× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e7af213cb8e2eb7eb83395908d0fd344f08e989287e5edc9d1e780f8fbfa8cfd
File name: e7af213cb8e2eb7eb83395908d0fd344f08e989287e5edc9d1e780f8fbfa8cfd
Detection ratio: 15 / 70
Analysis date: 2018-12-14 16:18:22 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.b82a20 20180225
Cylance Unsafe 20181214
eGambit Unsafe.AI_Score_99% 20181214
Endgame malicious (high confidence) 20181108
Ikarus Trojan-Spy.Win32.Zbot 20181214
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181214
K7GW Spyware ( 005068aa1 ) 20181214
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20181214
Qihoo-360 HEUR/QVM20.1.DD01.Malware.Gen 20181214
Rising Trojan.Fuerboos!8.EFC8 (TFE:dGZlOgJHFPKNzEd+lQ) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Avira (no cloud) 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181213
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
Emsisoft 20181214
ESET-NOD32 20181214
F-Prot 20181214
F-Secure 20181214
Fortinet 20181214
GData 20181214
Jiangmin 20181214
Kaspersky 20181214
Kingsoft 20181214
Malwarebytes 20181214
MAX 20181214
McAfee 20181214
Microsoft 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
Sophos AV 20181214
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TotalDefense 20181214
TrendMicro 20181214
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
VIPRE 20181213
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-15 00:14:12
Entry Point 0x0000707E
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
GetTextCharsetInfo
GetColorAdjustment
GetCharWidth32A
ExcludeClipRect
GetTextExtentPointA
GetRgnBox
GetTextColor
GetSystemPaletteUse
GetCharWidthA
GdiSetBatchLimit
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
VirtualProtect
GetThreadLocale
GetEnvironmentStringsW
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
DeleteTimerQueue
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
lstrcpyA
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
GetTempPathW
VirtualQueryEx
FormatMessageA
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractAssociatedIconW
ExtractIconW
GetUserNameExW
GetComputerObjectNameW
GetWindowRgn
EnumWindowStationsA
GetOpenClipboardWindow
LockWorkStation
GetMenu
GetPriorityClipboardFormat
GetMenuItemCount
DrawIcon
DefMDIChildProcW
GetDlgItemTextA
GetKeyboardLayoutNameW
GetDlgItem
GetWindowTextLengthA
LoadAcceleratorsW
GetWindowLongW
IsWindow
GetCaretPos
GetClipboardOwner
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:15 01:14:12+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
40960

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x707e

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 183c741a2993e69a6b5610147dc01d39
SHA1 338a7abb82a20c4d5c8e37da8361435224a5c1a0
SHA256 e7af213cb8e2eb7eb83395908d0fd344f08e989287e5edc9d1e780f8fbfa8cfd
ssdeep
3072:47buDICOe3MIWLKXspXNZOP0akZs1lrIwbJxzTSr4A2nvSkjvQvHUUcQn8HKXNMl:4H6EHE6mgj4Ts+v

authentihash 7813337e76c2c4c3f96fc35185effc4ebe548cdd520dd3af3bf8f3f762f1eb44
imphash 9649f2a64ddfd6e8a627e2ec8499e575
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 16:18:22 UTC ( 2 months, 1 week ago )
Last submission 2018-12-15 10:59:08 UTC ( 2 months, 1 week ago )
File names 56.exe
4.exe
6180.exe
2691769.exe
120.exe
6.exe
46.exe
8.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!