× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ff9ee1cc5bee1277a429b114298d9ab681fec1b846205996d40ccaf7e1373cb9
File name: output.113898727.txt
Detection ratio: 15 / 67
Analysis date: 2018-08-22 14:32:50 UTC ( 9 months ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180820
CAT-QuickHeal Trojan.Emotet.X4 20180822
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180822
McAfee-GW-Edition BehavesLike.Win32.Emotet.fm 20180822
Microsoft Trojan:Win32/Emotet.AC!bit 20180822
Palo Alto Networks (Known Signatures) generic.ml 20180822
Qihoo-360 HEUR/QVM20.1.5AFB.Malware.Gen 20180822
Rising Malware.Heuristic!ET#85% (RDM+:cmRtazojP9dHPIYXZgnV1i/Zj528) 20180822
SentinelOne (Static ML) static engine - malicious 20180701
Symantec ML.Attribute.HighConfidence 20180822
Webroot W32.Trojan.Emotet 20180822
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180822
Ad-Aware 20180822
AegisLab 20180822
AhnLab-V3 20180822
Alibaba 20180713
ALYac 20180822
Antiy-AVL 20180822
Arcabit 20180822
Avast 20180822
Avast-Mobile 20180822
AVG 20180822
Avira (no cloud) 20180822
AVware 20180822
Babable 20180822
BitDefender 20180822
Bkav 20180822
ClamAV 20180821
CMC 20180822
Comodo 20180822
Cybereason 20180225
Cyren 20180822
DrWeb 20180822
eGambit 20180822
Emsisoft 20180822
ESET-NOD32 20180822
F-Prot 20180822
F-Secure 20180822
Fortinet 20180822
GData 20180822
Ikarus 20180822
Jiangmin 20180822
K7AntiVirus 20180822
K7GW 20180822
Kingsoft 20180822
Malwarebytes 20180822
MAX 20180822
McAfee 20180822
eScan 20180822
NANO-Antivirus 20180822
Panda 20180822
Sophos AV 20180822
SUPERAntiSpyware 20180822
Symantec Mobile Insight 20180822
TACHYON 20180822
Tencent 20180822
TheHacker 20180821
TotalDefense 20180822
TrendMicro 20180822
TrendMicro-HouseCall 20180822
Trustlook 20180822
VBA32 20180822
VIPRE 20180822
ViRobot 20180822
Yandex 20180822
Zillya 20180822
Zoner 20180822
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Visual Studio® 2015
Original name MFCM140U.DLL
Internal name MFCM140U.DLL
File version 14.0.23026.0 built by: WCSETUP
Description MFC Managed Library - Retail Version
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-22 13:34:02
Entry Point 0x0001301C
Number of sections 6
PE sections
PE imports
ReadEncryptedFileRaw
BackupEventLogW
RegDisablePredefinedCache
QueryUsersOnEncryptedFile
AddAuditAccessAceEx
CM_Get_Device_Interface_List_SizeW
SetTextAlign
GetTextCharsetInfo
GetAspectRatioFilterEx
UnrealizeObject
GetDCPenColor
DeleteIpForwardEntry
GetACP
DeviceIoControl
GetLogicalProcessorInformation
GetBinaryTypeW
GetModuleHandleA
GetNumberFormatW
GetWindowsDirectoryA
WriteFile
UnlockFileEx
GetCommandLineA
WriteConsoleOutputAttribute
GetVersionExW
GetSystemPowerStatus
ExitThread
GetProcessHeap
DrawDibClose
ICSeqCompressFrameEnd
DsListSitesW
VarUI2FromBool
VarTokenizeFormatString
SetupDiCancelDriverInfoSearch
PathIsDirectoryA
UrlCompareW
PathIsDirectoryEmptyW
DefDlgProcA
EnumDesktopWindows
OpenDesktopA
EndDialog
midiOutUnprepareHeader
mciSendStringA
mixerMessage
PropVariantClear
OleBuildVersion
CoCreateGuid
PdhEnumObjectItemsW
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
14.0.23026.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
MFC Managed Library - Retail Version

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
263680

EntryPoint
0x1301c

OriginalFileName
MFCM140U.DLL

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
14.0.23026.0 built by: WCSETUP

TimeStamp
2018:08:22 15:34:02+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
MFCM140U.DLL

ProductVersion
14.0.23026.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
80896

ProductName
Microsoft Visual Studio 2015

ProductVersionNumber
14.0.23026.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 4436a6128b28b3c79314536eaa7d0d45
SHA1 abe94368e28ad0e2d84540c0ed1d68cec9f1fd4a
SHA256 ff9ee1cc5bee1277a429b114298d9ab681fec1b846205996d40ccaf7e1373cb9
ssdeep
6144:lpQYetF1QtgPCaTS0GGQ5yJJyiwjW9A+ME:fQPgtYxT/GGO6/

authentihash c120c31729c3e7d13fa0b55ca6c2ec38c9aa9a31d47da6aa8a47c8faa34c6e4a
imphash 5748cabcb2fc996aa2e51985a329ce7d
File size 332.0 KB ( 339968 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-22 13:46:23 UTC ( 9 months ago )
Last submission 2018-08-25 00:34:49 UTC ( 9 months ago )
File names 2018-08-22-Emotet-malware-binary.exe
4.exe
initialapply.exe
25094600.exe
8311.exe
output.113898727.txt
98.exe
323995.exe
215.exe
voicediagram.exe
269660.exe
1714106.exe
8482.exe
3761293.exe
MFCM140U.DLL
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs
UDP communications