× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: c65edf68b93b1f53b00ebd1399ebe7e6d6a7d74d743cdfb3530239ccd2a282ac
Dateiname: Activation.exe
Erkennungsrate: 20 / 54
Analyse-Datum: 2014-08-07 19:13:48 UTC ( vor 4 Jahre, 5 Monate ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Ad-Aware Trojan.Generic.11599915 20140807
AhnLab-V3 Win32/Virut.F 20140807
Avast Win32:Malware-gen 20140807
AVware Trojan.Win32.Generic!BT 20140807
BitDefender Trojan.Generic.11599915 20140807
Bkav W32.HfsAutoB.9459 20140806
Commtouch W32/SuspPack.D.gen!Eldorado 20140807
Emsisoft Trojan.Generic.11599915 (B) 20140807
F-Prot W32/SuspPack.D.gen!Eldorado 20140807
F-Secure Trojan.Generic.11599915 20140807
GData Trojan.Generic.11599915 20140807
McAfee Artemis!0EF2939D0182 20140807
eScan Trojan.Generic.11599915 20140807
nProtect Trojan.Generic.11599915 20140807
Panda Trj/CI.A 20140807
Sophos AV Mal/EncPk-DW 20140807
Symantec Infostealer.Gampass 20140807
TrendMicro TROJ_GEN.R0CBC0RH314 20140807
TrendMicro-HouseCall TROJ_GEN.R0CBC0RH314 20140807
VIPRE Trojan.Win32.Generic!BT 20140807
AegisLab 20140807
Yandex 20140807
AntiVir 20140807
Antiy-AVL 20140807
AVG 20140807
Baidu-International 20140807
ByteHero 20140807
CAT-QuickHeal 20140807
ClamAV 20140807
CMC 20140807
Comodo 20140807
DrWeb 20140807
ESET-NOD32 20140807
Fortinet 20140807
Ikarus 20140807
Jiangmin 20140807
K7AntiVirus 20140807
K7GW 20140807
Kaspersky 20140807
Kingsoft 20140807
Malwarebytes 20140807
McAfee-GW-Edition 20140807
Microsoft 20140807
NANO-Antivirus 20140807
Norman 20140807
Qihoo-360 20140807
Rising 20140807
SUPERAntiSpyware 20140804
Tencent 20140807
TheHacker 20140805
TotalDefense 20140807
VBA32 20140807
ViRobot 20140807
Zoner 20140729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
Command embedded, embedded
F-PROT embedded
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00C31600
Number of sections 7
PE sections
PE imports
SetSecurityDescriptorDacl
RegFlushKey
RegCloseKey
GetUserNameA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
CertFreeCRLContext
CertGetNameStringA
CryptVerifyMessageSignature
SetMapMode
GetWindowOrgEx
GetNearestColor
GetTextMetricsA
CombineRgn
GetTextExtentPointA
SetPixel
EndDoc
IntersectClipRect
CopyEnhMetaFileA
CreateEllipticRgn
CreatePalette
EqualRgn
CreateDIBitmap
GetDIBits
GetEnhMetaFileBits
GetDCOrgEx
StretchBlt
GetTextFaceA
GetPaletteEntries
SetBkColor
SetWinMetaFileBits
SetRectRgn
GetDIBColorTable
DeleteEnhMetaFile
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
CreateRectRgnIndirect
EndPath
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
BitBlt
GetDeviceCaps
CreateFontA
FrameRgn
CreateBrushIndirect
SelectPalette
StrokePath
CreateEnhMetaFileA
CloseEnhMetaFile
SetROP2
EndPage
SetDIBColorTable
BeginPath
DeleteObject
CreatePenIndirect
PatBlt
CreatePen
SetStretchBltMode
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetEnhMetaFileDescriptionA
StartPage
RealizePalette
SetEnhMetaFileBits
SelectClipPath
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
SetWindowOrgEx
SelectObject
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
MaskBlt
GetEnhMetaFilePaletteEntries
GetTextExtentExPointA
RestoreDC
GetBitmapBits
CreateBitmap
CreateDIBSection
SetTextColor
GetClipBox
MoveToEx
SetViewportOrgEx
CreateCompatibleDC
SetBrushOrgEx
CreateRectRgn
GetClipRgn
StartDocA
SetTextJustification
CreateSolidBrush
Polyline
CreateCompatibleBitmap
ImageEnumerateCertificates
ImageGetCertificateHeader
ImageGetCertificateData
MapWindowPoints
GetForegroundWindow
SetWindowRgn
RedrawWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
CharLowerBuffA
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
EnumClipboardFormats
LoadImageA
ScrollWindow
GetWindowTextA
GetKeyState
PtInRect
GetMessageA
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
DefMDIChildProcA
GetMessageW
ShowWindow
SetClassLongA
GetPropA
GetMenuState
PeekMessageW
TranslateMDISysAccel
GetTabbedTextExtentA
EnableWindow
SetWindowPlacement
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
SetParent
SetClipboardData
CharLowerA
IsZoomed
GetWindowPlacement
GetWindowRgn
GetKeyboardLayoutList
DrawMenuBar
IsIconic
RegisterClassA
GetMenuItemCount
TabbedTextOutA
GetWindowLongA
SetTimer
OemToCharA
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
GetSysColorBrush
IsWindowUnicode
CreateMenu
DestroyWindow
IsChild
SetFocus
SendNotifyMessageA
MapVirtualKeyA
EmptyClipboard
SetCapture
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
DefWindowProcA
DrawFocusRect
GetClipboardData
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
IsDialogMessage
PostMessageA
ReleaseCapture
GetScrollRange
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
DrawIconEx
CreateWindowExA
GetDlgItem
BringWindowToTop
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
AttachThreadInput
ValidateRect
GetKeyboardLayout
GetSystemMenu
GetDC
SetForegroundWindow
PostThreadMessageA
OpenClipboard
GetAsyncKeyState
DrawTextA
IntersectRect
GetScrollInfo
GetCapture
WaitMessage
FindWindowA
MessageBeep
GetCaretPos
DrawTextExA
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
LoadKeyboardLayoutA
GetSysColor
SetScrollInfo
GetMenuItemInfoA
SystemParametersInfoA
GetDoubleClickTime
GetKeyNameTextA
IsWindowVisible
GetDesktopWindow
CharToOemA
GetDCEx
WinHelpA
DrawEdge
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
SendMessageTimeoutA
CreateIcon
IsRectEmpty
GetCursor
GetFocus
CloseClipboard
GetKeyboardType
SetMenu
SetCursor
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
InitCommonControls
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
PrintDlgA
ChooseColorA
GetSaveFileNameA
GetOpenFileNameA
GetAdaptersInfo
GetNumberOfInterfaces
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
CreateFileMappingA
GetFileAttributesA
WaitForSingleObject
lstrlen
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
ExpandEnvironmentStringsA
OpenFileMappingA
SetErrorMode
GetThreadContext
GetFullPathNameA
GetFileTime
GetTempPathA
WideCharToMultiByte
lstrcpy
InterlockedExchange
WriteFile
GetDiskFreeSpaceA
GetThreadPriority
SetFileAttributesA
SetEvent
LocalFree
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
SetLastError
GetSystemTime
DeviceIoControl
GetModuleFileNameW
Beep
GlobalFindAtomA
ExitProcess
GetModuleFileNameA
RaiseException
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateRemoteThread
CreateMutexA
GetModuleHandleA
CreateThread
CreatePipe
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
GetSystemDirectoryA
GlobalMemoryStatus
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
EnterCriticalSection
TerminateThread
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
VirtualProtect
GetVersionExA
LoadLibraryA
DeleteFileA
RtlUnwind
ExitThread
GlobalSize
GetStartupInfoA
GetDateFormatA
GetFileSize
OpenProcess
CreateDirectoryA
GetModuleHandleW
GetWindowsDirectoryA
ReadProcessMemory
DeleteFileW
GetProcAddress
CreateFileMappingW
GlobalReAlloc
FindFirstFileA
ResetEvent
GetComputerNameA
FindNextFileA
TerminateProcess
DuplicateHandle
GlobalLock
RemoveDirectoryA
LocalSize
CreateFileW
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
lstrcpyn
lstrcmp
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
GlobalDeleteAtom
GetSystemInfo
GlobalFree
GetThreadLocale
GlobalUnlock
GlobalAlloc
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
GetCPInfo
GetCommandLineA
GetCurrentThread
SuspendThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
GetPriorityClass
GetACP
GetVersion
FreeResource
CreateProcessA
UnmapViewOfFile
VirtualFree
Sleep
IsBadReadPtr
FindResourceA
VirtualAlloc
CompareStringA
CreateStreamOnHGlobal
OleDraw
CoInitialize
ProgIDFromCLSID
IsAccelerator
CoCreateInstance
StringFromCLSID
CoUninitialize
OleSetMenuDescriptor
IsEqualGUID
CoTaskMemFree
CoGetClassObject
CreateErrorInfo
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayUnaccessData
VariantCopyInd
VariantClear
GetActiveObject
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantInit
VariantCopy
GetErrorInfo
SysFreeString
SafeArrayPutElement
SetErrorInfo
pcre_compile
pcre_free_ex
pcre_setlocale
pcre_dfa_exec
pcre_maketables
pcre_exec
pcre_fullinfo
pcre_study
ShellExecuteEx
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteA
SHGetPathFromIDList
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpSendRequestA
InternetSetOptionA
HttpOpenRequestA
InternetReadFile
InternetOpenA
InternetConnectA
HttpAddRequestHeadersA
InternetQueryOptionA
HttpQueryInfoA
setsockopt
bind
gethostname
socket
recvfrom
inet_addr
send
WSACleanup
WSAStartup
gethostbyname
connect
sendto
closesocket
htons
recv
select
PE exports
Number of PE resources by type
RT_BITMAP 31
RT_STRING 24
RT_GROUP_CURSOR 21
RT_CURSOR 21
RT_RCDATA 8
RT_ICON 7
RT_MANIFEST 2
MAD 2
RT_DIALOG 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 94
ENGLISH US 13
RUSSIAN 11
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
4.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
1658368

LinkerVersion
2.25

FileTypeExtension
exe

InitializedDataSize
559616

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0xc31600

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 0ef2939d01825bdb2d561a9ee2146755
SHA1 498029c0930d5b67a5f4b1e09aa0fd4bb2f18f0e
SHA256 c65edf68b93b1f53b00ebd1399ebe7e6d6a7d74d743cdfb3530239ccd2a282ac
ssdeep
98304:U9c//////YSpjLp+zq9GMnOQNbzQ10jez07oejfIRXWKsS19wS0wBFz/TnYW3:qoGkOQNbzQEez07oR9wSVFz/cW

authentihash b796dab5bcd6931ec2a395685bc5e1a3decb96465a0e1c79caffeae454d9859e
imphash 68b998efd5a76b4103b3576766a2a5b9
File size 5.9 MB ( 6159774 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID DOS Borland compiled Executable (generic) (54.0%)
Win32 Executable (generic) (24.3%)
Generic Win/DOS Executable (10.8%)
DOS Executable Generic (10.8%)
Tags
peexe via-tor

VirusTotal metadata
First submission 2014-07-30 00:40:22 UTC ( vor 4 Jahre, 5 Monate )
Last submission 2018-04-06 14:08:18 UTC ( vor 9 Monate, 2 Wochen )
Dateinamen Activation.exe
Activation.exe
Activation.exe
4980.exe
Activation.exe
Activation.exe
Activation.exe
c65edf68b93b1f53b00ebd1399ebe7e6d6a7d74d743cdfb3530239ccd2a282ac
Activation_infected.exe
activation.exe
Activation.exe
Activation.exe
filename
Activation.exe
ALSAFA7.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!