharNextExA
GetWindowPlacement
IsIconic
InvalidateRect
GetWindowLongA
IsClipboardFormatAvailable
OpenClipboard
LoadImageW
GetKeyboardLayout
FindWindowW
GetWindowTextW
LoadCursorW
LoadIconW
GetWindowTextLengthW
CreateWindowExW
LoadAcceleratorsW
GetWindowLongW
CloseClipboard
DestroyWindow
SetCursor
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
GERMAN 1
PE resources
Debug information
ExifTool file metadata
SpecialBuild
6, 3, 0, 2b

SubsystemVersion
5.0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.0.2

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Nero Library

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
167936

EntryPoint
0x52fa

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 1995-2003 Ahead Software and its licensors

FileVersion
6, 3, 0, 2

TimeStamp
2019:01:11 23:55:10+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
6, 3, 0, 2

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Ahead Software AG

CodeSize
0

ProductName
Nero Burning ROM

ProductVersionNumber
6.3.0.2

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 facdc76343d6c695d0a551e0dba666a1
SHA1 f4961a2d0f74f19fbb3534d75a95608cdd2858a9
SHA256 d2efc17b48ef160be7360b7e814c4102bc596a2f385eecfe9a29dbd9f3922db7
ssdeep
6144:i9bx7777777777777777777777777777777777777777777777777777F777777b:iZvh/xf

authentihash dd7c074136a657842c9292adc322fd88cf9bf219f3bf8e71b87c86a521de5dd4
imphash d8cb81b500e3509b5130900523cefc60
File size 200.0 KB ( 204800 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (25.2%)
Clipper DOS Executable (25.0%)
Generic Win/DOS Executable (24.8%)
DOS Executable Generic (24.8%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-11 15:01:17 UTC ( 1 month, 1 week ago )
Last submission 2019-01-12 18:01:46 UTC ( 1 month, 1 week ago )
File names ggjKnqITMnv.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!