× მზა ფაილები (Cookies) გამორთულია! ეს საიტი მოთხოვს მზა ფაილებს (cookies ) გამართული მუშაობისათვის
SHA256: bd82ef213e55d80f83581765ff0afc09a5bf8f1aefbb2aab89d398eca4bd86e6
ფაილის სახელი: e946eea14e8eb73106249a2cf4422ab6afb32d59
დაფიქსირების შეფარდება: 46 / 71
ანალიზის თარიღი: 2019-01-16 18:07:24 UTC ( 4 თვე, 1 კვირა-ის წინ )
ანტივირუსი შედეგები განახლება
Acronis suspicious 20190116
Ad-Aware Gen:Variant.Fugrafa.908 20190116
AhnLab-V3 Malware/Gen.Generic.C2912129 20190116
ALYac Gen:Variant.Fugrafa.908 20190116
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190116
Arcabit Trojan.Fugrafa.908 20190116
Avast Win32:Trojan-gen 20190115
AVG Win32:Trojan-gen 20190116
Avira (no cloud) HEUR/AGEN.1037623 20190116
BitDefender Gen:Variant.Fugrafa.908 20190116
Comodo TrojWare.Win32.Emotet.HA@80ac19 20190116
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181023
Cybereason malicious.f48d69 20190109
Cylance Unsafe 20190116
Cyren W32/Emotet.LS.gen!Eldorado 20190116
DrWeb Trojan.Dridex.546 20190116
eGambit Unsafe.AI_Score_98% 20190116
Emsisoft Gen:Variant.Fugrafa.908 (B) 20190116
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOHA 20190116
F-Prot W32/Emotet.LS.gen!Eldorado 20190116
F-Secure Gen:Variant.Fugrafa.908 20190116
Fortinet W32/GenKryptik.CVIK!tr 20190116
GData Gen:Variant.Fugrafa.908 20190116
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.fbl 20190116
K7AntiVirus Riskware ( 0040eff71 ) 20190116
K7GW Riskware ( 0040eff71 ) 20190116
Kaspersky HEUR:Trojan.Win32.Generic 20190116
MAX malware (ai score=82) 20190116
McAfee GenericRXGT-CF!6AF11F6F48D6 20190116
McAfee-GW-Edition GenericRXGT-CF!6AF11F6F48D6 20190116
Microsoft Trojan:Win32/Emotet.P 20190116
eScan Gen:Variant.Fugrafa.908 20190116
Panda Trj/GdSda.A 20190116
Qihoo-360 HEUR/QVM20.1.9723.Malware.Gen 20190116
Rising Backdoor.Dridex!8.3226 (RDM+:cmRtazpPxaO88+o5p526MFFoYIlT) 20190116
Sophos AV Mal/Generic-S 20190116
Symantec ML.Attribute.HighConfidence 20190116
Trapmine malicious.high.ml.score 20190103
VBA32 TrojanBanker.Emotet 20190116
VIPRE Trojan.Win32.Generic!BT 20190116
Webroot W32.Trojan.Gen 20190116
Yandex Trojan.PWS.Emotet! 20190116
Zillya Downloader.Upatre.Win32.66765 20190115
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20190116
AegisLab 20190116
Alibaba 20180921
Avast-Mobile 20190116
Babable 20180918
Baidu 20190116
Bkav 20190116
CAT-QuickHeal 20190116
ClamAV 20190116
CMC 20190116
Ikarus 20190116
Kingsoft 20190116
Malwarebytes 20190116
NANO-Antivirus 20190116
Palo Alto Networks (Known Signatures) 20190116
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20190109
TACHYON 20190116
Tencent 20190116
TheHacker 20190115
TotalDefense 20190116
TrendMicro 20190116
TrendMicro-HouseCall 20190116
Trustlook 20190116
ViRobot 20190116
Zoner 20190116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-27 11:11:30
Entry Point 0x00003B00
Number of sections 6
PE sections
PE imports
CloseServiceHandle
GetSecurityDescriptorGroup
GetSecurityDescriptorControl
AllocateAndInitializeSid
InitiateSystemShutdownExW
LookupAccountSidA
GetWindowsAccountDomainSid
InitializeSecurityDescriptor
DescribePixelFormat
SelectClipPath
GetBkMode
PlayEnhMetaFile
GetSystemPaletteUse
GetDIBits
GdiFlush
GetLayout
FreeConsole
LoadLibraryW
GetUserGeoID
ExitThread
EnumSystemLocalesA
FileTimeToLocalFileTime
GetBinaryTypeW
GetSystemDefaultLCID
SetErrorMode
TerminateJobObject
GetSystemPowerStatus
WritePrivateProfileStringW
GetCPInfo
GetStringTypeA
GetSystemTimeAsFileTime
FindFirstFileW
GetACP
WritePrivateProfileStructW
ExpandEnvironmentStringsA
LocalFree
GetThreadId
GetDefaultCommConfigW
GetVersion
VirtualAlloc
NetSessionGetInfo
LoadTypeLib
VarCyCmp
IsPwrHibernateAllowed
DefMDIChildProcW
GetRawInputDeviceList
GetClassNameA
GetClassWord
MessageBoxIndirectW
GetWindowWord
GetDC
GetQueueStatus
GetLastActivePopup
GetRawInputData
GetClassLongA
LoadMenuIndirectA
GetActiveWindow
DefDlgProcA
EnumThreadWindows
ModifyMenuW
GetDesktopWindow
IsMenu
GetFocus
GetMenuStringA
InvalidateRgn
GetKeyboardType
IsChild
DeletePrinterDriverExW
DeletePrinterDriverW
SCardGetProviderIdA
GetColorProfileHeader
strspn
fputws
fgetwc
HICON_UserFree
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
94208

ImageVersion
0.0

ProductName
Microsoft Windows Operating

FileVersionNumber
5.1.2600.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.1

FileTypeExtension
exe

OriginalFileName
FINDGF.EXE

MIMEType
application/octet-stream

Subsystem
Windows command line

FileVersion
5.1.2600.0 (xpclient.010817-1148)

TimeStamp
2018:12:27 12:11:30+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
xind

ProductVersion
5.1.2600.0

FileDescription
SandM RXf GP DF

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights rese

MachineType
Intel 386 or later, and compatibles

CompanyName
Lovenet Corporation

CodeSize
102400

FileSubtype
0

ProductVersionNumber
5.1.2600.0

EntryPoint
0x3b00

ObjectFileType
Executable application

File identification
MD5 6af11f6f48d692e6748993bafc846d3b
SHA1 e946eea14e8eb73106249a2cf4422ab6afb32d59
SHA256 bd82ef213e55d80f83581765ff0afc09a5bf8f1aefbb2aab89d398eca4bd86e6
ssdeep
3072:QrxxmJc6QRyeZ9iQN21mgHboUNDENEbPeJ:QrrZRq4A3HnNIabm

authentihash 02961ebe12cdd66b00ac4aefc568f3b3d00825abbe9d419bf6a6a643268b4bab
imphash bea2cf47857df51fca0af145cfe53872
File size 196.0 კბ ( 200704 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.3%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-16 18:07:24 UTC ( 4 თვე, 1 კვირა-ის წინ )
Last submission 2019-01-16 18:07:24 UTC ( 4 თვე, 1 კვირა-ის წინ )
კომენტარები არაა. ვირუსტოტალის წევრებს არ დაუტოვებიათ კომენტარი, იყავი პირველი!

დატოვე კომენტარი...

?
გამოაქვეყნე კომენტარი

თქვენ არ შესულხართ სისტემაში მხოლოდ დარეგისტრირებულ წევრებს შეუძლიათ კომენტარის დატოვება. დარეგისტრირდით რათა გქონდეთ თქვენი ხმა,

შეფასებები არ არის. ეს ფაილი არავის შეუფასებია, იყავი პირველი!