× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: eab339d5e57dbab315fd433aa03271433c50221fd1b3848e3e54df479a55616f
Nom du fichier : .
Ratio de détection : 28 / 68
Date d'analyse : 2018-10-27 16:16:48 UTC (il y a 7 mois) Voir les derniers
Antivirus Résultat Mise à jour
Ad-Aware Gen:Variant.Strictor.176111 20181027
AhnLab-V3 Trojan/Win32.Gandcrab.R241226 20181027
Arcabit Trojan.Strictor.D2AFEF 20181027
Avast Win32:MalwareX-gen [Trj] 20181027
AVG Win32:MalwareX-gen [Trj] 20181027
BitDefender Gen:Variant.Strictor.176111 20181027
CrowdStrike Falcon (ML) malicious_confidence_60% (D) 20181022
Cybereason malicious.0d6aec 20180225
Cylance Unsafe 20181027
DrWeb Trojan.IcedID.13 20181027
Emsisoft Gen:Variant.Strictor.176111 (B) 20181027
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GLZY 20181027
F-Secure Gen:Variant.Strictor.176111 20181027
Fortinet W32/Kryptik.GMAD!tr 20181027
GData Gen:Variant.Strictor.176111 20181027
K7AntiVirus Trojan ( 00516fdf1 ) 20181027
K7GW Trojan ( 00516fdf1 ) 20181025
Malwarebytes Trojan.MalPack.GS 20181027
MAX malware (ai score=85) 20181027
McAfee-GW-Edition BehavesLike.Win32.Generic.ch 20181027
Microsoft Trojan:Win32/Gandcrab.AF 20181027
eScan Gen:Variant.Strictor.176111 20181027
Panda Trj/GdSda.A 20181027
Rising Downloader.Vigorf!8.F626 (TFE:dGZlOgUpIVPWNso+RQ) 20181027
Symantec Packed.Generic.525 20181026
VBA32 BScope.TrojanDownloader.Vigorf 20181026
Webroot W32.Adware.Installcore 20181027
AegisLab 20181027
Alibaba 20180921
ALYac 20181027
Antiy-AVL 20181027
Avast-Mobile 20181027
Avira (no cloud) 20181027
Babable 20180918
Baidu 20181026
Bkav 20181025
CAT-QuickHeal 20181027
ClamAV 20181026
CMC 20181027
Comodo 20181027
Cyren 20181027
eGambit 20181027
F-Prot 20181027
Ikarus 20181027
Sophos ML 20180717
Jiangmin 20181027
Kaspersky 20181027
Kingsoft 20181027
McAfee 20181027
NANO-Antivirus 20181027
Palo Alto Networks (Known Signatures) 20181027
Qihoo-360 20181027
SentinelOne (Static ML) 20181011
Sophos AV 20181027
SUPERAntiSpyware 20181022
Symantec Mobile Insight 20181026
TACHYON 20181027
Tencent 20181027
TheHacker 20181025
TotalDefense 20181027
TrendMicro 20181027
TrendMicro-HouseCall 20181027
Trustlook 20181027
ViRobot 20181027
Yandex 20181026
Zillya 20181026
ZoneAlarm by Check Point 20181027
Zoner 20181026
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-30 03:59:19
Entry Point 0x00001FE4
Number of sections 5
PE sections
PE imports
GetSystemTime
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryA
LoadLibraryW
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
ExitProcess
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
WriteConsoleA
FindFirstChangeNotificationW
HeapAlloc
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetConsoleOutputCP
WriteConsoleW
GetCommandLineW
GetCurrentDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetProcAddress
AddAtomW
HeapSize
SetStdHandle
SetFilePointer
RaiseException
GetCPInfo
GetModuleFileNameW
GetStringTypeA
GetModuleHandleA
GetSystemTimeAsFileTime
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CloseHandle
GetMailslotInfo
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TlsFree
TerminateProcess
FindCloseChangeNotification
QueryPerformanceCounter
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
WriteConsoleOutputCharacterA
GetEnvironmentStringsW
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetCurrentProcessId
SetLastError
InterlockedIncrement
ExtractIconW
ValidateRect
RegisterClassExW
PeekMessageA
GetThreadDesktop
GetMonitorInfoA
Number of PE resources by type
RT_DIALOG 1
RT_ICON 1
RT_STRING 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
KAZAK DEFAULT 3
ENGLISH US 3
ENGLISH NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
7.0.0.0

LanguageCode
Unknown (457A)

FileFlagsMask
0x004f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (A56B)

InitializedDataSize
67584

EntryPoint
0x1fe4

MIMEType
application/octet-stream

FileVersion
1.0.0.2

TimeStamp
2018:03:29 20:59:19-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
tazks.exe

ProductVersion
1.0.0.1

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Unknown (0x40534)

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
97792

FileSubtype
0

ProductVersionNumber
3.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 9c5d8a00d6aec6edda293467f6354ce5
SHA1 165c9a1308e5834608bafb69ee8b6e52c0ee0354
SHA256 eab339d5e57dbab315fd433aa03271433c50221fd1b3848e3e54df479a55616f
ssdeep
3072:FLYy9PbQyM+JKPBi6qB7g5DyE+Bp+UBWl2503G4Lr:FLRbAGO5Fg9Wp3

authentihash 9a569c8bd3724c45a608bdf6199024fcd68f7890c78f89bfff036984ccf1334d
imphash 6aa57117ac8eab1dc21cf66ddf478575
File size 154.5 KB ( 158208 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-27 16:16:48 UTC (il y a 7 mois)
Last submission 2018-10-27 16:16:48 UTC (il y a 7 mois)
Noms du fichier .
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs