× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d32729612892343f12c2b2da293db0037928bee673b5703a7faa6af9d2ceb375
File name: radarjersey.exe
Detection ratio: 49 / 71
Analysis date: 2019-02-02 04:50:27 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20190130
Ad-Aware Trojan.Agent.DOOL 20190202
AegisLab Trojan.Win32.Emotet.4!c 20190202
AhnLab-V3 Malware/Gen.Generic.C2978488 20190201
ALYac Trojan.Agent.Emotet 20190202
Arcabit Trojan.Agent.DOOL 20190202
Avast Win32:BankerX-gen [Trj] 20190202
AVG Win32:BankerX-gen [Trj] 20190202
Avira (no cloud) HEUR/AGEN.1038686 20190202
BitDefender Trojan.Agent.DOOL 20190202
Bkav HW32.Packed. 20190201
Comodo Malware@#3jbdj29dscx1i 20190202
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181023
Cylance Unsafe 20190202
Cyren W32/Trojan.IVBF-4754 20190202
eGambit Unsafe.AI_Score_75% 20190202
Emsisoft Trojan.Emotet (A) 20190202
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GPCK 20190202
F-Prot W32/Emotet.NK.gen!Eldorado 20190202
F-Secure Trojan.Agent.DOOL 20190202
Fortinet W32/GenKryptik.CXUC!tr 20190201
GData Win32.Trojan-Spy.Emotet.E61HFM 20190202
Ikarus Trojan-Banker.Emotet 20190201
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005468ed1 ) 20190201
K7GW Trojan ( 005468ed1 ) 20190202
Kaspersky Trojan-Banker.Win32.Emotet.ccgi 20190202
Malwarebytes Trojan.Emotet 20190202
MAX malware (ai score=100) 20190202
McAfee RDN/Generic.dx 20190202
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20190201
Microsoft Trojan:Win32/Emotet.DZ 20190202
eScan Trojan.Agent.DOOL 20190202
Palo Alto Networks (Known Signatures) generic.ml 20190202
Panda Trj/RnkBend.A 20190201
Qihoo-360 Win32/Trojan.2ff 20190202
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20190202
SentinelOne (Static ML) static engine - malicious 20190124
Sophos AV Troj/Emotet-AWZ 20190202
Symantec Trojan.Emotet 20190202
TACHYON Banker/W32.Emotet.143360.BB 20190202
Tencent Win32.Trojan-banker.Emotet.Ahoo 20190202
Trapmine malicious.high.ml.score 20190123
TrendMicro TrojanSpy.Win32.EMOTET.THABIAI 20190202
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABIAI 20190202
VBA32 BScope.TrojanBanker.Emotet 20190201
Webroot W32.Trojan.Emotet 20190202
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.ccgi 20190202
Alibaba 20180921
Antiy-AVL 20190202
Avast-Mobile 20190201
Babable 20180918
Baidu 20190202
CAT-QuickHeal 20190201
ClamAV 20190201
CMC 20190201
Cybereason 20190109
DrWeb 20190202
Jiangmin 20190202
Kingsoft 20190202
NANO-Antivirus 20190202
SUPERAntiSpyware 20190130
TheHacker 20190131
TotalDefense 20190201
Trustlook 20190202
VIPRE 20190202
ViRobot 20190201
Yandex 20190201
Zillya 20190201
Zoner 20190202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 1995 Microsoft Corporation

Product Microsoft Picstore
Original name amstoune.exe
Internal name amstoune
File version 2.2
Description picstore
Comments Built-in compression
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2003-01-09 08:08:07
Entry Point 0x00002B91
Number of sections 6
PE sections
PE imports
BuildImpersonateTrusteeW
RegSaveKeyW
RegConnectRegistryW
IsTokenRestricted
CreateDiscardableBitmap
PathToRegion
GetFontUnicodeRanges
ImmSetOpenStatus
FlushProcessWriteBuffers
GetLocaleInfoA
FindFirstFileA
GetCommandLineW
ClearCommBreak
DeleteAtom
GetStartupInfoW
CloseHandle
Sleep
GetTapePosition
GetUserGeoID
GetThreadLocale
RpcFreeAuthorizationContext
GetForegroundWindow
PeekMessageW
DrawTextExW
CharUpperW
VkKeyScanExA
GetWindowWord
SCardConnectW
StringFromGUID2
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
MAORI DEFAULT 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.1

Comments
Built-in compression

InitializedDataSize
4096

ImageVersion
6.0

ProductName
Microsoft Picstore

FileVersionNumber
2.0.0.2

UninitializedDataSize
102400

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
0.0

FileTypeExtension
exe

OriginalFileName
amstoune.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.2

TimeStamp
2003:01:09 00:08:07-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
amstoune

ProductVersion
2.2

FileDescription
picstore

OSVersion
6.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright 1995 Microsoft Corporation

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
16384

FileSubtype
0

ProductVersionNumber
2.0.2.0

EntryPoint
0x2b91

ObjectFileType
Dynamic link library

File identification
MD5 78568e302c560975fcd94dd9a0a9376e
SHA1 eaddc40af6ffbc9963d725d79f50260e9d10c5f0
SHA256 d32729612892343f12c2b2da293db0037928bee673b5703a7faa6af9d2ceb375
ssdeep
3072:s9fr8NyU1gVub0U9oCrJm9cwsMh7PMiq0VyLs/k3vkhmZic2:0frpUGZ6o59cwsMhzLV/ueA

authentihash be2808c1209f77fdd84a9b7a5feebb8a66ff20f8b0bb2d54d0e4c51dbdec153b
imphash 6da72f7dc924b2bb98f02cb77f49941d
File size 140.0 KB ( 143360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-28 13:12:08 UTC ( 1 month, 3 weeks ago )
Last submission 2019-01-29 08:31:18 UTC ( 1 month, 3 weeks ago )
File names radarjersey.exe
17951192.exe
amstoune.exe
604.exe
sourcethunk.exe
150.exe
22237080
emotet_e1_d32729612892343f12c2b2da293db0037928bee673b5703a7faa6af9d2ceb375_2019-01-28__130502.exe_
amstoune
sourcemfidl.exe
150.exe
sourcethunk.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!