× Бисквитките са забранени! Този сайт изисква бисквитките да бъдат разрешени, за да работи правилно.
SHA256: e9471c973642641e0b1ec92ebfd841fb316779cb1885410bc79d49853c34e0da
Име на файла: capslang.exe
Съотношение на разпознаване: 2 / 54
Дата на анализиране: 2014-08-08 12:28:29 UTC (преди 4 години, 9 месеци) Преглед на последния
Антивирусен софтуер Резултат Версия на обновление
AhnLab-V3 Win32/Xema.worm.22263 20140808
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.J!80 20140808
Ad-Aware 20140808
AegisLab 20140808
Yandex 20140807
AntiVir 20140808
Antiy-AVL 20140808
Avast 20140807
AVG 20140808
AVware 20140808
Baidu-International 20140808
BitDefender 20140808
Bkav 20140808
ByteHero 20140808
CAT-QuickHeal 20140808
ClamAV 20140807
CMC 20140807
Commtouch 20140808
Comodo 20140808
DrWeb 20140808
Emsisoft 20140808
ESET-NOD32 20140808
F-Prot 20140808
F-Secure 20140808
Fortinet 20140808
GData 20140808
Ikarus 20140808
Jiangmin 20140808
K7AntiVirus 20140807
K7GW 20140807
Kaspersky 20140808
Kingsoft 20140808
Malwarebytes 20140808
McAfee 20140808
Microsoft 20140808
eScan 20140808
NANO-Antivirus 20140808
Norman 20140808
nProtect 20140807
Panda 20140807
Qihoo-360 20140808
Rising 20140808
Sophos AV 20140808
SUPERAntiSpyware 20140804
Symantec 20140808
Tencent 20140808
TheHacker 20140805
TotalDefense 20140808
TrendMicro 20140808
TrendMicro-HouseCall 20140808
VBA32 20140808
VIPRE 20140808
ViRobot 20140808
Zoner 20140729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-01-22 09:48:06
Entry Point 0x00001225
Number of sections 5
PE sections
Overlays
MD5 e47e4accddd88e7377040db887088379
File type data
Offset 6324
Size 20572
Entropy 4.13
PE imports
strchr
_itoa
raise
fwrite
signal
strcat
abort
exit
__GetMainArgs
_iob
GetLastError
GetModuleHandleA
CreateEventA
ExitProcess
FormatMessageA
GetCommandLineA
RtlUnwind
CloseHandle
GetWindowThreadProcessId
GetMessageA
SetTimer
GetForegroundWindow
SetWindowsHookExA
DispatchMessageA
UnhookWindowsHookEx
RegisterHotKey
PostMessageA
GetKeyboardLayout
keybd_event
MessageBoxA
TranslateMessage
PostQuitMessage
CallNextHookEx
GetKeyState
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2013:01:22 10:48:06+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
3072

LinkerVersion
2.55

EntryPoint
0x1225

InitializedDataSize
2560

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
1.0

UninitializedDataSize
512

Compressed bundles
File identification
MD5 7d4090b470add3b2e00fcdaf8d762824
SHA1 c00a137864365bc1da76fa6c5e1a29ca7e577d00
SHA256 e9471c973642641e0b1ec92ebfd841fb316779cb1885410bc79d49853c34e0da
ssdeep
384:qG86TjVDUXtPPQOdB5Q7krB266h7ljSv+vekqI:qQQVIOdB5hN2n1hG+jqI

authentihash 058444d61b0ca3c5d274bf5ac185bbe8591d85029bfd9cbeeb70a2b42a9506b0
imphash 77d97b14a43b844a6aaa2c71c46b9764
File size 26.3 KB ( 26896 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (58.9%)
Win32 Dynamic Link Library (generic) (14.0%)
Win32 Executable (generic) (9.6%)
Win16/32 Executable Delphi generic (4.4%)
OS/2 Executable (generic) (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2013-02-02 04:53:47 UTC (преди 6 години, 3 месеци)
Last submission 2018-06-05 05:30:55 UTC (преди 11 месеци, 3 седмици)
Имена на файла capslang.exe
capslang.exe
capslang.exe
capslang.exe
capslang.exe
e9471c973642641e0b1ec92ebfd841fb316779cb1885410bc79d49853c34e0da
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Няма коментари. Никой не е коментирал това, бъдете първи!

Оставете своя коментар…

?
Публикуване

Не сте влезли в акаунта си. Само регистрирани потребители могат да коментират. Влезте и оставете своя коментар!

Няма гласове. Никой не е гласувал за това все още, бъдете първи!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Hooking activity
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications