× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ec49cd6ac703bcc1f607b3b65557e0a7f6c37a7b4c3ca4b73ecd8d31b26ea50e
File name: Free Windows Vulnerability Scanner
Detection ratio: 51 / 68
Analysis date: 2019-03-10 11:35:08 UTC ( 1 week, 2 days ago )
Antivirus Result Update
Acronis suspicious 20190222
Ad-Aware Trojan.GenericKD.31583580 20190310
AhnLab-V3 Trojan/Win32.Ursnif.C2670155 20190310
ALYac Spyware.Ursnif 20190310
Antiy-AVL Trojan/Win32.Fuerboos 20190310
Arcabit Trojan.Generic.D1E1ED5C 20190310
Avast Win32:MalwareX-gen [Trj] 20190310
AVG Win32:MalwareX-gen [Trj] 20190310
Avira (no cloud) HEUR/AGEN.1036050 20190309
BitDefender Trojan.GenericKD.31583580 20190310
Bkav W32.VigorfI.Trojan 20190308
CAT-QuickHeal Trojan.Fuerboos 20190309
Comodo Malware@#29bim2uqrc96y 20190310
CrowdStrike Falcon (ML) win/malicious_confidence_90% (W) 20190212
Cybereason malicious.ebd414 20190109
Cylance Unsafe 20190310
Cyren W32/Kryptik.KX.gen!Eldorado 20190310
DrWeb Trojan.Proxy2.159 20190310
Emsisoft Trojan.GenericKD.31583580 (B) 20190310
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.GKVV 20190310
F-Prot W32/Kryptik.KX.gen!Eldorado 20190310
F-Secure Heuristic.HEUR/AGEN.1036050 20190309
Fortinet W32/Kryptik.GJZK!tr 20190310
GData Trojan.GenericKD.31583580 20190310
Ikarus Trojan.Win32.Lethic 20190310
Sophos ML heuristic 20181128
Jiangmin Trojan.Garrun.atl 20190310
K7AntiVirus Riskware ( 0040eff71 ) 20190310
K7GW Riskware ( 0040eff71 ) 20190310
Kaspersky Trojan-PSW.Win32.Coins.mwk 20190310
MAX malware (ai score=100) 20190310
McAfee GenericRXGH-RH!72EF7FBEBD41 20190310
McAfee-GW-Edition BehavesLike.Win32.Generic.dh 20190310
Microsoft Trojan:Win32/Occamy.C 20190307
eScan Trojan.GenericKD.31583580 20190310
NANO-Antivirus Trojan.Win32.Proxy2.fhwjyk 20190310
Palo Alto Networks (Known Signatures) generic.ml 20190310
Panda Trj/Genetic.gen 20190310
Qihoo-360 HEUR/QVM09.0.4545.Malware.Gen 20190310
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20190310
Sophos AV Mal/Generic-S 20190310
SUPERAntiSpyware Trojan.Agent/Generic 20190307
Tencent Win32.Trojan-qqpass.Qqrob.Aisl 20190310
TrendMicro TROJ_GEN.R053C0OHL18 20190310
TrendMicro-HouseCall TROJ_GEN.R053C0OHL18 20190310
VBA32 Trojan.Fuerboos 20190307
ViRobot Trojan.Win32.Agent.230912.U 20190309
Yandex Trojan.Kryptik!SHgxOAFf9g8 20190310
Zillya Trojan.Kryptik.Win32.1489405 20190307
ZoneAlarm by Check Point Trojan-PSW.Win32.Coins.mwk 20190310
AegisLab 20190310
Alibaba 20190306
Avast-Mobile 20190310
Babable 20180918
Baidu 20190306
ClamAV 20190310
CMC 20190310
eGambit 20190310
Kingsoft 20190310
Malwarebytes 20190310
SentinelOne (Static ML) 20190203
Symantec Mobile Insight 20190220
TACHYON 20190310
TheHacker 20190308
TotalDefense 20190310
Trapmine 20190301
Trustlook 20190310
Zoner 20190310
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2014

Product Free Windows Vulnerability Scanner
Original name Free Windows Vulnerability Scanner
Internal name Free Windows Vulnerability Scanner
File version 4, 0, 0, 9
Description Free Windows Vulnerability Scanner
Comments Free Windows Vulnerability Scanner
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-18 20:38:30
Entry Point 0x000120E7
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
RegCreateKeyW
RegEnumKeyW
RegCreateKeyExA
RegSetValueW
RegQueryValueExW
RegOpenKeyA
RegQueryValueA
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegEnumValueA
RegQueryValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegEnumKeyA
RegDeleteValueW
RegSetValueExW
FreeSid
RegEnumValueW
AllocateAndInitializeSid
CheckTokenMembership
RegSetValueExA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetNearestColor
GetPaletteEntries
CombineRgn
PlayMetaFile
GetROP2
GetViewportOrgEx
GetObjectType
CreateMetaFileW
SetColorAdjustment
GetBoundsRect
GetTextExtentPointA
SetLayout
SetPixel
EndDoc
SetPaletteEntries
OffsetWindowOrgEx
CreateEllipticRgn
GetColorSpace
GetTextFaceW
CreatePalette
CreateDIBitmap
GetPolyFillMode
GetDIBits
SetTextAlign
GetDCOrgEx
StretchBlt
StretchDIBits
ScaleViewportExtEx
ArcTo
SetICMMode
SetWindowExtEx
SetViewportExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
CreateFontA
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
LPtoDP
GetBitmapBits
GetLayout
PolyDraw
CloseMetaFile
TranslateCharsetInfo
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
OffsetClipRgn
BitBlt
GetDeviceCaps
FillRgn
SetAbortProc
FrameRgn
CreateBrushIndirect
ScaleWindowExtEx
PtVisible
GetLogColorSpaceW
ExtSelectClipRgn
StartDocW
SelectPalette
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
DeleteObject
SetGraphicsMode
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
AddFontResourceW
GetClipBox
Rectangle
PolylineTo
GetObjectA
CreateDCA
LineTo
DeleteDC
SetWorldTransform
GetMapMode
CreateFontIndirectW
GetCharWidthW
StartPage
GetObjectW
CreateDCW
CreateBitmapIndirect
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
GetBkMode
GdiFlush
SelectClipRgn
RoundRect
GetTextAlign
GetTextExtentPoint32A
MoveToEx
SetWindowOrgEx
GetClipRgn
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
EnumMetaFile
GetTextCharset
ModifyWorldTransform
RestoreDC
GetPixel
SetMapperFlags
GetTextExtentExPointW
CreateSolidBrush
SelectClipPath
CreateDIBSection
SetTextColor
ExtFloodFill
GetCurrentObject
ExcludeClipRect
Escape
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetStretchBltMode
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
Ellipse
SetTextJustification
GetStretchBltMode
Polyline
DPtoLP
AbortDoc
CreateCompatibleBitmap
DeleteMetaFile
SetThreadLocale
GetProfileIntW
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
FindNextFileA
HeapDestroy
GetPrivateProfileSectionNamesW
GetFileAttributesW
SetConsoleMode
DuplicateHandle
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
WritePrivateProfileStringA
FileTimeToDosDateTime
GetConsoleMode
EnumSystemLocalesW
LocalAlloc
lstrcatA
GetVolumeInformationW
ExpandEnvironmentStringsA
GetFileInformationByHandle
SetErrorMode
_llseek
VerifyVersionInfoW
FreeEnvironmentStringsW
lstrcatW
InitializeSListHead
GetLocaleInfoW
SetStdHandle
GetFileTime
FindResourceExA
SetCommState
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
GetDiskFreeSpaceW
WriteFile
GetTimeZoneInformation
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
CompareFileTime
GetFullPathNameA
GetExitCodeProcess
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
EncodePointer
OutputDebugStringA
WritePrivateProfileStringW
GetEnvironmentVariableW
SetLastError
LocalLock
GetSystemTime
DeviceIoControl
InterlockedDecrement
CopyFileW
OutputDebugStringW
GetModuleFileNameW
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
GetStringTypeExW
lstrcmpiW
RaiseException
SetProcessWorkingSetSize
EnumSystemLocalesA
LoadLibraryExA
EnumResourceLanguagesW
GetPrivateProfileStringA
SetThreadPriority
ReleaseSemaphore
GetSystemDefaultLCID
LoadLibraryExW
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
SetEnvironmentVariableW
GlobalMemoryStatus
GetPrivateProfileStringW
FormatMessageA
GetModuleHandleA
_lclose
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
MoveFileExW
GetSystemDirectoryW
CreatePipe
GetExitCodeThread
CreateSemaphoreW
CreateMutexW
MulDiv
IsProcessorFeaturePresent
GetDateFormatA
ExitThread
SetHandleInformation
SetEnvironmentVariableA
GetNumberOfConsoleInputEvents
TerminateProcess
SetUnhandledExceptionFilter
WriteConsoleA
GetVersion
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
SetEndOfFile
GetLocaleInfoA
GetCurrentThreadId
InterlockedIncrement
GetNumberFormatW
WriteConsoleW
AreFileApisANSI
HeapFree
EnterCriticalSection
PeekNamedPipe
SetHandleCount
TerminateThread
LoadLibraryW
GlobalGetAtomNameW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
ReadConsoleInputA
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
GlobalFindAtomW
GlobalSize
GetStartupInfoA
UnlockFile
FlushConsoleInputBuffer
GetWindowsDirectoryW
DecodePointer
GetFileSize
LCMapStringW
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetDateFormatW
GetEnvironmentVariableA
GetStartupInfoW
SetFileAttributesA
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
GetProfileStringW
CompareStringW
lstrcpyW
DosDateTimeToFileTime
GetFileSizeEx
GlobalReAlloc
RemoveDirectoryW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
GetUserDefaultUILanguage
lstrcpyA
ResetEvent
GetTempFileNameA
CreateFileMappingA
FindFirstFileW
IsValidLocale
lstrcmpW
WaitForMultipleObjects
GetProcAddress
SetEvent
_lread
GetTempPathW
GetModuleFileNameA
CreateEventW
SearchPathW
CreateFileW
CreateEventA
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LocalUnlock
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
GlobalDeleteAtom
GetShortPathNameW
HeapCreate
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
LCMapStringA
GetTimeFormatW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
QueryPerformanceFrequency
VirtualQuery
lstrlenW
GetShortPathNameA
MoveFileA
VirtualFree
OpenFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
HeapSize
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
GetCPInfo
GetAtomNameW
GetCommandLineA
VerSetConditionMask
GetCurrentThread
GetTempPathA
SuspendThread
GetSystemDefaultLangID
ReadConsoleW
UnhandledExceptionFilter
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GetCommState
SHGetFileInfoA
SHGetFolderPathW
SHBrowseForFolderA
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
FindExecutableW
ShellExecuteExW
SHGetFileInfoW
SHGetPathFromIDListA
SHGetSpecialFolderPathW
SHGetMalloc
ShellExecuteA
SHFileOperationA
SetFocus
GetMessagePos
ModifyMenuW
GetAsyncKeyState
DrawTextW
CreateAcceleratorTableW
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GetWindowWord
GetDC
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
SendMessageW
GetMenuStringW
SendMessageA
UnregisterClassW
GetClientRect
GetMenuItemInfoW
CharLowerBuffA
CallNextHookEx
GetWindowTextLengthA
LoadImageW
ClientToScreen
GetWindowTextW
PostThreadMessageW
LoadImageA
GetWindowTextLengthW
MsgWaitForMultipleObjects
LoadMenuIndirectW
GetWindowTextA
CopyImage
DestroyWindow
GetMessageA
GetParent
UpdateWindow
GetWindow
GetPropW
GetMenuState
GetMessageW
ShowWindow
SetClassLongA
SetPropW
SetWindowWord
PeekMessageW
EnableWindow
SetWindowPlacement
CharUpperW
GetDlgItemTextA
PeekMessageA
TranslateMessage
IsWindowEnabled
GetDlgItemTextW
RegisterClassW
GetMenuItemID
LoadAcceleratorsW
LoadStringA
SetParent
SetClipboardData
GetWindowPlacement
LoadStringW
EnableMenuItem
RegisterClassA
GetWindowLongA
CreateWindowExA
OemToCharA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
CreateWindowExW
GetWindowLongW
PtInRect
IsDialogMessageA
MapWindowPoints
CharPrevA
IsIconic
SetCapture
BeginPaint
DefWindowProcW
DrawIcon
KillTimer
DefWindowProcA
LoadBitmapW
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
SetWindowLongA
SendDlgItemMessageW
PostMessageW
CheckDlgButton
CreateDialogParamW
CreatePopupMenu
GetSubMenu
GetLastActivePopup
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
CreateDialogParamA
BringWindowToTop
ScreenToClient
FindWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
IsDlgButtonChecked
SetActiveWindow
GetDesktopWindow
SetWindowsHookExW
LoadCursorW
GetSystemMenu
FindWindowExW
DispatchMessageW
SetForegroundWindow
ExitWindowsEx
OpenClipboard
EmptyClipboard
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
EndDialog
SetProcessDefaultLayout
FindWindowW
FindWindowA
MessageBeep
LoadMenuW
wvsprintfW
MessageBoxW
AppendMenuA
RegisterClassExW
UnhookWindowsHookEx
SetDlgItemTextA
MessageBoxIndirectA
MoveWindow
DialogBoxParamW
MessageBoxA
GetWindowDC
DestroyCursor
wvsprintfA
DialogBoxParamA
GetSysColor
SetDlgItemTextW
GetKeyState
SystemParametersInfoA
DestroyIcon
IsWindowVisible
WinHelpW
SubtractRect
SystemParametersInfoW
LoadIconW
SetRect
DeleteMenu
InvalidateRect
wsprintfA
SendMessageTimeoutA
CharNextW
CallWindowProcW
GetClassNameW
SetWindowTextA
GetClassInfoW
CallWindowProcA
GetClassNameA
GetFocus
wsprintfW
CloseClipboard
GetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueA
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CoTaskMemFree
Number of PE resources by type
RT_DIALOG 18
RT_STRING 6
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 26
PE resources
ExifTool file metadata
SpecialBuild
Free Windows Vulnerability Scanner

CodeSize
147456

SubsystemVersion
5.0

Comments
Free Windows Vulnerability Scanner

LinkerVersion
99.18

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.0.0.9

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Free Windows Vulnerability Scanner

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
117248

PrivateBuild
Free Windows Vulnerability Scanner

EntryPoint
0x120e7

OriginalFileName
Free Windows Vulnerability Scanner

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2014

FileVersion
4, 0, 0, 9

TimeStamp
2018:08:18 22:38:30+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
Free Windows Vulnerability Scanner

ProductVersion
4, 0, 0, 9

UninitializedDataSize
0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Free Windows Vulnerability Scanner

LegalTrademarks
Free Windows Vulnerability Scanner

ProductName
Free Windows Vulnerability Scanner

ProductVersionNumber
4.0.0.9

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 72ef7fbebd414b5933c47e6c76823a88
SHA1 5320fac661d03dc6b64d40ff828d065e183df86a
SHA256 ec49cd6ac703bcc1f607b3b65557e0a7f6c37a7b4c3ca4b73ecd8d31b26ea50e
ssdeep
3072:BF6M2fXh+TYvjHvJ1896gy6y4az01wbJ71NjF5dF:iM2oqx69Y2az0

authentihash 3239ecd451a6eaf24ab60831975010db9869c772dcc01834d37618f3a18db7ce
imphash d891659cd66d391af061c8e57e2f092c
File size 224.5 KB ( 229888 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-19 16:57:59 UTC ( 7 months ago )
Last submission 2018-11-06 03:31:09 UTC ( 4 months, 1 week ago )
File names b.exe
38Kjddnnsa.exe
1a3f.exe
38kjddnnsa.exe
38Kjddnnsa.exe
38Kjddnnsa.exe
38Kjddnnsa.exe
.
sample
72ef7fbebd414b5933c47e6c76823a88
2018_10_25_13_09_53.000360
64d9.exe
Free Windows Vulnerability Scanner
9.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.