System currently contains 109,484,654 malware samples.
| f72767bc066ce9d1907386e2706d273ff309aa557c98b109a767f4a02a0e1cd2 |
| VirusShare info last updated 2026-02-23 00:00:01 UTC |
|
|
| MD5 | 836c3ff6736afa997fb47d5bcc8298ae |
| SHA1 | bfdec9e1daabd26ccf432c1ac8f72d3eb0d6284d |
| SHA256 | f72767bc066ce9d1907386e2706d273ff309aa557c98b109a767f4a02a0e1cd2 |
| SSDeep | 49152:XDHXJOpL1M84pvoJdXN0BMOwLloBrugYy6i1zuajsauZnJfmK:opGfQJdXN0B7+sit+K |
| Authentihash | 5594866f6286c8ce80c34d3a123aa13729e66a9c47b9b4077618df0112486369 |
| Size | 3,016,909 bytes |
| File Type | PE32+ executable (console) x86-64, for MS Windows |
| Mime Type | application/x-dosexec |
| Extension | exe |
| TrID | Win32 Executable Microsoft Visual Basic 6 (36.9%) Windows Control Panel Item (generic) (25.9%) Win32 Executable MS Visual C++ (generic) (14.0%) Microsoft Visual C++ compiled executable (generic) (7.4%) Win64 Executable (generic) (4.7%)
|
Detections (39/72) | | ALYac | Trojan.Agent.Xiang.A | | APEX | Malicious | | AVG | Win32:Trojan-gen | | Antiy-AVL | Worm/Win32.Autorun.nar | | Avast | Win32:Trojan-gen | | Bkav | W64.AIDetectMalware | | ClamAV | Win.Ransomware.Azvo-9979243-0 | | CrowdStrike | win/malicious_confidence_90% (W) | | Cylance | Unsafe | | Cynet | Malicious (score: 100) | | DeepInstinct | MALICIOUS | | DrWeb | Win32.HLLW.Autoruner.547 | | ESET-NOD32 | Win32/VB.NAR virus | | Elastic | malicious (high confidence) | | Fortinet | W64/Agent.FBB1!tr | | Google | Detected | | Ikarus | Trojan.Win32 | | K7AntiVirus | Trojan ( 005d0e091 ) | | K7GW | Trojan ( 005d0e091 ) | | Kaspersky | Worm.Win32.AutoRun.vx | | Malwarebytes | VB.Trojan.Generic.DDS | | MaxSecure | Trojan.Malware.121218.susgen | | McAfeeD | ti!F72767BC066C | | MicroWorld-eScan | Trojan.Agent.Xiang.A | | Microsoft | Trojan:Win64/Skeeyah.MG!MTB | | Rising | Worm.VB!1.DA41 (CLASSIC) | | Sangfor | Trojan.Win32.Save.a | | SentinelOne | Static AI - Malicious PE | | Sophos | Mal/Autorun-BJ | | Symantec | ML.Attribute.HighConfidence | | Tencent | Worm.Win64.AutoRun.he | | VBA32 | Worm.Autorun | | VIPRE | Trojan.Agent.Xiang.A | | Varist | W64/Noon.U.gen!Eldorado | | VirIT | Worm.Win64.AutoRun.BA | | Yandex | Trojan.GenAsa!g8z8LT30jj4 | | ZoneAlarm | Mal/Autorun-BJ | | huorong | Virus/VBcode.b@U | | tehtris | Generic.Malware | | VirusTotal Report submitted 2026-02-21 22:33:33 UTC |
|
| ExIF Data | | CharacterSet | Unicode | | CodeSize | 2048 | | CompanyName | Oracle Corporation | | EntryPoint | 0x141c | | FileDescription | Java(TM) Platform SE binary | | FileFlags | (none) | | FileFlagsMask | 0x003f | | FileOS | Win32 | | FileSize | 2.9 MB | | FileSubtype | 0 | | FileType | Win64 EXE | | FileTypeExtension | exe | | FileVersion | 7.0.450.18 | | FileVersionNumber | 7.0.450.18 | | FullVersion | 1.7.0_45-b18 | | ImageFileCharacteristics | Executable, Large address aware | | ImageVersion | 0 | | InitializedDataSize | 6144 | | InternalName | servertool | | LanguageCode | Neutral | | LegalCopyright | Copyright © 2013 | | LinkerVersion | 10 | | MIMEType | application/octet-stream | | MachineType | AMD AMD64 | | OSVersion | 5.2 | | ObjectFileType | Executable application | | OriginalFileName | servertool.exe | | PEType | PE32+ | | ProductName | Java(TM) Platform SE 7 U45 | | ProductVersion | 7.0.450.18 | | ProductVersionNumber | 7.0.450.18 | | Subsystem | Windows command line | | SubsystemVersion | 5.2 | | TimeStamp | 2013:10:08 13:16:53+00:00 | | UninitializedDataSize | 0 |
|