× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 7fc47d5ad730ef6e9036e2b7c8dabf6728c1cf8ee7036ff2f9e404c9b2bbf903
Nombre: MiniRO2.exe
Detecciones: 17 / 68
Fecha de análisis: 2018-12-06 14:42:13 UTC ( hace 5 meses, 2 semanas ) Ver el más reciente
Antivirus Resultado Actualización
Avira (no cloud) HEUR/AGEN.1033674 20181206
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20181022
Cylance Unsafe 20181206
Cyren W32/Autohk.PQSN-5524 20181206
Endgame malicious (moderate confidence) 20181108
F-Prot W32/Autohk.D 20181206
Jiangmin Trojan.PSW.Coins.lz 20181206
K7AntiVirus Trojan-Downloader ( 0053eecb1 ) 20181206
K7GW Trojan-Downloader ( 0053eecb1 ) 20181206
McAfee-GW-Edition BehavesLike.Win32.Generic.dh 20181206
Qihoo-360 HEUR/QVM10.1.AF38.Malware.Gen 20181206
Rising Malware.Heuristic!ET#100% (RDM+:cmRtazr3hDO6c1OdXt7rNE7kaveN) 20181206
Symantec ML.Attribute.HighConfidence 20181206
Trapmine malicious.moderate.ml.score 20181205
VBA32 Trojan.Tiggre 20181206
ViRobot Dropper.Agent.1693184 20181206
Zoner TrojanAgent.Generic 20181206
Ad-Aware 20181206
AegisLab 20181206
AhnLab-V3 20181206
Alibaba 20180921
ALYac 20181206
Antiy-AVL 20181205
Arcabit 20181206
Avast 20181206
Avast-Mobile 20181206
AVG 20181206
Babable 20180918
Baidu 20181206
BitDefender 20181206
Bkav 20181205
CAT-QuickHeal 20181206
ClamAV 20181206
CMC 20181205
Comodo 20181206
Cybereason 20180225
DrWeb 20181206
eGambit 20181206
Emsisoft 20181206
ESET-NOD32 20181206
F-Secure 20181206
Fortinet 20181206
GData 20181206
Ikarus 20181206
Sophos ML 20181128
Kaspersky 20181206
Kingsoft 20181206
Malwarebytes 20181206
MAX 20181206
McAfee 20181206
Microsoft 20181206
eScan 20181206
NANO-Antivirus 20181206
Palo Alto Networks (Known Signatures) 20181206
Panda 20181206
SentinelOne (Static ML) 20181011
Sophos AV 20181206
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
TACHYON 20181206
Tencent 20181206
TheHacker 20181202
TrendMicro 20181206
TrendMicro-HouseCall 20181206
Trustlook 20181206
Webroot 20181206
Yandex 20181204
Zillya 20181206
ZoneAlarm by Check Point 20181206
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
File version 1.1.29.01
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-02 05:25:38
Entry Point 0x00090B03
Number of sections 4
PE sections
PE imports
RegCreateKeyExW
CloseServiceHandle
RegEnumValueW
RegConnectRegistryW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegDeleteValueW
RegQueryInfoKeyW
GetUserNameW
OpenSCManagerW
RegEnumKeyExW
LockServiceDatabase
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
UnlockServiceDatabase
RegQueryValueExW
InitCommonControlsEx
ImageList_Destroy
CreateStatusWindowW
ImageList_AddMasked
ImageList_GetIconSize
ImageList_Create
ImageList_ReplaceIcon
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
GetCharABCWidthsW
GetTextMetricsW
GetSystemPaletteEntries
CreatePolygonRgn
GetClipBox
GetPixel
GetDeviceCaps
ExcludeClipRect
DeleteDC
SetBkMode
GetObjectW
BitBlt
CreateDIBSection
SetTextColor
CreatePatternBrush
FillRgn
CreateEllipticRgn
GetTextFaceW
CreateDCW
EnumFontFamiliesExW
GetStockObject
GetDIBits
GdiFlush
CreateRoundRectRgn
CreateCompatibleDC
CreateFontW
SetBrushOrgEx
CreateRectRgn
GetClipRgn
CreateSolidBrush
SelectObject
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
GetPrivateProfileSectionNamesW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetDiskFreeSpaceW
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
FormatMessageW
InitializeCriticalSection
OutputDebugStringW
GetStringTypeExW
FindClose
InterlockedDecrement
QueryDosDeviceW
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetSystemTime
DeviceIoControl
TlsGetValue
CopyFileW
WriteProcessMemory
LoadResource
RemoveDirectoryW
Beep
IsDebuggerPresent
HeapAlloc
HeapSetInformation
SetThreadPriority
WritePrivateProfileSectionW
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
GetFullPathNameW
CreateThread
SetEnvironmentVariableW
GetSystemDefaultUILanguage
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
SetPriorityClass
TerminateProcess
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
GlobalSize
GetWindowsDirectoryW
GetFileSize
OpenProcess
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetComputerNameW
EnumResourceNamesW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
FindFirstFileW
GlobalLock
SetVolumeLabelW
GetPrivateProfileSectionW
CreateFileW
GetFileType
TlsSetValue
ExitProcess
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
VirtualAllocEx
GlobalFree
GetConsoleCP
FindResourceW
GetTimeFormatW
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
VirtualFreeEx
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
GetCPInfo
HeapSize
WritePrivateProfileStringW
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
GetTempPathW
CreateProcessW
Sleep
SafeArrayDestroy
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SysFreeString
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
VariantCopyInd
VariantClear
SysAllocString
GetActiveObject
SafeArrayUnlock
SafeArrayGetUBound
SafeArrayLock
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCopy
OleLoadPicture
SysStringLen
GetModuleFileNameExW
GetModuleBaseNameW
SHGetFolderPathW
SHEmptyRecycleBinW
SHBrowseForFolderW
DragQueryFileW
SHFileOperationW
ExtractIconW
SHGetPathFromIDListW
DragQueryPoint
ShellExecuteExW
SHGetDesktopFolder
Shell_NotifyIconW
SHGetMalloc
DragFinish
RedrawWindow
GetMessagePos
SetWindowRgn
RegisterWindowMessageW
UnregisterHotKey
DrawTextW
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
IsWindow
ScreenToClient
WindowFromPoint
SetMenuItemInfoW
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetMenuStringW
GetMenu
GetClientRect
SetMenuDefaultItem
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
CountClipboardFormats
keybd_event
GetTopWindow
RegisterHotKey
OpenClipboard
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetKeyState
DestroyWindow
GetClassInfoExW
UpdateWindow
GetPropW
EnumWindows
CheckRadioButton
MapVirtualKeyExW
GetMessageW
ShowWindow
SetMenuInfo
EnableMenuItem
SetPropW
GetDesktopWindow
IsCharAlphaW
PeekMessageW
InsertMenuItemW
CharUpperW
GetClipboardFormatNameW
SetClipboardViewer
TranslateMessage
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
GetIconInfo
SetParent
SetClipboardData
IsZoomed
IsCharLowerW
IsIconic
TrackPopupMenuEx
GetSubMenu
CreateMenu
GetKeyboardLayout
FlashWindow
CreateAcceleratorTableW
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetUpdateRect
GetGUIThreadInfo
PtInRect
MapWindowPoints
VkKeyScanExW
EmptyClipboard
SystemParametersInfoW
DefWindowProcW
GetKeyboardLayoutNameW
KillTimer
MapVirtualKeyW
GetClipboardData
GetParent
ToUnicodeEx
GetSystemMetrics
SetWindowLongW
GetWindowRect
IsDialogMessageW
EnumChildWindows
CharLowerW
SendDlgItemMessageW
SetKeyboardState
GetCursor
CreatePopupMenu
CheckMenuItem
GetClassLongW
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
RemovePropW
BringWindowToTop
SendInput
ClientToScreen
PostMessageW
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
AttachThreadInput
DestroyAcceleratorTable
CreateIconFromResourceEx
SetWindowsHookExW
LoadCursorW
GetSystemMenu
FindWindowW
GetDC
FillRect
SetForegroundWindow
ExitWindowsEx
SetFocus
GetMenuItemInfoW
GetAsyncKeyState
CreateDialogIndirectParamW
IntersectRect
SetLayeredWindowAttributes
EndDialog
CreateIconIndirect
GetDlgCtrlID
MessageBeep
RemoveMenu
GetWindowThreadProcessId
GetQueueStatus
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
DialogBoxParamW
AppendMenuW
ChangeClipboardChain
AdjustWindowRectEx
mouse_event
GetFocus
GetSysColor
SetDlgItemTextW
CopyImage
DestroyIcon
IsWindowVisible
IsCharAlphaNumericW
GetLastInputInfo
DispatchMessageW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
GetAncestor
IsCharUpperW
IsMenu
SendMessageTimeoutW
EnableWindow
CloseClipboard
DefDlgProcW
SetMenu
TranslateAcceleratorW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
mixerGetLineControlsW
mixerGetControlDetailsW
mixerOpen
waveOutSetVolume
mixerSetControlDetails
mciSendStringW
mixerClose
mixerGetDevCapsW
waveOutGetVolume
mixerGetLineInfoW
joyGetPosEx
joyGetDevCapsW
WSAStartup
gethostbyname
gethostname
inet_addr
WSACleanup
CreateStreamOnHGlobal
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CoGetObject
CLSIDFromString
StringFromGUID2
Number of PE resources by type
RT_ICON 13
RT_GROUP_ICON 5
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_RCDATA 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 24
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
1.1.29.1

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
358912

EntryPoint
0x90b03

MIMEType
application/octet-stream

FileVersion
1.1.29.01

TimeStamp
2018:06:02 07:25:38+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.1.29.01

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
645120

FileSubtype
0

ProductVersionNumber
1.1.29.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 4976e979818e528bd96525c3a6a1bb2e
SHA1 a5ee05dbd4a85b700c63d7f444228cac94c9dd1b
SHA256 7fc47d5ad730ef6e9036e2b7c8dabf6728c1cf8ee7036ff2f9e404c9b2bbf903
ssdeep
24576:P4f8og+7/C3fX+Jlwq3g/46tAdyBFaiFwgKllXzI:P5a7++J6yEFaow7llXs

authentihash 859e2684cc9ee976ab364af6cc2acd77d86414acacdca6716fe404cbd4269225
imphash 847c3746fe942bb10b09e9ad7a65deac
Tamaño del fichero 981.5 KB ( 1005056 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.0%)
Win64 Executable (generic) (31.0%)
Windows screen saver (14.7%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-06 14:42:13 UTC ( hace 5 meses, 2 semanas )
Last submission 2019-01-04 16:55:55 UTC ( hace 4 meses, 2 semanas )
Nombres MiniRO2.exe
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Searched windows
Runtime DLLs