× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e698f91958ff2a0724be8f9f83e8e3d19285ed2abd0d19bdc1a6a50956a7bd5a
File name: Patch.exe
Detection ratio: 47 / 66
Analysis date: 2018-03-26 11:16:58 UTC ( 4 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.279593 20180326
AegisLab Backdoor.Msil.Generic!c 20180326
AhnLab-V3 Trojan/Win32.Agent.C2442394 20180326
ALYac Gen:Variant.Razy.279593 20180326
Antiy-AVL Trojan[Backdoor]/MSIL.AGeneric 20180326
Arcabit Trojan.Razy.D44429 20180326
Avast Win32:Malware-gen 20180326
AVG Win32:Malware-gen 20180326
Avira (no cloud) TR/Dropper.MSIL.xyxnh 20180326
AVware Trojan.Win32.Generic!BT 20180326
BitDefender Gen:Variant.Razy.279593 20180326
Comodo UnclassifiedMalware 20180326
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170201
Cybereason malicious.8bf092 20180225
Cylance Unsafe 20180326
Cyren W32/Trojan.FBNU-1593 20180326
DrWeb Trojan.DownLoader19.14585 20180326
Emsisoft Gen:Variant.Razy.279593 (B) 20180326
Endgame malicious (high confidence) 20180316
ESET-NOD32 a variant of MSIL/Injector.TMH 20180326
F-Secure Gen:Variant.Razy.279593 20180326
Fortinet MSIL/Injector.TMI!tr 20180326
GData Gen:Variant.Razy.279593 20180326
Ikarus Trojan.MSIL.Injector 20180326
Sophos ML heuristic 20180121
Jiangmin Backdoor.MSIL.afhb 20180326
K7AntiVirus Trojan ( 0052a2981 ) 20180326
K7GW Trojan ( 0052a2981 ) 20180326
Kaspersky HEUR:Backdoor.MSIL.Generic 20180326
Malwarebytes Spyware.AzorUlt 20180326
MAX malware (ai score=95) 20180326
McAfee GenericRXEH-OL!8D60F86DD6A6 20180326
McAfee-GW-Edition BehavesLike.Win32.PUPXAG.cc 20180326
eScan Gen:Variant.Razy.279593 20180326
NANO-Antivirus Trojan.Win32.MSILPerseus.eyyfce 20180326
Palo Alto Networks (Known Signatures) generic.ml 20180326
Panda Trj/GdSda.A 20180325
Qihoo-360 Win32/Backdoor.990 20180326
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Generic-S 20180326
Symantec Trojan.Gen.2 20180326
Tencent Msil.Backdoor.Generic.Ecua 20180326
TrendMicro TROJ_GEN.R004C0OCI18 20180326
TrendMicro-HouseCall TROJ_GEN.R004C0OCI18 20180326
VIPRE Trojan.Win32.Generic!BT 20180326
Yandex Trojan.Injector!UUkHpTQiCTs 20180324
ZoneAlarm by Check Point HEUR:Backdoor.MSIL.Generic 20180326
Alibaba 20180326
Avast-Mobile 20180325
Baidu 20180326
Bkav 20180326
CAT-QuickHeal 20180325
ClamAV 20180326
CMC 20180326
eGambit 20180326
F-Prot 20180326
Kingsoft 20180326
Microsoft 20180326
nProtect 20180326
Rising 20180326
SUPERAntiSpyware 20180326
Symantec Mobile Insight 20180311
TheHacker 20180326
Trustlook 20180326
VBA32 20180323
ViRobot 20180326
WhiteArmor 20180324
Zillya 20180326
Zoner 20180326
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright @ 2017

Product KXaqzzvr
File version 2.1.0.5
Description mKuppODTQiQdLzyXphTl
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-15 21:35:41
Entry Point 0x000DE30E
Number of sections 3
.NET details
Module Version ID de796490-d655-4942-8933-09e09cbdfc99
TypeLib ID 4f495d20-d7e9-4a9c-8574-59ecafc5c1bd
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 3
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.1.0.5

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
3072

EntryPoint
0xde30e

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.1.0.5

TimeStamp
2018:03:15 22:35:41+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2.1.0.5

FileDescription
mKuppODTQiQdLzyXphTl

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright @ 2017

MachineType
Intel 386 or later, and compatibles

CodeSize
902144

ProductName
KXaqzzvr

ProductVersionNumber
2.1.0.5

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
2.1.0.5

File identification
MD5 8d60f86dd6a6fd405765ff23820263fd
SHA1 0a857e88bf0920a498a133de9a3a4e3c5b898d7f
SHA256 e698f91958ff2a0724be8f9f83e8e3d19285ed2abd0d19bdc1a6a50956a7bd5a
ssdeep
24576:QCo3gd7rfpyf/WHBsYqRKYy7pjxuC99y9mpGp9MX1e7:6gdXvHsKYy7zuneG7+1C

authentihash da949a0d09935a07e59d93538960d35d9324512292b9a54ccaf8065f58a7ce75
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 884.5 KB ( 905728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (81.0%)
Win32 Dynamic Link Library (generic) (7.2%)
Win32 Executable (generic) (4.9%)
OS/2 Executable (generic) (2.2%)
Generic Win/DOS Executable (2.2%)
Tags
peexe assembly

VirusTotal metadata
First submission 2018-03-16 04:06:13 UTC ( 5 months ago )
Last submission 2018-03-16 04:06:13 UTC ( 5 months ago )
File names Patch.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections