× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: 5c5fb635d7d355ad148a520da62c706c6521413479080219e6dfd623f06590c1
Nom du fichier : output.113312268.txt
Ratio de détection : 54 / 66
Date d'analyse : 2018-11-10 13:18:01 UTC (il y a 1 mois)
Antivirus Résultat Mise à jour
Ad-Aware Trojan.GenericKD.30793887 20181110
AhnLab-V3 Win-Trojan/Gandcrab01.Exp 20181110
ALYac Misc.Riskware.BitCoinMiner 20181110
Antiy-AVL Trojan/Win32.TSGeneric 20181110
Arcabit Trojan.Generic.D1D5E09F 20181110
Avast Win32:Malware-gen 20181110
AVG Win32:Malware-gen 20181110
Avira (no cloud) HEUR/AGEN.1032585 20181110
BitDefender Trojan.GenericKD.30793887 20181110
Bkav W32.eHeur.Malware03 20181110
CAT-QuickHeal Trojan.Mauvaise.SL1 20181108
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.fed356 20180225
Cylance Unsafe 20181110
Cyren W32/Trojan.VHAU-5536 20181110
DrWeb Trojan.Encoder.24384 20181110
Emsisoft Trojan.GenericKD.30793887 (B) 20181110
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GGRU 20181110
F-Prot W32/S-8ce49c37!Eldorado 20181110
F-Secure Trojan.GenericKD.30793887 20181110
Fortinet W32/Kryptik.GKJF!tr 20181110
GData Trojan.GenericKD.30793887 20181110
Ikarus Trojan-Ransom.GandCrab 20181110
Sophos ML heuristic 20181108
Jiangmin Trojan.Chapak.io 20181110
K7AntiVirus Trojan ( 0052908c1 ) 20181110
K7GW Trojan ( 0052908c1 ) 20181109
Kaspersky HEUR:Trojan.Win32.Generic 20181110
Malwarebytes Trojan.MalPack 20181110
MAX malware (ai score=97) 20181110
McAfee Packed-FFG!3DFA222FED35 20181110
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20181110
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181110
eScan Trojan.GenericKD.30793887 20181110
NANO-Antivirus Trojan.Win32.Encoder.fbukpj 20181110
Palo Alto Networks (Known Signatures) generic.ml 20181110
Panda Trj/CI.A 20181110
Qihoo-360 Win32/Trojan.5a2 20181110
Rising Trojan.Kryptik!1.B1E3 (CLASSIC) 20181110
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/WaledPak-D 20181110
SUPERAntiSpyware Ransom.GandCrab/Variant 20181107
Symantec Trojan Horse 20181109
TACHYON Trojan/W32.Chapak.910848 20181110
Tencent Win32.Trojan.Generic.Lply 20181110
TrendMicro TROJ_GEN.R002C0OEF18 20181110
TrendMicro-HouseCall Ransom_GANDCRAB.SMD3 20181110
VBA32 BScope.TrojanRansom.GandCrypt 20181109
Webroot W32.Trojan.Gen 20181110
Yandex Trojan.Chapak! 20181109
Zillya Trojan.GandCrypt.Win32.181 20181109
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20181110
Zoner Trojan.Gandcrab 20181110
AegisLab 20181110
Alibaba 20180921
Avast-Mobile 20181110
Babable 20180918
Baidu 20181109
ClamAV 20181110
CMC 20181110
Kingsoft 20181110
Symantec Mobile Insight 20181108
TheHacker 20181108
TotalDefense 20181110
Trustlook 20181110
ViRobot 20181110
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-14 07:10:09
Entry Point 0x00001829
Number of sections 6
PE sections
PE imports
CloseMetaFile
AddFontResourceA
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetCommBreak
GetModuleFileNameW
GetConsoleCP
CreateMailslotW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
SetConsoleOutputCP
RtlUnwind
GetStdHandle
DeleteCriticalSection
FlushViewOfFile
SetFileShortNameW
RaiseException
GetConsoleMode
DecodePointer
GetCurrentProcessId
WriteConsoleW
SetVolumeMountPointA
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetCommMask
MultiByteToWideChar
GetStartupInfoW
SetStdHandle
FreeEnvironmentStringsW
FindVolumeMountPointClose
GetProcAddress
InitializeSListHead
GetThreadContext
GetProcessHeap
ExitProcess
GetTempPathA
ReadConsoleW
WideCharToMultiByte
MapViewOfFile
TlsFree
FindFirstFileExA
ReadFile
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
FindNextFileA
GetACP
HeapReAlloc
CreateConsoleScreenBuffer
GetModuleHandleW
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
SetConsoleMode
WriteFile
CreateFileW
SetFilePointerEx
GetStringTypeW
FindClose
TlsGetValue
WriteProfileSectionW
GetFileType
SetEndOfFile
TlsSetValue
GetCurrentThreadId
SetMailslotInfo
VirtualAlloc
SetLastError
LeaveCriticalSection
CoGetContextToken
CoCancelCall
Number of PE resources by type
RT_STRING 14
SHEVFAJMDN 1
RT_GROUP_CURSOR 1
RT_ICON 1
AFX_DIALOG_LAYOUT 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 20
ENGLISH UK 2
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
2.0.4.0

LanguageCode
Unknown (0880)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (4E0)

InitializedDataSize
1191424

EntryPoint
0x1829

MIMEType
application/octet-stream

TimeStamp
2018:05:14 08:10:09+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
75264

FileSubtype
0

ProductVersionNumber
2.0.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3dfa222fed3567b6189762e951d76377
SHA1 614e83661da7213dca3016fbfc2803db7daeefe0
SHA256 5c5fb635d7d355ad148a520da62c706c6521413479080219e6dfd623f06590c1
ssdeep
12288:Dj1Wm0CLtoaulOe7t62FUWSHDAhJaA6NTgbuB8N8aqi3cHjD2Ihtf6s1dNR5JN4m:1Wm0utKlOEn2Aq7grqiyjCQf6E5J+y

authentihash a25b9a26040adfb2d10c8734fec54f479237f29263f578b8d98fc67c9aa736e3
imphash 35eea88c825b860534eccca7ecaf92a3
File size 889.5 KB ( 910848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-14 21:23:28 UTC (il y a 7 mois)
Last submission 2018-05-28 11:19:15 UTC (il y a 6 mois, 2 semaines)
Noms du fichier output.113312268.txt
394f38e10289266a1ca99acf7ac4be1a1a5ef463
winupdsvc(07).gxe
mm.exe
421243484017273.exe
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Runtime DLLs