× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e49c6973ddcc601cfb85b451e122903b1a9c036c8baafc35cb327f76b998c537
File name: e49c6973ddcc601cfb85b451e122903b1a9c036c8baafc35cb327f76b998c537
Detection ratio: 55 / 68
Analysis date: 2018-06-06 00:09:25 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.30731266 20180605
AegisLab Uds.Dangerousobject.Multi!c 20180605
AhnLab-V3 Trojan/Win32.Locky.C2247133 20180605
ALYac Trojan.Ransom.LockyCrypt 20180605
Antiy-AVL Trojan/Win32.TSGeneric 20180605
Arcabit Trojan.Generic.D1D4EC02 20180605
Avast Win32:Malware-gen 20180605
AVG Win32:Malware-gen 20180605
Avira (no cloud) TR/Drop.Kriptik.4233 20180605
AVware Trojan.Win32.Generic!BT 20180605
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180605
BitDefender Trojan.GenericKD.30731266 20180605
CAT-QuickHeal Trojan.Multi 20180605
ClamAV Win.Trojan.Agent-6367070-0 20180605
Comodo TrojWare.Win32.Ransom.Locky.~M 20180605
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180202
Cybereason malicious.adb1a2
Cylance Unsafe 20180605
Cyren W32/Ransom.HN.gen!Eldorado 20180605
DrWeb Trojan.Encoder.15105 20180605
eGambit Unsafe.AI_Score_96% 20180605
Emsisoft Trojan-Ransom.Locky (A) 20180605
Endgame malicious (high confidence) 20180507
ESET-NOD32 Win32/Filecoder.Locky.M 20180605
F-Prot W32/Ransom.HN.gen!Eldorado 20180605
F-Secure Trojan.GenericKD.30731266 20180605
Fortinet W32/Dridex.U!tr 20180605
GData Win32.Trojan-Spy.Emotet.OY 20180605
Ikarus Trojan.Win32.Filecoder 20180605
Sophos ML heuristic 20180601
K7AntiVirus Trojan ( 00517c701 ) 20180605
K7GW Trojan ( 00517c701 ) 20180605
Kaspersky Trojan-Ransom.Win32.Locky.aceq 20180605
MAX malware (ai score=100) 20180605
McAfee Ransomware-GIQ!DEED16EADB1A 20180605
McAfee-GW-Edition BehavesLike.Win32.Sality.bc 20180605
Microsoft Ransom:Win32/Locky.A 20180605
eScan Trojan.GenericKD.30731266 20180605
NANO-Antivirus Virus.Win32.Gen.ccmw 20180605
Palo Alto Networks (Known Signatures) generic.ml 20180605
Panda Trj/GdSda.A 20180605
Qihoo-360 Trojan.Generic 20180605
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/EncPk-ANX 20180605
Symantec Ransom.Locky.B 20180605
TACHYON Ransom/W32.Locky.770048 20180604
Tencent Win32.Trojan.Filecoder.Wwyf 20180605
TrendMicro Ransom_LOCKY.B07 20180605
TrendMicro-HouseCall Ransom_LOCKY.B07 20180605
VBA32 Trojan-Ransom.Locky 20180605
VIPRE Trojan.Win32.Generic!BT 20180605
ViRobot Trojan.Win32.Z.Locky.770048 20180605
Webroot W32.Malware.Gen 20180605
Yandex Trojan.Locky! 20180529
ZoneAlarm by Check Point Trojan-Ransom.Win32.Locky.aceq 20180605
Alibaba 20180604
Avast-Mobile 20180605
Babable 20180406
Bkav 20180605
CMC 20180604
Jiangmin 20180605
Kingsoft 20180605
Malwarebytes 20180605
Rising 20180605
SUPERAntiSpyware 20180605
Symantec Mobile Insight 20180604
TheHacker 20180605
TotalDefense 20180605
Trustlook 20180605
Zillya 20180605
Zoner 20180605
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © Hilgraeve, Inc. 2001

Product Microsoft® Windows® Operating System
Original name HyperTrm.dll
Internal name HyperTrm
File version 5.1.2600.5512
Description HyperTerminal Applet Library
Comments HyperTerminal ® was developed by Hilgraeve, Inc. for Microsoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-11-06 16:24:14
Entry Point 0x00001690
Number of sections 6
PE sections
PE imports
ChangeServiceConfig2W
RegDeleteKeyW
CryptGetDefaultOIDFunctionAddress
SetStretchBltMode
GetCharWidth32A
GdiGetBatchLimit
SetFileAttributesA
GetQueuedCompletionStatus
GetBinaryTypeW
lstrcatA
GetFileAttributesA
GetWindowsDirectoryA
ExitProcess
lstrcmpW
GetBinaryTypeA
PathIsFileSpecW
StrRChrIW
CheckRadioButton
MessageBoxA
CreateMenu
CreatePopupMenu
SetMessageExtraInfo
midiOutShortMsg
SCardConnectA
Ord(69)
Ord(215)
Number of PE resources by type
RT_STRING 42
RT_DIALOG 37
RT_RCDATA 4
RT_MENU 4
RT_BITMAP 3
RT_MANIFEST 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 93
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
HyperTerminal is a registered trademark of Hilgraeve, Inc.

SubsystemVersion
5.0

Comments
HyperTerminal was developed by Hilgraeve, Inc. for Microsoft

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
HyperTerminal Applet Library

CharacterSet
ASCII

InitializedDataSize
770048

EntryPoint
0x1690

OriginalFileName
HyperTrm.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright Hilgraeve, Inc. 2001

FileVersion
5.1.2600.5512

TimeStamp
2017:11:06 08:24:14-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
HyperTrm

ProductVersion
5.1.2600.5512

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Hilgraeve, Inc.

CodeSize
12288

ProductName
Microsoft Windows Operating System

ProductVersionNumber
5.1.2600.5512

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 deed16eadb1a270dfc54daf84f53aad6
SHA1 cfa00beec23e1221ec6197abe887ef51ca0722d8
SHA256 e49c6973ddcc601cfb85b451e122903b1a9c036c8baafc35cb327f76b998c537
ssdeep
12288:3x+iAN6ot1COrmN2ftcwOvAZrNYPRMdyUFjIuQDhJVos:fiNAOtNZrNGNuCV

authentihash 56d50bc271f0568e9cddd7f15efafde74ae4f67c4da1be5a101595e4a26b6b95
imphash 17a499ee1f1708763d14e6a32f673584
File size 752.0 KB ( 770048 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2017-11-06 16:54:22 UTC ( 8 months, 2 weeks ago )
Last submission 2018-05-11 00:20:41 UTC ( 2 months, 1 week ago )
File names VirusShare_deed16eadb1a270dfc54daf84f53aad6
mnbv374
e49c6973ddcc601cfb85b451e122903b1a9c036c8baafc35cb327f76b998c537.bin
HyperTrm
wera4.exe
e49c6973ddcc601cfb85b451e122903b1a9c036c8baafc35cb327f76b998c537
wera4.exe.3.dr
deed16ea.gxe
HyperTrm.dll
mnbv374.1
DEED16EADB1A270DFC54DAF84F53AAD6.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Runtime DLLs
UDP communications