× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: 2d0cbe8416c8bc72d73945eecc16cf754488e7a07d26926330e8f59f14afd8ca
Имя файла: Unpackme.exe
Показатель выявления: 11 / 69
Дата анализа: 2019-01-01 13:07:16 UTC (4 месяцев, 2 недель назад) Показать последний анализ
Антивирус Результат Дата обновления
Acronis suspicious 20181227
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20190101
eGambit Unsafe.AI_Score_96% 20190101
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
McAfee-GW-Edition BehavesLike.Win32.Expiro.tc 20190101
Rising Malware.Heuristic!ET#93% (RDM+:cmRtazqtzt21B4xp6YTMxlnPX3JZ) 20190101
SentinelOne (Static ML) static engine - malicious 20181223
Symantec ML.Attribute.HighConfidence 20181231
Trapmine malicious.moderate.ml.score 20181205
Ad-Aware 20190101
AegisLab 20190101
Alibaba 20180921
ALYac 20190101
Antiy-AVL 20190101
Arcabit 20190101
Avast 20190101
Avast-Mobile 20190101
AVG 20190101
Avira (no cloud) 20190101
Babable 20180918
Baidu 20181207
BitDefender 20190101
Bkav 20181227
CAT-QuickHeal 20181231
ClamAV 20190101
CMC 20181231
Comodo 20190101
Cybereason 20180225
Cyren 20190101
DrWeb 20190101
Emsisoft 20190101
ESET-NOD32 20190101
F-Prot 20190101
F-Secure 20190101
Fortinet 20190101
GData 20190101
Ikarus 20181231
Jiangmin 20190101
K7AntiVirus 20190101
K7GW 20190101
Kaspersky 20190101
Kingsoft 20190101
Malwarebytes 20190101
MAX 20190101
McAfee 20190101
Microsoft 20190101
eScan 20190101
NANO-Antivirus 20190101
Palo Alto Networks (Known Signatures) 20190101
Panda 20190101
Qihoo-360 20190101
Sophos AV 20190101
SUPERAntiSpyware 20181226
TACHYON 20190101
Tencent 20190101
TheHacker 20181230
TrendMicro 20190101
TrendMicro-HouseCall 20190101
Trustlook 20190101
VBA32 20181229
VIPRE 20190101
ViRobot 20190101
Webroot 20190101
Yandex 20181229
Zillya 20181231
ZoneAlarm by Check Point 20190101
Zoner 20190101
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
Copyright © 2018

Product ConsoleApp1
Original name ConsoleApp1.exe
Internal name ConsoleApp1.exe
File version 1.0.0.0
Description ConsoleApp1
Packers identified
F-PROT embedded
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-01 09:28:06
Entry Point 0x000D0F4E
Number of sections 5
PE sections
PE imports
SHGetFolderPathW
SHGetFolderPathA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
GetStdHandle
FileTimeToDosDateTime
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetErrorMode
GetThreadContext
GetLocaleInfoW
GetFullPathNameA
GetTempPathA
WideCharToMultiByte
WriteFile
GetDiskFreeSpaceA
SetFileAttributesA
SetEvent
LocalFree
InitializeCriticalSection
LoadResource
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
TlsGetValue
QueryDosDeviceW
FormatMessageA
SetFileAttributesW
GetStringTypeExA
SetLastError
WriteProcessMemory
RemoveDirectoryW
ExitProcess
GetModuleFileNameA
EnumCalendarInfoA
LoadLibraryExA
CreateActCtxW
ActivateActCtx
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
GetFullPathNameW
GetSystemDirectoryW
GetSystemDirectoryA
SetThreadContext
SetCurrentDirectoryW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
CloseHandle
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
ExitThread
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
ReadProcessMemory
GetCPInfo
DeleteFileW
GetProcAddress
VirtualProtectEx
GetTempFileNameW
CompareStringW
GetModuleFileNameW
FindFirstFileA
CreateDirectoryW
ResetEvent
GetTempFileNameA
FindNextFileA
CreateFileW
CreateEventA
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
VirtualAllocEx
lstrlenA
FindResourceW
GetThreadLocale
RemoveDirectoryA
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
FindNextFileW
lstrcpynA
GetACP
GetVersion
FreeResource
IsBadStringPtrW
GetTempPathW
PostQueuedCompletionStatus
VirtualFree
Sleep
IsBadReadPtr
VirtualAlloc
CompareStringA
ZwProtectVirtualMemory
RtlInitUnicodeString
RtlAnsiStringToUnicodeString
RtlFormatCurrentUserKeyPath
RtlInitAnsiString
LdrGetProcedureAddress
LdrLoadDll
RtlFreeUnicodeString
RtlDosPathNameToNtPathName_U
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
GetErrorInfo
SysFreeString
VariantInit
PathMatchSpecW
CharLowerBuffW
GetSystemMetrics
LoadStringA
CharLowerA
CharNextA
CharUpperW
MessageBoxA
CharLowerW
CharUpperBuffW
CharUpperA
GetKeyboardType
CharToOemA
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
ConsoleApp1

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
2048

EntryPoint
0xd0f4e

OriginalFileName
ConsoleApp1.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2018

FileVersion
1.0.0.0

TimeStamp
2019:01:01 10:28:06+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ConsoleApp1.exe

ProductVersion
1.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CodeSize
847872

ProductName
ConsoleApp1

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 f1505de9a07c7854862db3a26ab61bb1
SHA1 0dfa521d04adadc3d2d2a645de54ad191c6f7fe7
SHA256 2d0cbe8416c8bc72d73945eecc16cf754488e7a07d26926330e8f59f14afd8ca
ssdeep
24576:lP33Yzek1LgDoc08Z263Nk1PLHUUGZC8AKQRXg6vE/f/I0HYH6WmAvX76I+C/81:lQCk1LaochZ26Nk1DaC8ADhvWp4Hi

authentihash 61cbdaefb58fcb2844371bf23c31d725792670da22b9f71b6c05f56881a61149
imphash ae4ae436602a0fced8410c4c48e4ae05
Размер файла 1.7 MБ ( 1784832 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (51.6%)
DOS Borland compiled Executable (generic) (16.5%)
Win32 Dynamic Link Library (generic) (10.8%)
Win32 Executable (generic) (7.4%)
Win16/32 Executable Delphi generic (3.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-01 13:05:53 UTC (4 месяцев, 2 недель назад)
Last submission 2019-01-01 13:07:16 UTC (4 месяцев, 2 недель назад)
Имена файлов ConsoleApp1.exe
Unpackme.exe
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Runtime DLLs