× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: eaefea016cffffcfa371379a1029df9d13b885beaf8e8db2467a08df54643f86
File name: .
Detection ratio: 18 / 72
Analysis date: 2019-01-21 00:03:56 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis suspicious 20190119
Avast Win32:Trojan-gen 20190120
AVG Win32:Trojan-gen 20190120
Cylance Unsafe 20190121
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/GenKryptik.CWUT 20190120
Fortinet W32/Generic.AP.263F2C!tr 20190120
Kaspersky UDS:DangerousObject.Multi.Generic 20190120
McAfee GenericRXGV-MG!110B78EBA612 20190120
Microsoft Trojan:Win32/Azden.A!cl 20190120
Palo Alto Networks (Known Signatures) generic.ml 20190121
Panda Trj/GdSda.A 20190120
Qihoo-360 Win32/Trojan.2ff 20190121
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20190120
Trapmine malicious.moderate.ml.score 20190103
TrendMicro-HouseCall TROJ_GEN.R049H0CAK19 20190120
Webroot W32.Trojan.Gen 20190121
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190120
Ad-Aware 20190121
AegisLab 20190120
AhnLab-V3 20190120
Alibaba 20180921
ALYac 20190120
Antiy-AVL 20190120
Arcabit 20190120
Avast-Mobile 20190118
Avira (no cloud) 20190120
AVware 20180925
Babable 20180918
Baidu 20190118
BitDefender 20190120
Bkav 20190119
CAT-QuickHeal 20190120
ClamAV 20190120
CMC 20190120
Comodo 20190120
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cyren 20190120
DrWeb 20190120
eGambit 20190121
Emsisoft 20190120
F-Prot 20190120
F-Secure 20190121
GData 20190120
Ikarus 20190120
Sophos ML 20181128
Jiangmin 20190120
K7AntiVirus 20190120
K7GW 20190120
Kingsoft 20190121
Malwarebytes 20190121
MAX 20190121
McAfee-GW-Edition 20190120
eScan 20190120
NANO-Antivirus 20190120
SentinelOne (Static ML) 20190118
Sophos AV 20190120
SUPERAntiSpyware 20190116
Symantec 20190120
TACHYON 20190120
Tencent 20190121
TheHacker 20190118
TotalDefense 20190120
TrendMicro 20190120
Trustlook 20190121
VBA32 20190118
VIPRE 20190120
ViRobot 20190120
Yandex 20190120
Zillya 20190118
Zoner 20190121
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Tour de Force CRM Example Willbreak
Original name Willbreak.exe
Internal name Tour de Force CRM ExampleColorselect Pointinclude
File version 9.5.44.80
Description Willbreak
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-01-17 10:54:58
Entry Point 0x00006EED
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExW
RegCreateKeyW
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetLocaleInfoW
GetModuleFileNameA
RtlUnwind
DeleteCriticalSection
GetCurrentProcess
EnumSystemLocalesA
GetLocaleInfoA
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
GetUserDefaultLCID
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
VirtualProtectEx
GetFileType
SetStdHandle
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
SetFilePointer
GetSystemTimeAsFileTime
HeapSetInformation
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CloseHandle
IsProcessorFeaturePresent
IsValidLocale
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
TerminateProcess
InitializeCriticalSection
HeapCreate
CreateFileW
InterlockedDecrement
Sleep
SetLastError
GetTickCount
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
ExitProcess
WriteConsoleW
LeaveCriticalSection
CoUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
9.5.44.80

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Willbreak

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
176640

EntryPoint
0x6eed

OriginalFileName
Willbreak.exe

MIMEType
application/octet-stream

FileVersion
9.5.44.80

TimeStamp
2011:01:17 11:54:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Tour de Force CRM ExampleColorselect Pointinclude

ProductVersion
9.5.44.80

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Tour de Force CRM Example

CodeSize
155648

ProductName
Tour de Force CRM Example Willbreak

ProductVersionNumber
9.5.44.80

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 110b78eba612038f2f757adf0f0197af
SHA1 a01531f419fad689c9760b92a01229a6dd0cf525
SHA256 eaefea016cffffcfa371379a1029df9d13b885beaf8e8db2467a08df54643f86
ssdeep
3072:jEwrR8gXyxqx92Lg5s2yTGKMt6+YpIkUygB45R2JTW19pk5ub6DyH8qIgjQ5+FwU:jJRjiMv2Lg+qlt6rpIkUarlQcPg4qu

authentihash b5bad2033bd3e499e0f9305112a46683a8ada22f52662c95e08d6f5171f70bf0
imphash 23a164d324b741a291d000e9e76af64a
File size 276.0 KB ( 282624 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-20 18:26:48 UTC ( 2 months ago )
Last submission 2019-01-20 18:26:48 UTC ( 2 months ago )
File names Tour de Force CRM ExampleColorselect Pointinclude
Willbreak.exe
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.