images.exe

LJFzfklbulxgxEh

The executable images.exe has been detected as malware by 3 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘chourok.net1425596437137’.
Product:
LJFzfklbulxgxEh

Version:
1.00

MD5:
edf4fa6ffd2b10754cb398a11d247824

SHA-1:
5562ad48340f5b50bf019fd9c52bd4c48b8c904c

SHA-256:
db28076dece1f9e83903fb6fcbfa7b3988a4fb70e13903ea9fbedb440bc70db4

Scanner detections:
3 / 68

Status:
Malware

Analysis date:
4/23/2024 10:55:36 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/AutoRun.VB.AMJ worm
6.3.12010.0

F-Prot
W32/Vobfus.Z.gen
4.6.5.141

F-Secure
Variant.VBKrypt.23
5.16.24

File size:
156 KB (159,744 bytes)

Product version:
1.00

Original file name:
xZFxXpUW.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

File PE Metadata
Compilation timestamp:
9/26/2011 2:58:36 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x3EE8

Entry point:
68, 88, 3F, 40, 00, E8, EE, FF, FF, FF, 00, 00, 00, 00, 00, 00, 30, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, E8, 2B, 91, 9B, 42, 78, B0, 4E, 97, 09, 09, 5E, 5D, 5C, 49, 38, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 62, 23, 4F, 4C, 45, 20, 4D, 4B, 4B, 4C, 6C, 4A, 41, 64, 41, 6B, 00, 0A, 52, 65, 66, 65, 00, 00, 00, 00, 06, 00, 00, 00, 24, 4D, 40, 00, 07, 00, 00, 00, 10, 46, 40, 00, 01, 00, 00, 00, 64, 42, 40, 00, 00, 00, 00, 00, FF, FF, FF, FF, FF, FF, FF, FF, 00, 00, 00, 00, B8, 42, 40, 00, 08, 10, 42, 00...
 
[+]

Developed / compiled with:
Microsoft Visual Basic v5.0

Code size:
128 KB (131,072 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
chourok.net1425596437137

Command:
C:\users\{user}\desktop\nouveau dossier \chourok.net1425596437137.exe \e


Remove images.exe - Powered by Reason Core Security