× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b89a19fff6b6a2b9b656ff49ee694be9a850b682691ee3a4196c8c3a0fb28682
File name: eucis.exe
Detection ratio: 3 / 51
Analysis date: 2014-05-29 10:05:05 UTC ( 4 years, 12 months ago ) View latest
Antivirus Result Update
Malwarebytes Trojan.Downloader.Upatre 20140529
McAfee Downloader-FSH!8DCDEC750C0D 20140529
Qihoo-360 Malware.QVM06.Gen 20140529
Ad-Aware 20140529
Yandex 20140528
AhnLab-V3 20140529
AntiVir 20140529
Antiy-AVL 20140529
Avast 20140529
AVG 20140529
Baidu-International 20140529
BitDefender 20140529
Bkav 20140528
ByteHero 20140529
CAT-QuickHeal 20140529
ClamAV 20140529
CMC 20140529
Commtouch 20140529
Comodo 20140529
DrWeb 20140529
Emsisoft 20140529
ESET-NOD32 20140529
F-Prot 20140529
F-Secure 20140529
Fortinet 20140529
GData 20140529
Ikarus 20140529
Jiangmin 20140529
K7AntiVirus 20140528
K7GW 20140528
Kaspersky 20140529
Kingsoft 20140529
McAfee-GW-Edition 20140529
Microsoft 20140529
eScan 20140529
NANO-Antivirus 20140529
Norman 20140529
nProtect 20140528
Panda 20140529
Rising 20140528
Sophos AV 20140529
SUPERAntiSpyware 20140529
Symantec 20140529
Tencent 20140529
TheHacker 20140529
TotalDefense 20140529
TrendMicro 20140529
TrendMicro-HouseCall 20140529
VBA32 20140528
VIPRE 20140529
ViRobot 20140529
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2042-11-27 09:34:41
Entry Point 0x000022B7
Number of sections 4
PE sections
Overlays
MD5 fed65057ce8533b1562fc435eab2a106
File type ASCII text
Offset 19968
Size 100
Entropy 3.29
PE imports
HeapAlloc
GetStartupInfoA
GetModuleHandleA
lstrcpyA
ExitProcess
CloseHandle
GetCommandLineA
LoadLibraryA
GetProcessHeap
GetMessageA
GetSystemMetrics
CreateWindowExA
SetScrollRange
RedrawWindow
DispatchMessageA
GetActiveWindow
ShowScrollBar
GetWindowPlacement
SendMessageA
GetDlgCtrlID
PostQuitMessage
DefWindowProcA
DrawFrameControl
RegisterClassExA
Number of PE resources by type
RT_ICON 1
RT_MANIFEST 1
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 5
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileVersionNumber
0.0.2.2

UninitializedDataSize
0

LanguageCode
Unknown (143C)

FileFlagsMask
0x0000

CharacterSet
Unknown (61A7)

InitializedDataSize
14336

EntryPoint
0x22b7

OriginalFileName
Hiose

MIMEType
application/octet-stream

LegalCopyright
Copyright Hiose

FileVersion
Version 0.2.2

TimeStamp
1900:01:00 00:00:00+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
Hiose

FileDescription
Little tool

OSVersion
4.0

FileOS
Windows 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Hiose

CodeSize
5120

FileSubtype
0

ProductVersionNumber
0.0.2.2

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 8dcdec750c0df4c381d722a49ecc5aa7
SHA1 4185f2e125401a990e2903422caa3138d38975f1
SHA256 b89a19fff6b6a2b9b656ff49ee694be9a850b682691ee3a4196c8c3a0fb28682
ssdeep
192:6KTBIaH3UJeXziuTbgJiWoMkZw02EwETWn6VZCIQ0DLrrVWEb8M89j2RbnQq8Leh:6GBrx/gQfZPcEynmZCbyLrb8MRf1

authentihash e0001f47633a6b7200cdc18e3ff7a0813733785957e67fde179aa47d4a9a9eea
imphash 2261af0b76ceb3367db083900216252a
File size 19.6 KB ( 20068 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-05-29 10:05:05 UTC ( 4 years, 12 months ago )
Last submission 2014-05-29 10:05:05 UTC ( 4 years, 12 months ago )
File names eucis.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications