× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 333aff311b07c5cbedfb618ff902b0dd663c0ba50b2dc8a2a590e9409cb9bc3c
Nombre: daed686d.gxe
Detecciones: 38 / 68
Fecha de análisis: 2018-06-13 14:57:05 UTC ( hace 9 meses, 1 semana ) Ver el más reciente
Antivirus Resultado Actualización
Ad-Aware Trojan.GenericKD.30964124 20180613
AegisLab Ml.Attribute.Gen!c 20180613
Arcabit Trojan.Generic.D1D8799C 20180613
Avast Win32:Malware-gen 20180613
AVG Win32:Malware-gen 20180613
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180613
BitDefender Trojan.GenericKD.30964124 20180613
Bkav W32.eHeur.Malware03 20180613
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180530
Cylance Unsafe 20180613
Cyren W32/Trojan.NATZ-9383 20180613
DrWeb Trojan.Encoder.24384 20180613
Emsisoft Trojan.GenericKD.30964124 (B) 20180613
Endgame malicious (high confidence) 20180612
ESET-NOD32 a variant of Win32/Kryptik.GHSV 20180613
Fortinet W32/GenKryptik.CCHU!tr 20180613
GData Trojan.GenericKD.30964124 20180613
Ikarus Trojan-Spy.Zbot 20180613
Sophos ML heuristic 20180601
Jiangmin AdWare.Generic.nwgc 20180613
K7AntiVirus Trojan ( 005344f71 ) 20180613
K7GW Trojan ( 005344f71 ) 20180613
Kaspersky Trojan.Win32.Chapak.abva 20180613
Malwarebytes Trojan.MalPack 20180613
MAX malware (ai score=96) 20180613
McAfee Trojan-FPSR!DAED686DED4F 20180613
McAfee-GW-Edition BehavesLike.Win32.PUPXEI.dc 20180613
Microsoft Trojan:Win32/Cloxer.D!cl 20180613
eScan Trojan.GenericKD.30964124 20180613
Palo Alto Networks (Known Signatures) generic.ml 20180613
Qihoo-360 HEUR/QVM10.2.CDAD.Malware.Gen 20180613
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Generic-S 20180613
Symantec Trojan.Gen.2 20180613
TrendMicro Possible_HPGen-37b 20180613
TrendMicro-HouseCall Suspicious_GEN.F47V0612 20180613
Webroot W32.Trojan.Gen 20180613
ZoneAlarm by Check Point Trojan.Win32.Chapak.abva 20180613
AhnLab-V3 20180613
Alibaba 20180613
ALYac 20180613
Antiy-AVL 20180613
Avast-Mobile 20180613
Avira (no cloud) 20180613
AVware 20180613
Babable 20180406
CAT-QuickHeal 20180613
ClamAV 20180613
CMC 20180613
Comodo 20180613
Cybereason 20180225
eGambit 20180613
F-Prot 20180613
F-Secure 20180613
Kingsoft 20180613
NANO-Antivirus 20180613
Panda 20180613
Rising 20180613
SUPERAntiSpyware 20180613
Symantec Mobile Insight 20180605
TACHYON 20180613
Tencent 20180613
TheHacker 20180613
TotalDefense 20180613
Trustlook 20180613
VBA32 20180613
VIPRE 20180613
ViRobot 20180613
Yandex 20180613
Zillya 20180613
Zoner 20180612
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Internal name sgahwwjfghj.exe
File version 1.0.0.11
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-06-12 13:05:51
Entry Point 0x00002985
Number of sections 6
PE sections
PE imports
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
TerminateThread
LoadLibraryW
GetConsoleCP
GetDriveTypeA
QueryPerformanceCounter
IsDebuggerPresent
EncodePointer
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
RtlUnwind
GetACP
FindFirstFileExW
GetStdHandle
SetFilePointerEx
HeapAlloc
DeleteCriticalSection
GetCurrentProcess
GetFileType
GetConsoleMode
DecodePointer
GetCurrentProcessId
AddAtomA
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
InitializeSListHead
GetStartupInfoW
ExitProcess
lstrcpyW
RaiseException
WideCharToMultiByte
GetModuleFileNameW
TlsFree
ReadFile
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
GetProcessWorkingSetSize
DuplicateHandle
HeapReAlloc
GetStringTypeW
GetModuleHandleW
FindNextFileW
FreeLibrary
GetSystemTimeAdjustment
TerminateProcess
GetProcessAffinityMask
GetModuleHandleExW
IsValidCodePage
CreateFileW
FatalExit
FindClose
TlsGetValue
WriteConsoleW
ReadConsoleW
TlsSetValue
GetCurrentThreadId
SetComputerNameExW
GetProcessHeap
VirtualAlloc
SetLastError
LeaveCriticalSection
EnableScrollBar
BeginPaint
PostMessageA
ShowScrollBar
DestroyIcon
Number of PE resources by type
RT_ICON 6
RT_BITMAP 3
RAGULUYODAWOHURACUREMAXOJOSE 1
RULEVIYA 1
XAHAWERALUZUJICEHOWODIZODU 1
ZODANECOLOLARUMALIVU 1
PFV 1
KEWOFEJAVEHEBAJIGIVI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
CZECH NEUTRAL 15
CZECH SYS DEFAULT 1
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
1.0.0.0

LanguageCode
English (British)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
465408

EntryPoint
0x2985

MIMEType
application/octet-stream

FileVersion
1.0.0.11

TimeStamp
2018:06:12 14:05:51+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
sgahwwjfghj.exe

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
96256

FileSubtype
0

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
Compressed bundles
File identification
MD5 daed686ded4f8eaa14c9bce8883e9c46
SHA1 489c691cbab6d632294704d6f293baa99c146532
SHA256 333aff311b07c5cbedfb618ff902b0dd663c0ba50b2dc8a2a590e9409cb9bc3c
ssdeep
6144:/uNlyD/BYPvO0fOjoCOzUCd9LfOQtwd46GzVeuESy:mjGaTf5vJtwd46

authentihash 3e8f9d97400a904bc3823ae5777e86e38634ab88298579294b2923639fc04b16
imphash c7be5b8ac9681256d77786f44b7f9427
Tamaño del fichero 269.0 KB ( 275456 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-06-12 14:49:21 UTC ( hace 9 meses, 1 semana )
Last submission 2018-10-01 11:01:02 UTC ( hace 5 meses, 2 semanas )
Nombres daed686d.gxe
w9qFkhR.exe
sgahwwjfghj.exe
update_prefs.exe
2018-06-12-zeus-panda-banker-caused-by-emotet-infection.bin
2018-06-12-Zeus-Panda-Banker-caused-by-Emotet-infection.exe
Advanced heuristic and reputation engines
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs