× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f1c53e2633c11640b20c1d4f396ba5ed3f100631aa320af4a55c869c507ae5e1
File name: dfa46d2983f034e1f5852e876991eea2
Detection ratio: 8 / 68
Analysis date: 2018-09-15 03:30:06 UTC ( 5 months ago ) View latest
Antivirus Result Update
CAT-QuickHeal Trojan.Emotet.X4 20180912
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180723
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
Microsoft Trojan:Win32/Emotet.AC!bit 20180915
Rising Malware.Heuristic!ET#93% (RDM+:cmRtazrIWTszkCcfxxJUuiiaxqhX) 20180915
SentinelOne (Static ML) static engine - malicious 20180830
Symantec ML.Attribute.HighConfidence 20180914
Ad-Aware 20180913
AegisLab 20180915
AhnLab-V3 20180914
Alibaba 20180713
ALYac 20180915
Antiy-AVL 20180915
Arcabit 20180915
Avast 20180915
Avast-Mobile 20180915
AVG 20180915
Avira (no cloud) 20180914
AVware 20180915
Babable 20180907
Baidu 20180914
BitDefender 20180915
Bkav 20180914
ClamAV 20180915
CMC 20180914
Comodo 20180915
Cybereason 20180225
Cylance 20180915
Cyren 20180915
DrWeb 20180915
eGambit 20180915
Emsisoft 20180915
ESET-NOD32 20180915
F-Prot 20180915
F-Secure 20180915
Fortinet 20180915
GData 20180915
Ikarus 20180914
Jiangmin 20180915
K7AntiVirus 20180914
K7GW 20180914
Kaspersky 20180915
Kingsoft 20180915
Malwarebytes 20180915
MAX 20180915
McAfee 20180915
McAfee-GW-Edition 20180915
eScan 20180915
NANO-Antivirus 20180915
Palo Alto Networks (Known Signatures) 20180915
Panda 20180914
Qihoo-360 20180915
Sophos AV 20180914
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180915
Tencent 20180915
TheHacker 20180914
TotalDefense 20180914
TrendMicro 20180915
TrendMicro-HouseCall 20180915
Trustlook 20180915
VBA32 20180914
VIPRE 20180915
ViRobot 20180914
Webroot 20180915
Yandex 20180914
Zillya 20180914
ZoneAlarm by Check Point 20180915
Zoner 20180914
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

Product Mozilla
Internal name uconv
File version Personal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-15 10:16:05
Entry Point 0x0001FEC2
Number of sections 6
PE sections
PE imports
ReadEncryptedFileRaw
CryptGetHashParam
ObjectDeleteAuditAlarmW
CreateRestrictedToken
ChangeServiceConfig2A
RegSetValueW
DeleteAce
TreeResetNamedSecurityInfoW
GetSecurityDescriptorLength
CryptCreateHash
CM_Get_DevNode_Registry_PropertyW
PrintDlgExW
CryptUnregisterOIDFunction
CertCreateSelfSignCertificate
CryptHashCertificate
CertGetStoreProperty
CloseMetaFile
CreateBitmap
PaintRgn
GetTcpStatistics
GetAdaptersInfo
UnlockFile
ResumeThread
FindFirstChangeNotificationA
GetFileSize
GetModuleHandleA
OutputDebugStringW
RaiseException
_lopen
GlobalFindAtomA
FoldStringW
SetThreadPriority
PeekConsoleInputA
HeapAlloc
GetCurrentThreadId
AddVectoredExceptionHandler
MprInfoDelete
MprAdminMIBEntryGetFirst
MprAdminInterfaceGetHandle
NetApiBufferSize
SafeArrayDestroyDescriptor
VarI2FromStr
VARIANT_UserUnmarshal
RasEnumEntriesW
RasEnumConnectionsW
RpcSmDestroyClientContext
UuidCreateSequential
RpcBindingToStringBindingA
I_RpcAsyncAbortCall
RpcAsyncCompleteCall
SetupDiGetDriverInfoDetailA
SetupCloseLog
SetupDiGetClassInstallParamsW
StrCSpnIW
ReleaseDC
GetPriorityClipboardFormat
EnumThreadWindows
AnyPopup
MoveWindow
ShowWindowAsync
CreateIconFromResourceEx
GetClientRect
GetWindow
VerFindFileW
HttpSendRequestW
waveInGetPosition
mixerGetLineInfoW
XcvDataW
WintrustGetRegPolicyFlags
localeconv
MkParseDisplayName
GetClassFile
OleCreateEmbeddingHelper
PdhBrowseCountersW
PdhEnumObjectsW
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
264192

EntryPoint
0x1fec2

MIMEType
application/octet-stream

LegalCopyright
License: MPL 1.1/GPL 2.0/LGPL 2.1

FileVersion
Personal

TimeStamp
2018:09:15 03:16:05-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
uconv

ProductVersion
Personal

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mozilla, Netscape

LegalTrademarks
Mozilla, Netscape

ProductName
Mozilla

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 dfa46d2983f034e1f5852e876991eea2
SHA1 c6941e2ea4ae0c9a333bb1be62aab694fb354e86
SHA256 f1c53e2633c11640b20c1d4f396ba5ed3f100631aa320af4a55c869c507ae5e1
ssdeep
6144:E5UJwnhTjraGii5LinB/Qb7+TGSx3eNmHo6Xd0rQa:EKIFaYABYQGSdnL

authentihash 8197da00c86085fc529b63d57a1392f959a9ba79b8e5b69454ea951c04f1ca7a
imphash 8f7e883b473282c2fadd056acc696823
File size 383.5 KB ( 392704 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-15 03:27:19 UTC ( 5 months ago )
Last submission 2018-09-15 23:52:07 UTC ( 5 months ago )
File names 61702103.exe
26339800.exe
70283.exe
28174808.exe
31386072.exe
71017.exe
02.exe
uconv
31582680.exe
29747672.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs