× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f49540eff6319f842f074e9acbfb877443df849037f4f0335d66cdee4a676f62
File name: f49540eff6319f842f074e9acbfb877443df849037f4f0335d66cdee4a676f62
Detection ratio: 14 / 70
Analysis date: 2018-12-14 17:49:37 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.b2156c 20180225
Cylance Unsafe 20181214
eGambit Unsafe.AI_Score_99% 20181214
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
K7AntiVirus Spyware ( 005068aa1 ) 20181214
K7GW Spyware ( 005068aa1 ) 20181214
Qihoo-360 HEUR/QVM20.1.DD57.Malware.Gen 20181214
Rising Trojan.Fuerboos!8.EFC8 (TFE:dGZlOgJHFPKNzEd+lQ) 20181214
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/EncPk-ANX 20181214
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Avira (no cloud) 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181214
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
Emsisoft 20181214
ESET-NOD32 20181214
F-Prot 20181214
F-Secure 20181214
Fortinet 20181214
GData 20181214
Ikarus 20181214
Jiangmin 20181214
Kaspersky 20181214
Kingsoft 20181214
Malwarebytes 20181214
MAX 20181214
McAfee 20181214
McAfee-GW-Edition 20181214
Microsoft 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TotalDefense 20181214
TrendMicro 20181214
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
VIPRE 20181214
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-15 01:34:56
Entry Point 0x00006E1E
Number of sections 4
PE sections
PE imports
LookupPrivilegeNameW
GetWindowsAccountDomainSid
EnumServicesStatusW
SetSecurityAccessMask
EqualPrefixSid
GetOpenFileNameA
GetFileTitleW
GetBrushOrgEx
ExcludeClipRect
GetColorAdjustment
GdiSetBatchLimit
GetTextCharsetInfo
GetTextExtentPointA
GetTextColor
GetRgnBox
GetSystemPaletteUse
GetCharWidthA
GetCharWidth32A
LineDDA
GetTextExtentPointW
GetNamedPipeClientProcessId
DefineDosDeviceW
GetShortPathNameW
GetOverlappedResult
GetEnvironmentStringsW
GetThreadLocale
VirtualProtect
lstrcmpiW
LoadLibraryA
GetPriorityClass
GetEnvironmentStrings
GetLocaleInfoA
GetCompressedFileSizeW
GetVolumeInformationW
EnumTimeFormatsA
FindVolumeMountPointClose
GetConsoleScreenBufferInfo
FormatMessageA
GetTempFileNameW
EnumResourceTypesA
FlushProcessWriteBuffers
GlobalAddAtomA
lstrcpyA
IsProcessorFeaturePresent
lstrcpynA
lstrcmpW
GetModuleHandleW
FreeResource
GlobalMemoryStatus
GetLongPathNameW
LoadResource
GetTempPathW
VirtualQueryEx
DeleteTimerQueue
GetCurrentThreadId
FindResourceA
FindFirstVolumeW
ExtractAssociatedIconA
ExtractIconW
ExtractAssociatedIconW
GetUserNameExW
GetComputerObjectNameW
GetPriorityClipboardFormat
EnumWindowStationsA
IsWindow
LockWorkStation
GetMenu
GetWindowRgn
GetMenuItemCount
GetWindowTextLengthA
DefMDIChildProcW
GetDlgItemTextA
GetKeyboardLayoutNameW
GetDlgItem
DrawIcon
LoadAcceleratorsW
GetWindowLongW
GetOpenClipboardWindow
GetCaretPos
GetClipboardOwner
GetThreadDesktop
GetMenuItemID
GetKeyNameTextW
GetPrinterDataExW
Ord(29)
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:15 02:34:56+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
12.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x6e1e

InitializedDataSize
114688

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
1

File identification
MD5 b7b7b2d6d530617b6c165d42cdf69ccd
SHA1 a51a866b2156c9e83aae57182a4754bf76fd54ff
SHA256 f49540eff6319f842f074e9acbfb877443df849037f4f0335d66cdee4a676f62
ssdeep
3072:krzMrTsESllYcvjN7gMBK02z+ZOvlWvifIpz:krzMrTmv1gMt4+Mvc5pz

authentihash 0294c51558b90629c29f03a8a78d7a092b5c868b1f113f8d0563e93f9f17f7b1
imphash a2690ec0bc1dbbad66cac3a9965f21ae
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-14 17:49:37 UTC ( 2 months, 1 week ago )
Last submission 2018-12-14 17:49:37 UTC ( 2 months, 1 week ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!