× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: 67f75ecf453a4fe658ebdb154320c5f8c120219e68c95278e846e571a1d4798b
Имя файла: Glazeur.exe
Показатель выявления: 0 / 67
Дата анализа: 2017-11-03 11:41:25 UTC (8 месяцев, 2 недель назад) Показать последний анализ
Антивирус Результат Дата обновления
Ad-Aware 20171103
AegisLab 20171103
AhnLab-V3 20171103
Alibaba 20170911
ALYac 20171103
Antiy-AVL 20171103
Arcabit 20171103
Avast 20171103
Avast-Mobile 20171103
AVG 20171103
Avira (no cloud) 20171103
AVware 20171103
Baidu 20171103
BitDefender 20171103
Bkav 20171102
CAT-QuickHeal 20171103
ClamAV 20171102
CMC 20171103
Comodo 20171103
CrowdStrike Falcon (ML) 20171016
Cybereason 20171030
Cylance 20171103
Cyren 20171103
DrWeb 20171103
eGambit 20171103
Emsisoft 20171103
Endgame 20171024
ESET-NOD32 20171103
F-Prot 20171103
F-Secure 20171103
Fortinet 20171103
GData 20171103
Ikarus 20171103
Sophos ML 20170914
Jiangmin 20171103
K7AntiVirus 20171103
K7GW 20171103
Kaspersky 20171103
Kingsoft 20171103
Malwarebytes 20171103
MAX 20171103
McAfee 20171031
McAfee-GW-Edition 20171103
Microsoft 20171103
eScan 20171103
NANO-Antivirus 20171103
nProtect 20171103
Palo Alto Networks (Known Signatures) 20171103
Panda 20171102
Qihoo-360 20171103
Rising 20171103
SentinelOne (Static ML) 20171019
Sophos AV 20171103
SUPERAntiSpyware 20171103
Symantec 20171103
Symantec Mobile Insight 20171103
Tencent 20171103
TheHacker 20171102
TrendMicro 20171103
TrendMicro-HouseCall 20171103
Trustlook 20171103
VBA32 20171102
VIPRE 20171103
ViRobot 20171103
Webroot 20171103
WhiteArmor 20171024
Yandex 20171102
Zillya 20171103
ZoneAlarm by Check Point 20171103
Zoner 20171103
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-11-03 11:33:42
Entry Point 0x00003F90
Number of sections 3
PE sections
PE imports
GetLastError
HeapFree
GetStdHandle
FlushConsoleInputBuffer
LCMapStringW
SetHandleCount
FillConsoleOutputCharacterA
DeviceIoControl
WaitForSingleObject
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
SetConsoleTextAttribute
GetVersionExA
SetConsoleCursorPosition
FlushFileBuffers
FillConsoleOutputCharacterW
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
GetModuleFileNameA
GetFileSize
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
WideCharToMultiByte
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
SetStdHandle
CompareStringW
ReadConsoleW
CompareStringA
CreateThread
GetFileAttributesA
GetStringTypeA
SetFilePointer
ReadFile
GetModuleHandleA
WriteFile
GetStartupInfoA
PeekConsoleInputW
ExitThread
HeapReAlloc
GetStringTypeW
SetEnvironmentVariableA
GetExitCodeProcess
SetConsoleCP
TerminateProcess
CreateProcessA
WriteConsoleA
GetEnvironmentVariableA
HeapCreate
CreateFileW
VirtualFree
GetEnvironmentStringsW
Sleep
GetFileType
SetEndOfFile
CreateFileA
HeapAlloc
GetVersion
VirtualAlloc
WriteConsoleW
CloseHandle
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
keybd_event
GetKeyState
SendInput
htonl
socket
bind
accept
WSACleanup
WSAStartup
htons
listen
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2017:11:03 12:33:42+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
45056

LinkerVersion
6.0

EntryPoint
0x3f90

InitializedDataSize
430080

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 a7699f79f88ecb29075de0bd80cc3f8f
SHA1 2266d717878b914d235a5392df364930779943a3
SHA256 67f75ecf453a4fe658ebdb154320c5f8c120219e68c95278e846e571a1d4798b
ssdeep
768:x5iDf6IWJb3l0PoGIv4ue0VugrMCzNB8npRZOFmcWUfJ/IwQ53/OxoGq:LimIWJGP3gZfrDipRwFywxxoG

authentihash c5456106be9750a22f3ec6e69a781dbaccb4a2755e720c7e1a5bb7f4b0c4919e
imphash 9fef8a6b02097cf14e8686962562781f
Размер файла 72.0 KБ ( 73728 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2017-11-03 11:41:25 UTC (8 месяцев, 2 недель назад)
Last submission 2017-11-03 11:41:25 UTC (8 месяцев, 2 недель назад)
Имена файлов Glazeur.exe
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs