× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 5dc95433ce96006ef71b1d21dae4edbfa28245a3ea31e5fe168227682e26a0f7
Dateiname: Krisan Cafe Client - Runtime.exe
Erkennungsrate: 0 / 46
Analyse-Datum: 2013-08-23 02:30:32 UTC ( vor 4 Jahre, 3 Monate ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Yandex 20130822
AhnLab-V3 20130822
AntiVir 20130823
Antiy-AVL 20130822
Avast 20130823
AVG 20130822
BitDefender 20130823
ByteHero 20130814
CAT-QuickHeal 20130822
ClamAV 20130823
Commtouch 20130823
Comodo 20130823
DrWeb 20130823
Emsisoft 20130823
ESET-NOD32 20130822
F-Prot 20130823
F-Secure 20130822
Fortinet 20130823
GData 20130823
Ikarus 20130823
Jiangmin 20130822
K7AntiVirus 20130822
K7GW 20130822
Kaspersky 20130823
Kingsoft 20130723
Malwarebytes 20130822
McAfee 20130823
McAfee-GW-Edition 20130823
Microsoft 20130822
eScan 20130823
NANO-Antivirus 20130823
Norman 20130822
nProtect 20130822
Panda 20130822
PCTools 20130822
Rising 20130822
Sophos AV 20130823
SUPERAntiSpyware 20130823
Symantec 20130823
TheHacker 20130822
TotalDefense 20130822
TrendMicro 20130823
TrendMicro-HouseCall 20130823
VBA32 20130822
VIPRE 20130823
ViRobot 20130822
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Publisher Alexander M. Prado
Signature verification A certificate chain could not be built to a trusted root authority.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-02-17 06:10:17
Entry Point 0x000010B9
Number of sections 7
PE sections
PE imports
GetFileAttributesA
VirtualFree
GetModuleHandleA
GetTempPathA
GetModuleFileNameA
lstrcmpA
LoadLibraryA
lstrlenA
lstrcatA
WriteFile
CreateDirectoryA
DeleteFileA
FreeLibrary
lstrcpyA
ExitProcess
CloseHandle
CreateFileA
RemoveDirectoryA
GetFileSize
VirtualAlloc
GetProcAddress
wsprintfA
MessageBoxA
Number of PE resources by type
RT_DIALOG 5
RT_ICON 1
RT_GROUP_ICON 1
RT_RCDATA 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 7
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2008:02:17 07:10:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
3584

LinkerVersion
3.0

FileAccessDate
2014:05:25 03:48:50+01:00

EntryPoint
0x10b9

InitializedDataSize
99328

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

FileCreateDate
2014:05:25 03:48:50+01:00

UninitializedDataSize
0

File identification
MD5 79e5ac6b87fd3cd031501fd9eb43142d
SHA1 8f906766739240d32d8717eb98d4a9a368bf17ab
SHA256 5dc95433ce96006ef71b1d21dae4edbfa28245a3ea31e5fe168227682e26a0f7
ssdeep
98304:IR+wMyLagX8DQkUL+C/D0gF6ekF/dL4rVKQdPjMt5rdkiw+REU67Ca:BwdLXCMo5/xsVKQdrMOs2D7Ca

imphash c9749513208288305099900ce01b1603
File size 5.5 MB ( 5809640 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-08-23 02:30:32 UTC ( vor 4 Jahre, 3 Monate )
Last submission 2014-05-25 02:48:10 UTC ( vor 3 Jahre, 6 Monate )
Dateinamen Krisan Cafe Client - Runtime.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.