× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: b45c8f8061e1bd8c9009a60a7d177732365229af51c67bd39152ba28024d6819
Nombre: Zevera_Cracker_V2.0.exe
Detecciones: 5 / 60
Fecha de análisis: 2017-04-02 22:21:40 UTC ( hace 2 años, 1 mes ) Ver el más reciente
Antivirus Resultado Actualización
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9699 20170331
CrowdStrike Falcon (ML) malicious_confidence_87% (D) 20170130
Endgame malicious (moderate confidence) pefuj1 20170401
SentinelOne (Static ML) static engine - malicious 20170330
Symantec Trojan.Gen.8!cloud 20170402
Ad-Aware 20170402
AegisLab 20170402
AhnLab-V3 20170402
Alibaba 20170402
ALYac 20170402
Antiy-AVL 20170402
Arcabit 20170402
Avast 20170402
AVG 20170402
Avira (no cloud) 20170402
AVware 20170330
BitDefender 20170402
Bkav 20170402
CAT-QuickHeal 20170401
ClamAV 20170402
CMC 20170402
Comodo 20170402
Cyren 20170402
DrWeb 20170402
Emsisoft 20170402
ESET-NOD32 20170402
F-Prot 20170402
F-Secure 20170402
Fortinet 20170402
GData 20170402
Ikarus 20170402
Sophos ML 20170203
Jiangmin 20170402
K7AntiVirus 20170402
K7GW 20170402
Kaspersky 20170402
Kingsoft 20170402
Malwarebytes 20170402
McAfee 20170402
McAfee-GW-Edition 20170402
Microsoft 20170402
eScan 20170402
nProtect 20170402
Palo Alto Networks (Known Signatures) 20170402
Panda 20170402
Qihoo-360 20170402
Rising 20170402
Sophos AV 20170402
SUPERAntiSpyware 20170402
Symantec Mobile Insight 20170402
Tencent 20170402
TheHacker 20170330
TrendMicro 20170402
TrendMicro-HouseCall 20170402
Trustlook 20170402
VBA32 20170331
VIPRE 20170402
ViRobot 20170402
Webroot 20170402
WhiteArmor 20170327
Yandex 20170327
Zillya 20170402
ZoneAlarm by Check Point 20170402
Zoner 20170402
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2016

Product Zevera_Cracker_V2.0
Original name Zevera_Cracker_V2.0.exe
Internal name Zevera_Cracker_V2.0.exe
File version 1.0.0.0
Description Zevera_Cracker_V2.0
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-03-20 04:09:43
Entry Point 0x0005F6C6
Number of sections 3
.NET details
Module Version ID 14a0175d-5181-47d3-bd11-f378d07d03dc
TypeLib ID bfbf5f42-d99e-44fb-ad41-4e2dbbe0f7b2
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
80.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2048

EntryPoint
0x5f6c6

OriginalFileName
Zevera_Cracker_V2.0.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2016

FileVersion
1.0.0.0

TimeStamp
2017:03:20 05:09:43+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Zevera_Cracker_V2.0.exe

ProductVersion
1.0.0.0

FileDescription
Zevera_Cracker_V2.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
382976

ProductName
Zevera_Cracker_V2.0

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 20e86e03b409d8dad092d54fe9fd612b
SHA1 78c1c0dba7f7a2863c5a54e2904871ebd8be4143
SHA256 b45c8f8061e1bd8c9009a60a7d177732365229af51c67bd39152ba28024d6819
ssdeep
6144:VvqSZbQZmpwhUcZdBl6o7ATWg2TEIxzNwEv:ZbZb2awzH6LSgCEIxzG

authentihash be00244a89222617526c1bb4d656c410c87ab070fe5b5c6d312dfedde9dc7ef5
imphash f34d5f2d4577ed6d9ceec516c1f5a744
Tamaño del fichero 376.5 KB ( 385536 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (55.8%)
Win64 Executable (generic) (21.0%)
Windows screen saver (9.9%)
Win32 Dynamic Link Library (generic) (5.0%)
Win32 Executable (generic) (3.4%)
Tags
peexe assembly

VirusTotal metadata
First submission 2017-03-31 08:05:55 UTC ( hace 2 años, 1 mes )
Last submission 2018-02-28 18:38:31 UTC ( hace 1 año, 2 meses )
Nombres zevera_cracker_v2.0.exe
zevera_cracker_v2.0.exe
Zevera_Cracker_V2.0.exe
Behaviour characterization
Zemana
dll-injection

No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
DNS requests
UDP communications