System currently contains 111,339,069 malware samples.
| 59c1d713adf3344c59a8db4cc2c073c6fbc3395a020d8bd39a7f7fa4ae981437 |
| VirusShare info last updated 2026-03-31 00:00:00 UTC |
|
|
| MD5 | 5103f5c37439d44a70b0b0994daf2a6f |
| SHA1 | bb5e8ed2dcbb75b3a2d820d551a7c3ec5279c27a |
| SHA256 | 59c1d713adf3344c59a8db4cc2c073c6fbc3395a020d8bd39a7f7fa4ae981437 |
| SSDeep | 49152:KLfUNv9MqLfUNv9MBC+R2zNsnKvkTgXuquveY+W2o8oT3ezMrl9cekcHhXh9HJUw:99E9F+RYNAKvkTgXuquveY+W2o8oT3eE |
| Authentihash | ad4382a419871a4c8e1386b10c5fc5435c1b8218d99ff96e74d3671732a569a4 |
| Size | 2,871,776 bytes |
| File Type | PE32+ executable (GUI) x86-64, for MS Windows |
| Mime Type | application/x-dosexec |
| Extension | exe |
| TrID | Windows Control Panel Item (generic) (53.9%) Microsoft Visual C++ compiled executable (generic) (15.4%) Win64 Executable (generic) (9.8%) Win32 Dynamic Link Library (generic) (6.1%) Win16 NE executable (generic) (4.7%)
|
Detections (31/71) | | APEX | Malicious | | AVG | Win32:MalwareX-gen [Trj] | | Antiy-AVL | GrayWare/Win32.Wacapew | | Avast | Win32:MalwareX-gen [Trj] | | Bkav | W64.AIDetectMalware | | ClamAV | Win.Malware.Genpack-9879226-0 | | CrowdStrike | win/malicious_confidence_70% (D) | | Cylance | Unsafe | | Cynet | Malicious (score: 100) | | DeepInstinct | MALICIOUS | | DrWeb | Win32.HLLW.Autoruner.547 | | Elastic | malicious (high confidence) | | Fortinet | W32/Xiaoba.B481!tr | | Google | Detected | | Ikarus | Trojan.Patched | | Jiangmin | Trojan.Generic.hbivx | | Kaspersky | UDS:Worm.Win32.AutoRun.vx | | Malwarebytes | Trojan.Patched.APPE | | MaxSecure | Trojan.Malware.121218.susgen | | McAfeeD | Trojan:Win/Wacatac.EGP | | Microsoft | Trojan:Win32/Wacatac.B!ml | | Rising | Trojan.Kryptik!1.B239 (CLASSIC) | | Sangfor | Virus.Win32.Save.a | | SentinelOne | Static AI - Suspicious PE | | Sophos | Generic ML PUA (PUA) | | Symantec | ML.Attribute.HighConfidence | | Tencent | Worm.Win32.Autorun.16001237 | | TrellixENS | Artemis!5103F5C37439 | | VBA32 | Trojan.Scar | | Varist | W64/Mikey.BQ.gen!Eldorado | | huorong | Virus/VBcode.b@U | | VirusTotal Report submitted 2026-03-29 07:14:42 UTC |
|
| ExIF Data | | CharacterSet | Unicode | | CodeSize | 102400 | | CompanyName | Microsoft Corporation | | EntryPoint | 0x15f38 | | FileDescription | AppVShNotify | | FileFlags | (none) | | FileFlagsMask | 0x003f | | FileOS | Win32 | | FileSize | 2.7 MB | | FileSubtype | 0 | | FileType | Win64 EXE | | FileTypeExtension | exe | | FileVersion | 5.1.131.0 | | FileVersionNumber | 5.1.131.0 | | ImageFileCharacteristics | Executable, Large address aware | | ImageVersion | 0 | | InitializedDataSize | 179712 | | InternalName | AppVShNotify | | LanguageCode | English (U.S.) | | LegalCopyright | © 2015 Microsoft Corporation. All rights reserved. | | LegalTrademarks | Microsoft® is a registered trademark of Microsoft Corporation. | | LinkerVersion | 12 | | MIMEType | application/octet-stream | | MachineType | AMD AMD64 | | OSVersion | 6 | | ObjectFileType | Executable application | | OriginalFileName | AppVShNotify.exe | | PEType | PE32+ | | PrivateBuild | RTM (by sftbuild on MBAMR02BLD02) | | ProductName | Microsoft Application Virtualization (App-V) | | ProductVersion | 5.1.131.0 | | ProductVersionNumber | 5.1.131.0 | | Subsystem | Windows GUI | | SubsystemVersion | 6 | | TimeStamp | 2017:11:15 23:42:45+00:00 | | UninitializedDataSize | 0 |
|