× Cookies 已停用! 本網站需要啟用 Cookies 才能正常工作
SHA256: e19249c448777f097753258059e5388b716706d0d7e7357cdcf49d3f5afbc2c7
檔案名稱: arhiv_5435345.exe
偵測率: 12 / 67
分析日期: 2018-12-14 18:14:56 UTC ( 5 月, 1 週 前 ) 檢視最新
防毒 結果 更新
Avira (no cloud) PUA/ICLoader.Gen8 20181214
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20181022
Cylance Unsafe 20181214
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNUP 20181214
Fortinet W32/GenKryptik.CTDK!tr 20181214
Sophos ML heuristic 20181128
K7GW Hacktool ( 700007861 ) 20181214
Malwarebytes Adware.ICLoader 20181214
Rising Trojan.Kryptik!1.AA23 (CLASSIC) 20181214
Symantec ML.Attribute.HighConfidence 20181214
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181214
AegisLab 20181214
AhnLab-V3 20181214
Alibaba 20180921
ALYac 20181214
Antiy-AVL 20181214
Arcabit 20181214
Avast 20181214
Avast-Mobile 20181214
AVG 20181214
Babable 20180918
Baidu 20181207
BitDefender 20181214
Bkav 20181214
CAT-QuickHeal 20181214
ClamAV 20181214
CMC 20181213
Comodo 20181214
Cyren 20181214
DrWeb 20181214
eGambit 20181214
Emsisoft 20181214
F-Prot 20181214
F-Secure 20181214
GData 20181214
Ikarus 20181214
Jiangmin 20181214
K7AntiVirus 20181214
Kaspersky 20181214
Kingsoft 20181214
MAX 20181214
McAfee 20181214
McAfee-GW-Edition 20181214
Microsoft 20181214
eScan 20181214
NANO-Antivirus 20181214
Palo Alto Networks (Known Signatures) 20181214
Panda 20181213
Qihoo-360 20181214
SentinelOne (Static ML) 20181011
Sophos AV 20181214
SUPERAntiSpyware 20181212
Symantec Mobile Insight 20181212
TACHYON 20181214
Tencent 20181214
TheHacker 20181213
TrendMicro-HouseCall 20181214
Trustlook 20181214
VBA32 20181214
VIPRE 20181214
ViRobot 20181214
Webroot 20181214
Yandex 20181214
Zillya 20181213
ZoneAlarm by Check Point 20181214
Zoner 20181214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-14 18:10:27
Entry Point 0x000D8E20
Number of sections 6
PE sections
PE imports
RegCreateKeyExW
AllocateLocallyUniqueId
SetMapMode
TextOutW
CreateFontIndirectW
GetRgnBox
SaveDC
CreateFontIndirectA
CreateRectRgnIndirect
GetClipBox
EnumFontsA
Rectangle
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
DeleteObject
GetObjectW
SetTextColor
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
ScaleWindowExtEx
PtVisible
GetDIBits
ExtSelectClipRgn
GetBkColor
ScaleViewportExtEx
SelectObject
GetMapMode
GetTextColor
Escape
SetBkColor
SetViewportExtEx
DeleteMetaFile
GetVersionExA
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
GetBinaryTypeW
SetHandleCount
TerminateThread
CreateFileMappingA
GetFileAttributesA
GetConsoleCP
GetExitCodeProcess
LCMapStringA
MulDiv
CopyFileA
GetTickCount
ReleaseMutex
GetVolumeInformationW
VirtualProtect
GlobalUnlock
LoadLibraryA
LockFile
RtlUnwind
GetACP
FreeLibrary
FreeEnvironmentStringsA
GetQueuedCompletionStatus
GetDiskFreeSpaceA
CreateThread
GetEnvironmentStrings
GetCurrentProcessId
CreateIoCompletionPort
CreateDirectoryA
WideCharToMultiByte
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetFileType
GetStartupInfoA
ExitProcess
HeapAlloc
RaiseException
GetCPInfo
lstrcmpiA
GetStringTypeA
GetModuleHandleA
GetSystemDirectoryW
FindFirstFileA
InterlockedExchange
GlobalFlags
WriteFile
GetCurrentProcess
CreateMutexW
ResetEvent
GetSystemTimeAsFileTime
DeleteFileW
GetDateFormatA
DuplicateHandle
HeapReAlloc
GetStringTypeW
GetModuleHandleW
GetOEMCP
FormatMessageW
TerminateProcess
ResumeThread
GetModuleFileNameA
SizeofResource
GetEnvironmentVariableA
HeapCreate
VirtualFree
GetEnvironmentStringsW
HeapDestroy
IsBadReadPtr
SetEndOfFile
CloseHandle
GetCurrentThreadId
GetVersion
VirtualAlloc
SetCurrentDirectoryA
GetTimeFormatA
SetFocus
EmptyClipboard
GetSysColor
GetClassInfoExW
CharLowerBuffW
EndPaint
SetClassLongW
DefWindowProcW
DestroyMenu
DefWindowProcA
CheckMenuRadioItem
LoadMenuW
SetWindowPos
GetParent
SetWindowLongW
RegisterClassExW
MoveWindow
LoadBitmapA
AppendMenuW
TranslateMessage
IsWindowEnabled
InvalidateRect
CheckDlgButton
DispatchMessageW
GetKeyState
ReleaseDC
CreatePopupMenu
SendMessageW
GetSubMenu
SetClipboardData
IsWindowVisible
DrawTextA
GetClientRect
SetCursor
EnableMenuItem
DeleteMenu
TrackPopupMenuEx
GetWindowLongA
SendMessageTimeoutA
CharNextW
GetClassNameW
TrackPopupMenu
LoadStringW
GetSystemMenu
LoadAcceleratorsW
GetWindowLongW
CloseClipboard
TranslateAcceleratorW
DestroyWindow
Number of PE resources by type
RT_ICON 20
RT_DIALOG 9
RT_GROUP_ICON 9
RT_BITMAP 6
PNG 3
RT_MANIFEST 1
78930 1
Number of PE resources by language
ENGLISH US 30
ENGLISH AUS 10
ENGLISH UK 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:14 19:10:27+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
901120

LinkerVersion
6.0

ImageFileCharacteristics
Executable, Large address aware

EntryPoint
0xd8e20

InitializedDataSize
901120

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 5217711ba208b6a9b1ec561ad1cacc7a
SHA1 7f2bbfdecfad2f9c35f3981df0bd54a2e30136f0
SHA256 e19249c448777f097753258059e5388b716706d0d7e7357cdcf49d3f5afbc2c7
ssdeep
24576:o8a4OwsXpsrH4fXBZE8wdVhkuKPxfS4V7Xu3pP4i:o82wsXps4/BW8ohk7dF+3R4

authentihash 5e079fd6581951979ee94362600e004f7f277d52303d2e64e602bcd8cfd90c4c
imphash 97f41fdda5970d369c6b3e845bdfdf26
File size 1.7 MB ( 1806336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386

TrID OS/2 Executable (generic) (25.2%)
Clipper DOS Executable (25.0%)
Generic Win/DOS Executable (24.8%)
DOS Executable Generic (24.8%)
Tags
peexe via-tor

VirusTotal metadata
First submission 2018-12-14 18:14:56 UTC ( 5 月, 1 週 前 )
Last submission 2019-01-06 16:49:44 UTC ( 4 月, 2 週 前 )
檔案名稱 arhiv_5435345.ex1
arhiv_5435345.exe
沒有評論. 尚未有 VirusTotal 社群成員評論此項目,您將是第一個這樣做!

留下您的評論...

?
張貼評論

您尚未登入。 只有註冊的使用者才可以發表評論、登入!

沒有投票. 尚未有人對此項目投票,您將是第一個這樣做!