× მზა ფაილები (Cookies) გამორთულია! ეს საიტი მოთხოვს მზა ფაილებს (cookies ) გამართული მუშაობისათვის
SHA256: 3c00c8a1d4ef6539a9cd54e4bde34ee9763d5ba4ad0be14cbb32e08fac6ce0c6
ფაილის სახელი: c11aceb5d9a054157682bb199226504c250394a3
დაფიქსირების შეფარდება: 36 / 70
ანალიზის თარიღი: 2019-01-04 10:07:17 UTC ( 4 თვე, 2 კვირა-ის წინ )
ანტივირუსი შედეგები განახლება
Ad-Aware Gen:Variant.Ulise.21599 20190104
AhnLab-V3 Malware/Gen.Generic.C2912129 20190104
ALYac Gen:Variant.Ulise.21599 20190104
Arcabit Trojan.Ulise.D545F 20190104
Avast Win32:Trojan-gen 20190104
AVG Win32:Trojan-gen 20190104
BitDefender Gen:Variant.Ulise.21599 20190104
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cybereason malicious.5d9a05 20180225
Cylance Unsafe 20190104
Cyren W32/Emotet.LS.gen!Eldorado 20190104
eGambit Unsafe.AI_Score_98% 20190104
Emsisoft Gen:Variant.Ulise.21599 (B) 20190104
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOHA 20190104
F-Prot W32/Emotet.LS.gen!Eldorado 20190104
F-Secure Gen:Variant.Ulise.21599 20190104
Fortinet W32/GenKryptik.CVIK!tr 20190104
GData Gen:Variant.Ulise.21599 20190104
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.fbl 20190104
K7AntiVirus Riskware ( 0040eff71 ) 20190104
K7GW Riskware ( 0040eff71 ) 20190104
Kaspersky Trojan-Banker.Win32.Emotet.bxqc 20190104
MAX malware (ai score=87) 20190104
McAfee GenericRXGT-CF!1B5B5BA95012 20190104
eScan Gen:Variant.Ulise.21599 20190104
Panda Trj/GdSda.A 20190103
Qihoo-360 HEUR/QVM20.1.51A7.Malware.Gen 20190104
Rising Backdoor.Dridex!8.3226 (TFE:1:WKCTodeYi7N) 20190104
Sophos AV Mal/Generic-S 20190104
Symantec ML.Attribute.HighConfidence 20190104
TACHYON Banker/W32.Emotet.200704.E 20190104
Trapmine malicious.high.ml.score 20190103
Webroot W32.Trojan.Gen 20190104
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxqc 20190104
Acronis 20181227
AegisLab 20190104
Alibaba 20180921
Antiy-AVL 20190104
Avast-Mobile 20190103
Avira (no cloud) 20190104
Babable 20180918
Baidu 20190104
Bkav 20190103
CAT-QuickHeal 20190103
ClamAV 20190104
CMC 20190103
Comodo 20190104
DrWeb 20190104
Ikarus 20190104
Kingsoft 20190104
Malwarebytes 20190104
McAfee-GW-Edition 20190104
Microsoft 20190104
NANO-Antivirus 20190104
Palo Alto Networks (Known Signatures) 20190104
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190102
Tencent 20190104
TheHacker 20181230
TotalDefense 20190104
TrendMicro 20190104
TrendMicro-HouseCall 20190104
Trustlook 20190104
VBA32 20190104
ViRobot 20190103
Yandex 20181229
Zillya 20190103
Zoner 20190104
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-28 05:35:43
Entry Point 0x00003B00
Number of sections 6
PE sections
PE imports
CloseServiceHandle
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
AllocateAndInitializeSid
InitiateSystemShutdownExW
LookupAccountSidA
GetWindowsAccountDomainSid
InitializeSecurityDescriptor
DescribePixelFormat
SelectClipPath
GetBkMode
PlayEnhMetaFile
GetSystemPaletteUse
GetDIBits
GdiFlush
GetLayout
FreeConsole
LoadLibraryW
GetUserGeoID
ExitThread
EnumSystemLocalesA
FileTimeToLocalFileTime
GetBinaryTypeW
GetSystemDefaultLCID
SetErrorMode
TerminateJobObject
GetSystemPowerStatus
WritePrivateProfileStringW
GetCPInfo
GetStringTypeA
GetSystemTimeAsFileTime
FindFirstFileW
GetACP
WritePrivateProfileStructW
ExpandEnvironmentStringsA
LocalFree
GetThreadId
GetDefaultCommConfigW
GetVersion
VirtualAlloc
NetSessionGetInfo
LoadTypeLib
VarCyCmp
IsPwrHibernateAllowed
DefMDIChildProcW
GetRawInputDeviceList
GetClassNameA
GetClassWord
MessageBoxIndirectW
GetWindowWord
GetDC
GetQueueStatus
GetLastActivePopup
GetRawInputData
GetClassLongA
LoadMenuIndirectA
GetActiveWindow
DefDlgProcA
EnumThreadWindows
ModifyMenuW
GetDesktopWindow
IsMenu
GetFocus
GetMenuStringA
InvalidateRgn
GetKeyboardType
IsChild
DeletePrinterDriverExW
DeletePrinterDriverW
SCardGetProviderIdA
GetColorProfileHeader
strspn
fputws
fgetwc
HICON_UserFree
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
SandM RXf GP DF

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
94208

EntryPoint
0x3b00

OriginalFileName
FINDGF.EXE

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights rese

FileVersion
5.1.2600.0 (xpclient.010817-1148)

TimeStamp
2018:12:28 06:35:43+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
xind

ProductVersion
5.1.2600.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Lovenet Corporation

CodeSize
102400

ProductName
Microsoft Windows Operating

ProductVersionNumber
5.1.2600.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 1b5b5ba950122aa3f27207d7e936088f
SHA1 c11aceb5d9a054157682bb199226504c250394a3
SHA256 3c00c8a1d4ef6539a9cd54e4bde34ee9763d5ba4ad0be14cbb32e08fac6ce0c6
ssdeep
3072:5rxxmJc6QRyeZ9iQN21mgHboUNDENEbPeJ:5rrZRq4A3HnNIabm

authentihash 9899568e8601eb05a7e2293db1538969f6ab6b3658fe53a468e16b72ba232462
imphash bea2cf47857df51fca0af145cfe53872
File size 196.0 კბ ( 200704 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.3%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-04 10:07:17 UTC ( 4 თვე, 2 კვირა-ის წინ )
Last submission 2019-01-04 10:07:17 UTC ( 4 თვე, 2 კვირა-ის წინ )
კომენტარები არაა. ვირუსტოტალის წევრებს არ დაუტოვებიათ კომენტარი, იყავი პირველი!

დატოვე კომენტარი...

?
გამოაქვეყნე კომენტარი

თქვენ არ შესულხართ სისტემაში მხოლოდ დარეგისტრირებულ წევრებს შეუძლიათ კომენტარის დატოვება. დარეგისტრირდით რათა გქონდეთ თქვენი ხმა,

შეფასებები არ არის. ეს ფაილი არავის შეუფასებია, იყავი პირველი!