× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d5758565fde98a5a8c92a3544910282d347e171f359a35cf6612f086b0adb5b5
File name: d5758565fde98a5a8c92a3544910282d347e171f359a35cf6612f086b0adb5b5
Detection ratio: 40 / 66
Analysis date: 2018-01-20 20:36:54 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Jaik.23400 20180120
AegisLab Troj.W32.Refinka!c 20180120
AhnLab-V3 Trojan/Win32.Poison.R218060 20180120
ALYac Gen:Variant.Jaik.23400 20180120
Antiy-AVL Trojan/Win32.Refinka 20180120
Arcabit Trojan.Jaik.D5B68 20180120
Avast Win32:Malware-gen 20180120
AVG Win32:Malware-gen 20180120
Avira (no cloud) TR/Crypt.XPACK.Gen 20180120
AVware Trojan.Win32.Generic!BT 20180120
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180118
BitDefender Gen:Variant.Jaik.23400 20180120
Bkav HW32.Packed.953B 20180120
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20171016
Cylance Unsafe 20180120
eGambit Unsafe.AI_Score_100% 20180120
Emsisoft Gen:Variant.Jaik.23400 (B) 20180120
Endgame malicious (high confidence) 20171130
ESET-NOD32 a variant of Win32/Kryptik.GBUI 20180120
GData Gen:Variant.Jaik.23400 20180120
Sophos ML heuristic 20170914
Jiangmin Trojan.Refinka.aqs 20180120
K7GW Trojan ( 005244531 ) 20180120
Kaspersky Trojan.Win32.Refinka.osh 20180120
MAX malware (ai score=82) 20180120
McAfee GenericRXDV-ID!91F6CBC9D1EC 20180120
McAfee-GW-Edition BehavesLike.Win32.Ransomware.cc 20180120
eScan Gen:Variant.Jaik.23400 20180120
Palo Alto Networks (Known Signatures) generic.ml 20180120
Qihoo-360 Win32/Trojan.e76 20180120
Rising Trojan.Kryptik!1.AE8C (CLASSIC) 20180120
SentinelOne (Static ML) static engine - malicious 20180115
Sophos AV Mal/Generic-S 20180120
Symantec Packed.Generic.493 20180120
Tencent Win32.Trojan.Refinka.Hupi 20180120
TrendMicro Ransom_CERBER.SMALY0A 20180120
TrendMicro-HouseCall Ransom_CERBER.SMALY0A 20180120
VIPRE Trojan.Win32.Generic!BT 20180120
Webroot W32.Trojan.Gen 20180120
ZoneAlarm by Check Point Trojan.Win32.Refinka.osh 20180120
Alibaba 20180120
Avast-Mobile 20180120
CAT-QuickHeal 20180120
ClamAV 20180120
CMC 20180116
Comodo 20180120
Cybereason 20171103
Cyren 20180120
DrWeb 20180120
F-Prot 20180120
Fortinet 20180120
Ikarus 20180120
K7AntiVirus 20180120
Kingsoft 20180120
Malwarebytes 20180120
Microsoft 20180120
NANO-Antivirus 20180120
nProtect 20180120
Panda 20180120
SUPERAntiSpyware 20180120
Symantec Mobile Insight 20180119
TheHacker 20180119
TotalDefense 20180118
Trustlook 20180120
VBA32 20180120
ViRobot 20180120
Yandex 20180112
Zillya 20180119
Zoner 20180120
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-09 09:13:41
Entry Point 0x00001014
Number of sections 4
PE sections
PE imports
ReadEventLogA
RegOpenKeyA
RegSaveKeyA
RegUnLoadKeyW
RegDeleteValueW
OpenEventLogA
CryptSignHashA
GetUserNameA
LogonUserA
RegLoadKeyW
RegRestoreKeyW
RegEnumKeyA
CreateServiceW
CoRegCleanup
SetSetupSave
DowngradeAPL
ComPlusMigrate
SetSetupOpen
CoCreateActivity
RecycleSurrogate
CoLoadServices
CoEnterServiceDomain
SafeRef
CertFreeCTLContext
CertGetNameStringA
CertOpenStore
CertCloseStore
CertAlgIdToOID
CryptMsgUpdate
CertDeleteCTLFromStore
CryptMsgControl
CryptMemAlloc
CryptMsgGetParam
CertFindCTLInStore
CertCreateCRLContext
CertGetStoreProperty
GetOEMCP
LoadLibraryExA
GetConsoleAliasA
lstrlen
Heap32Next
GetModuleHandleA
OpenEventW
WaitForSingleObject
GetCommandLineW
lstrcmp
GetLogicalDriveStringsW
WriteFile
CreateMutexW
CreateFileW
GetCommandLineA
GetProcAddress
GetStringTypeW
LeaveCriticalSection
InsertMenuA
IsDialogMessageW
DrawStateA
IsWindowVisible
CreateDesktopW
MessageBoxA
GetClassLongA
GetMessageW
DialogBoxParamA
GetWindow
CharToOemA
LoadMenuW
DispatchMessageW
GetDlgItemTextW
Number of PE resources by type
RT_MENU 1
RT_DIALOG 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:06:09 10:13:41+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
140800

LinkerVersion
32.35

EntryPoint
0x1014

InitializedDataSize
20992

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 91f6cbc9d1ec80e4b79c562b3a60721c
SHA1 329ca81d757181f37d5e6e7f8871562162b5ab88
SHA256 d5758565fde98a5a8c92a3544910282d347e171f359a35cf6612f086b0adb5b5
ssdeep
3072:S+UZl9EJmINYQefEgicutQrSnOIbuP0366RtmluatypA:eZIxuxiqenOYzrGT0

authentihash 716cef68d00feef614175b009f2c65dcf8f319babc6628ecc82488e6a277e192
imphash b068035c557f9f1867ef817ed12fc290
File size 159.0 KB ( 162816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (43.2%)
Win32 Dynamic Link Library (generic) (21.7%)
Win32 Executable (generic) (14.8%)
Win16/32 Executable Delphi generic (6.8%)
Generic Win/DOS Executable (6.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-01-20 16:08:57 UTC ( 1 year, 2 months ago )
Last submission 2018-01-20 20:36:54 UTC ( 1 year, 2 months ago )
File names 91f6cbc9d1ec80e4b79c562b3a60721c
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs