× Cookies 已停用! 本網站需要啟用 Cookies 才能正常工作
SHA256: 2035ef02a014f9ae2a21d39c98604ca4863d77c47dcc12d31bb9b7b2d3e5fc98
檔案名稱: winmgr(181).gxe
偵測率: 41 / 65
分析日期: 2018-05-15 13:43:41 UTC ( 1 年 前 ) 檢視最新
防毒 結果 更新
Ad-Aware Trojan.GenericKD.30794501 20180515
AegisLab Troj.W32.Ircbot!c 20180515
AhnLab-V3 Trojan/Win32.Crypt.R227950 20180515
ALYac Trojan.RanSerKD.30796926 20180515
Antiy-AVL Trojan/Win32.TSGeneric 20180515
Arcabit Trojan.Generic.D1D5E305 20180515
Avast Win32:Malware-gen 20180515
AVG Win32:Malware-gen 20180515
Avira (no cloud) TR/Crypt.Xpack.vbhme 20180515
AVware BehavesLike.Win32.Malware (v) 20180428
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9996 20180511
BitDefender Trojan.GenericKD.30794501 20180515
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20180418
Cylance Unsafe 20180515
Emsisoft Trojan.GenericKD.30794501 (B) 20180515
Endgame malicious (high confidence) 20180507
ESET-NOD32 a variant of Win32/Kryptik.GGRU 20180515
F-Prot W32/S-8ce49c37!Eldorado 20180515
F-Secure Trojan.GenericKD.30794501 20180515
Fortinet W32/Kryptik.GGPW!tr 20180515
GData Win32.Trojan.Agent.B4KAC8 20180515
Sophos ML heuristic 20180503
K7AntiVirus Trojan ( 0052908c1 ) 20180515
K7GW Trojan ( 0052908c1 ) 20180515
Kaspersky Trojan.Win32.IRCbot.bhmf 20180515
Malwarebytes Trojan.MalPack 20180515
MAX malware (ai score=97) 20180515
McAfee-GW-Edition BehavesLike.Win32.MultiPlug.ch 20180515
Microsoft Trojan:Win32/Fuerboos.C!cl 20180515
eScan Trojan.GenericKD.30794501 20180515
Palo Alto Networks (Known Signatures) generic.ml 20180515
Panda Trj/CI.A 20180515
Qihoo-360 HEUR/QVM10.1.2814.Malware.Gen 20180515
Sophos AV Mal/WaledPak-D 20180515
Symantec Packed.Generic.525 20180514
TrendMicro TROJ_GEN.R020C0OEE18 20180515
TrendMicro-HouseCall TROJ_GEN.R020C0OEE18 20180515
VBA32 BScope.Trojan.Zonidel 20180514
VIPRE BehavesLike.Win32.Malware (v) 20180515
Webroot W32.Trojan.Gen 20180515
ZoneAlarm by Check Point Trojan.Win32.IRCbot.bhmf 20180515
Alibaba 20180515
Avast-Mobile 20180515
Babable 20180406
Bkav 20180515
CAT-QuickHeal 20180515
ClamAV 20180515
CMC 20180515
Comodo 20180515
Cybereason None
Cyren 20180515
eGambit 20180515
Jiangmin 20180515
Kingsoft 20180515
McAfee 20180515
NANO-Antivirus 20180515
nProtect 20180515
Rising 20180515
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180515
Symantec Mobile Insight 20180515
Tencent 20180515
TheHacker 20180509
TotalDefense 20180515
Trustlook 20180515
ViRobot 20180515
Yandex 20180513
Zillya 20180514
Zoner 20180514
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-14 03:53:37
Entry Point 0x00001829
Number of sections 6
PE sections
PE imports
CloseMetaFile
AddFontResourceA
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetCommBreak
GetModuleFileNameW
GetConsoleCP
CreateMailslotW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetOEMCP
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
SetConsoleOutputCP
RtlUnwind
GetStdHandle
DeleteCriticalSection
FlushViewOfFile
SetFileShortNameW
RaiseException
GetConsoleMode
DecodePointer
GetCurrentProcessId
WriteConsoleW
SetVolumeMountPointA
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
SetCommMask
MultiByteToWideChar
GetStartupInfoW
SetStdHandle
FreeEnvironmentStringsW
FindVolumeMountPointClose
GetProcAddress
InitializeSListHead
GetThreadContext
GetProcessHeap
ExitProcess
GetTempPathA
ReadConsoleW
WideCharToMultiByte
MapViewOfFile
TlsFree
FindFirstFileExA
ReadFile
SetUnhandledExceptionFilter
LoadLibraryExW
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetCommandLineA
FindNextFileA
GetACP
HeapReAlloc
CreateConsoleScreenBuffer
GetModuleHandleW
HeapAlloc
TerminateProcess
GetModuleHandleExW
IsValidCodePage
SetConsoleMode
WriteFile
CreateFileW
SetFilePointerEx
GetStringTypeW
FindClose
TlsGetValue
WriteProfileSectionW
GetFileType
SetEndOfFile
TlsSetValue
GetCurrentThreadId
SetMailslotInfo
VirtualAlloc
SetLastError
LeaveCriticalSection
CoGetContextToken
CoCancelCall
Number of PE resources by type
RT_STRING 14
RT_GROUP_CURSOR 1
RT_ICON 1
AFX_DIALOG_LAYOUT 1
TYVME 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 20
ENGLISH UK 2
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
14.0

ImageVersion
0.0

FileVersionNumber
2.0.4.0

LanguageCode
Unknown (0880)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (4E0)

InitializedDataSize
439296

EntryPoint
0x1829

MIMEType
application/octet-stream

TimeStamp
2018:05:14 05:53:37+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
75264

FileSubtype
0

ProductVersionNumber
2.0.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 1b613159f436928ade528943b037031f
SHA1 a54b04ce4d59820528d5123ab2fa83351bac607a
SHA256 2035ef02a014f9ae2a21d39c98604ca4863d77c47dcc12d31bb9b7b2d3e5fc98
ssdeep
3072:zEKQC2mCj7nnjuEgM5TeOzIVGQ7lQiK5dEl3PyxeHFANThzCyH8J:yju+5TWVGFrEl3PyAuR

authentihash 580628e00099ee86ef5bf0674b7042a2d5e10e047926a7c0e8621e4766bb4f8e
imphash 35eea88c825b860534eccca7ecaf92a3
File size 155.0 KB ( 158720 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-05-14 21:21:42 UTC ( 1 年 前 )
Last submission 2018-05-28 17:41:50 UTC ( 11 月, 3 週 前 )
檔案名稱 winmgr.exe
output.113312269.txt
okokokok.exe
okokokok.exe
a14b08896528ef96d36a1eb3c58b839b67166ff3
winmgr.exe
winmgr.exe
winmgr(181).gxe
winmgr.exe.1
沒有評論. 尚未有 VirusTotal 社群成員評論此項目,您將是第一個這樣做!

留下您的評論...

?
張貼評論

您尚未登入。 只有註冊的使用者才可以發表評論、登入!

沒有投票. 尚未有人對此項目投票,您將是第一個這樣做!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Terminated processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections