× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ff3ece481e546e52c9533b71a66d79771ba723b16848db774bb2e2be2898385c
File name: 10cc3a14dd0c29dbe977ace20c7de6b3a2590a33
Detection ratio: 20 / 68
Analysis date: 2018-06-20 05:34:07 UTC ( 8 months ago ) View latest
Antivirus Result Update
AegisLab Ml.Attribute.Gen!c 20180620
AVG FileRepMalware 20180620
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180620
Comodo CloudScanner.Trojan.Gen 20180620
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cylance Unsafe 20180620
Emsisoft Trojan.Emotet (A) 20180620
Fortinet W32/Kryptik.FVEZ!tr 20180620
Sophos ML heuristic 20180601
Kaspersky UDS:DangerousObject.Multi.Generic 20180620
MAX malware (ai score=76) 20180620
McAfee Artemis!083F8D23F00D 20180620
McAfee-GW-Edition BehavesLike.Win32.ZeroAccess.fm 20180620
Microsoft Trojan:Win32/Cloxer.D!cl 20180619
Palo Alto Networks (Known Signatures) generic.ml 20180620
Qihoo-360 HEUR/QVM20.1.F50F.Malware.Gen 20180620
Symantec ML.Attribute.HighConfidence 20180620
TrendMicro-HouseCall Suspicious_GEN.F47V0620 20180620
Webroot W32.Trojan.Emotet 20180620
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180620
Ad-Aware 20180620
AhnLab-V3 20180620
Alibaba 20180620
ALYac 20180620
Antiy-AVL 20180620
Arcabit 20180620
Avast 20180620
Avast-Mobile 20180619
Avira (no cloud) 20180619
AVware 20180618
Babable 20180406
BitDefender 20180620
Bkav 20180619
CAT-QuickHeal 20180620
ClamAV 20180620
CMC 20180620
Cybereason 20180225
Cyren 20180620
DrWeb 20180620
eGambit 20180620
Endgame 20180612
ESET-NOD32 20180620
F-Prot 20180620
F-Secure 20180620
GData 20180620
Ikarus 20180619
Jiangmin 20180620
K7AntiVirus 20180619
K7GW 20180620
Kingsoft 20180620
Malwarebytes 20180620
eScan 20180620
NANO-Antivirus 20180620
Panda 20180619
Rising 20180620
SentinelOne (Static ML) 20180618
Sophos AV 20180620
SUPERAntiSpyware 20180620
Symantec Mobile Insight 20180619
TACHYON 20180620
Tencent 20180620
TheHacker 20180619
TotalDefense 20180620
TrendMicro 20180620
Trustlook 20180620
VBA32 20180619
VIPRE 20180620
ViRobot 20180619
Yandex 20180618
Zillya 20180619
Zoner 20180619
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Description Uniscri
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-20 06:25:19
Entry Point 0x0000100F
Number of sections 6
PE sections
PE imports
NotifyBootConfigStatus
CryptReleaseContext
RegCloseKey
OpenSCManagerW
RegEnumKeyW
LookupPrivilegeDisplayNameA
QueryServiceConfigW
CM_Get_Resource_Conflict_DetailsW
ClusterRegSetValue
ClusterRegCreateKey
ImageList_Create
CertCreateCertificateChainEngine
CertFindSubjectInSortedCTL
CertSaveStore
CertGetEnhancedKeyUsage
JetCommitTransaction
GetKerningPairsW
LineTo
DeleteDC
SetAbortProc
EnumFontFamiliesW
SetColorAdjustment
CreateFontIndirectA
CreateRectRgnIndirect
CreateEnhMetaFileA
CreateDIBSection
GetLayout
CopyEnhMetaFileW
GetTextFaceA
ImmConfigureIMEW
GetSystemDefaultLangID
GetBinaryTypeA
SetVolumeLabelA
WaitForDebugEvent
SetTimeZoneInformation
Process32First
SetCalendarInfoW
GetStartupInfoW
SetEndOfFile
FlushFileBuffers
GetModuleFileNameA
FlsFree
WinExec
FindActCtxSectionStringW
LZOpenFileW
LZSeek
MprAdminInterfaceDisconnect
MprAdminInterfaceSetInfo
NetServerGetInfo
NetShareEnumSticky
BSTR_UserSize
LHashValOfNameSys
VariantTimeToSystemTime
VariantCopyInd
glTexCoord2f
UuidToStringA
NdrClientInitializeNew
RpcMgmtWaitServerListen
NdrOleAllocate
SetupGetTargetPathW
SetupDiSetDeviceRegistryPropertyA
SetupDiGetINFClassW
SetupDiInstallClassW
SetupDiBuildDriverInfoList
SetupOpenMasterInf
SetupDiGetClassInstallParamsA
SHSetLocalizedName
PathAddBackslashA
SHGetInverseCMAP
PathIsRelativeA
UrlIsW
PathRemoveArgsW
PathRenameExtensionA
PathCanonicalizeW
AcquireCredentialsHandleW
wsprintfA
EnumPropsA
CreateMenu
GetMessagePos
GetClipCursor
GetScrollRange
GetInputState
AnyPopup
GetMessageExtraInfo
MoveWindow
GetDialogBaseUnits
GetMonitorInfoA
EnumWindowStationsA
GetWindowContextHelpId
BroadcastSystemMessageA
CloseWindowStation
PeekMessageW
FtpOpenFileA
waveOutGetID
mmioAscend
SendDriverMessage
timeBeginPeriod
GetPrinterDriverW
WTHelperProvDataFromStateData
wcstod
fputws
fgetws
iswpunct
CoUnmarshalInterface
WriteClassStm
CoMarshalHresult
StringFromCLSID
CoDisconnectObject
HBITMAP_UserUnmarshal
PdhEnumObjectItemsHW
IsAsyncMoniker
CoInternetIsFeatureEnabled
Number of PE resources by type
RT_DIALOG 21
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
HEBREW DEFAULT 1
HUNGARIAN DEFAULT 1
VIETNAMESE DEFAULT 1
CHINESE SIMPLIFIED 1
SLOVENIAN DEFAULT 1
CZECH DEFAULT 1
FINNISH DEFAULT 1
KOREAN 1
NEUTRAL DEFAULT 1
PORTUGUESE 1
POLISH DEFAULT 1
JAPANESE DEFAULT 1
DANISH DEFAULT 1
SLOVAK DEFAULT 1
GREEK DEFAULT 1
TURKISH DEFAULT 1
ROMANIAN 1
THAI DEFAULT 1
SERBIAN DEFAULT 1
NEUTRAL 1
RUSSIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.2.0.6

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Uniscri

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
235520

EntryPoint
0x100f

MIMEType
application/octet-stream

TimeStamp
2018:06:20 08:25:19+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0626.

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Realtek Semiconductor Corporation

CodeSize
108544

FileSubtype
0

ProductVersionNumber
1.2.0.6

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 083f8d23f00d8383379714818fd34f84
SHA1 10cc3a14dd0c29dbe977ace20c7de6b3a2590a33
SHA256 ff3ece481e546e52c9533b71a66d79771ba723b16848db774bb2e2be2898385c
ssdeep
3072:k9Mg8b3r/u8Z21F5C4KtTVuTugBTHLVx2xOGimIHCrPbdm:Q8bb/u8CF5C4KtTVuTr9rVxIsFC

authentihash d29294b0fee224e3767c032667fd0eff0bf2846939c4dd911865a1d7d11cda0c
imphash d8602b6ed60cfe4354fce4284317962a
File size 332.5 KB ( 340480 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-19 23:27:42 UTC ( 8 months ago )
Last submission 2018-06-20 03:04:29 UTC ( 8 months ago )
File names 5919.exe
20419.exe
27412.exe
80478.exe
2758.exe
24795.exe
3589.exe
10cc3a14dd0c29dbe977ace20c7de6b3a2590a33
21554.exe
09899.exe
4070.exe
64849.exe
31559.exe
34959.exe
71360.exe
2447.exe
53151.exe
76446.exe
3956.exe
3782.exe
Ea5MNDobXI7rGC.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!