× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: 5c5fb635d7d355ad148a520da62c706c6521413479080219e6dfd623f06590c1
Nom du fichier : output.113312268.txt
Ratio de détection : 55 / 68
Date d'analyse : 2018-10-04 15:37:40 UTC (il y a 1 semaine, 6 jours)
Antivirus Résultat Mise à jour
Ad-Aware Trojan.GenericKD.30793887 20181004
AegisLab Troj.W32.Chapak!c 20181004
AhnLab-V3 Win-Trojan/Gandcrab01.Exp 20181004
ALYac Misc.Riskware.BitCoinMiner 20181004
Antiy-AVL Trojan/Win32.TSGeneric 20181004
Arcabit Trojan.Generic.D1D5E09F 20181004
Avast Win32:Malware-gen 20181004
AVG Win32:Malware-gen 20181004
Avira (no cloud) HEUR/AGEN.1032585 20181004
AVware BehavesLike.Win32.Malware (v) 20180925
BitDefender Trojan.GenericKD.30793887 20181004
Bkav W32.eHeur.Malware03 20181003
CAT-QuickHeal Trojan.Mauvaise.SL1 20181004
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180723
Cybereason malicious.fed356 20180225
Cylance Unsafe 20181004
Cyren W32/Trojan.VHAU-5536 20181004
DrWeb Trojan.Encoder.24384 20181004
Emsisoft Trojan.GenericKD.30793887 (B) 20181004
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GGRU 20181004
F-Prot W32/S-8ce49c37!Eldorado 20181004
F-Secure Trojan.GenericKD.30793887 20181004
Fortinet W32/Kryptik.GKJF!tr 20181004
GData Trojan.GenericKD.30793887 20181004
Ikarus Trojan-Ransom.GandCrab 20181004
Sophos ML heuristic 20180717
Jiangmin Trojan.Chapak.io 20181004
K7AntiVirus Trojan ( 0052908c1 ) 20181004
K7GW Trojan ( 0052908c1 ) 20181003
Kaspersky HEUR:Trojan.Win32.Generic 20181004
Malwarebytes Trojan.MalPack 20181004
MAX malware (ai score=97) 20181004
McAfee Packed-FFG!3DFA222FED35 20181004
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20181004
Microsoft Trojan:Win32/Skeeyah.A!rfn 20181004
eScan Trojan.GenericKD.30793887 20181004
NANO-Antivirus Trojan.Win32.Encoder.fbukpj 20181004
Palo Alto Networks (Known Signatures) generic.ml 20181004
Panda Trj/CI.A 20181004
Qihoo-360 Win32/Trojan.5a2 20181004
Rising Trojan.Kryptik!1.B1E3 (CLOUD) 20181004
Sophos AV Mal/WaledPak-D 20181004
SUPERAntiSpyware Ransom.GandCrab/Variant 20180907
Symantec Trojan Horse 20181004
TACHYON Trojan/W32.Chapak.910848 20181004
Tencent Win32.Trojan.Chapak.Lply 20181004
TrendMicro TROJ_GEN.R002C0OEF18 20181004
TrendMicro-HouseCall Ransom_GANDCRAB.SMD3 20181004
VBA32 BScope.TrojanRansom.GandCrypt 20181004
Webroot W32.Trojan.Gen 20181004
Yandex Trojan.Chapak! 20181004
Zillya Trojan.GandCrypt.Win32.181 20181003
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20180925
Zoner Trojan.Gandcrab 20181004
Alibaba 20180921
Avast-Mobile 20181004
Babable 20180918
Baidu 20180930
ClamAV 20181004
CMC 20181004
Comodo 20181004
eGambit 20181004
Kingsoft 20181004
SentinelOne (Static ML) 20180926
Symantec Mobile Insight 20181001
TheHacker 20181001
TotalDefense 20181004
Trustlook 20181004
ViRobot 20181004
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-14 07:10:09
Entry Point 0x00001829
Number of sections 6
PE sections
PE imports
CloseMetaFile
AddFontResourceA
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetCommBreak
GetModuleFileNameW
GetConsoleCP
CreateMailslotW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
SetConsoleOutputCP
RtlUnwind
GetStdHandle
DeleteCriticalSection
FlushViewOfFile
SetFileShortNameW
RaiseException
GetConsoleMode
DecodePointer
GetCurrentProcessId
WriteConsoleW
SetVolumeMountPointA
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetCommMask
MultiByteToWideChar
GetStartupInfoW
SetStdHandle
FreeEnvironmentStringsW
FindVolumeMountPointClose
GetProcAddress
InitializeSListHead
GetThreadContext
GetProcessHeap
ExitProcess
GetTempPathA
ReadConsoleW
WideCharToMultiByte
MapViewOfFile
TlsFree
FindFirstFileExA
ReadFile
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
FindNextFileA
GetACP
HeapReAlloc
CreateConsoleScreenBuffer
GetModuleHandleW
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
SetConsoleMode
WriteFile
CreateFileW
SetFilePointerEx
GetStringTypeW
FindClose
TlsGetValue
WriteProfileSectionW
GetFileType
SetEndOfFile
TlsSetValue
GetCurrentThreadId
SetMailslotInfo
VirtualAlloc
SetLastError
LeaveCriticalSection
CoGetContextToken
CoCancelCall
Number of PE resources by type
RT_STRING 14
SHEVFAJMDN 1
RT_GROUP_CURSOR 1
RT_ICON 1
AFX_DIALOG_LAYOUT 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 20
ENGLISH UK 2
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
2.0.4.0

LanguageCode
Unknown (0880)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (4E0)

InitializedDataSize
1191424

EntryPoint
0x1829

MIMEType
application/octet-stream

TimeStamp
2018:05:14 08:10:09+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
75264

FileSubtype
0

ProductVersionNumber
2.0.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3dfa222fed3567b6189762e951d76377
SHA1 614e83661da7213dca3016fbfc2803db7daeefe0
SHA256 5c5fb635d7d355ad148a520da62c706c6521413479080219e6dfd623f06590c1
ssdeep
12288:Dj1Wm0CLtoaulOe7t62FUWSHDAhJaA6NTgbuB8N8aqi3cHjD2Ihtf6s1dNR5JN4m:1Wm0utKlOEn2Aq7grqiyjCQf6E5J+y

authentihash a25b9a26040adfb2d10c8734fec54f479237f29263f578b8d98fc67c9aa736e3
imphash 35eea88c825b860534eccca7ecaf92a3
File size 889.5 KB ( 910848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-14 21:23:28 UTC (il y a 5 mois)
Last submission 2018-05-28 11:19:15 UTC (il y a 4 mois, 3 semaines)
Noms du fichier output.113312268.txt
394f38e10289266a1ca99acf7ac4be1a1a5ef463
winupdsvc(07).gxe
mm.exe
421243484017273.exe
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Terminated processes
Created mutexes
Opened mutexes
Runtime DLLs