× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0174433e3cb54bbaca81e9bc1fc4816555ef84214eda5839d03e0daa93b28a4b
File name: bfsvc.exx
Detection ratio: 46 / 57
Analysis date: 2016-12-12 13:24:48 UTC ( 2 years, 2 months ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKDZ.30867 20161212
AegisLab Troj.W32.Yakes!c 20161212
AhnLab-V3 Trojan/Win32.Agent.C1143663 20161212
ALYac Trojan.GenericKDZ.30867 20161212
Antiy-AVL Trojan/Win32.Yakes 20161212
Arcabit Trojan.Generic.D7893 20161212
Avast Win32:Dorder-R [Trj] 20161212
AVG Crypt_r.AHT 20161212
Avira (no cloud) TR/Agent.180736.91 20161212
AVware Trojan.Win32.Generic!BT 20161212
Baidu Win32.Trojan.Kryptik.pm 20161207
BitDefender Trojan.GenericKDZ.30867 20161212
Bkav W32.FamVT.RazyNHmC.Trojan 20161212
CAT-QuickHeal Ransom.Crowti.A4 20161212
Comodo UnclassifiedMalware 20161212
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20161024
Cyren W32/S-9a3c2942!Eldorado 20161212
DrWeb Trojan.Siggen.65341 20161212
Emsisoft Trojan.GenericKDZ.30867 (B) 20161212
ESET-NOD32 a variant of Win32/Kryptik.ECJQ 20161212
F-Prot W32/S-9a3c2942!Eldorado 20161212
F-Secure Trojan.GenericKDZ.30867 20161212
Fortinet W32/Kryptik.ECMU!tr 20161212
GData Trojan.GenericKDZ.30867 20161212
Ikarus Trojan.Win32.Crypt 20161212
Sophos ML trojan.win32.lethic.i 20161202
Jiangmin Trojan.Yakes.jar 20161212
K7AntiVirus Trojan ( 004d53841 ) 20161212
K7GW Trojan ( 004d53841 ) 20161212
Kaspersky HEUR:Trojan.Win32.Generic 20161212
Malwarebytes Trojan.Agent.ED 20161212
McAfee Ransom-CWall.b!29306D4ADB6D 20161212
McAfee-GW-Edition BehavesLike.Win32.Generic.cm 20161212
eScan Trojan.GenericKDZ.30867 20161212
NANO-Antivirus Trojan.Win32.Yakes.dyipld 20161212
Panda Trj/Genetic.gen 20161211
Qihoo-360 HEUR/QVM10.1.Malware.Gen 20161212
Rising Trojan.Generic-5zJix3JrfBI (cloud) 20161212
Sophos AV Mal/Wonton-BP 20161212
SUPERAntiSpyware Trojan.Agent/Gen-Tester 20161212
Symantec Trojan.Gen 20161212
Tencent Win32.Trojan.Kryptik.Hqlk 20161212
TrendMicro TSPY_YAKES.MKTU 20161212
TrendMicro-HouseCall TSPY_YAKES.MKTU 20161212
VIPRE Trojan.Win32.Generic!BT 20161212
Zillya Trojan.Yakes.Win32.42134 20161210
Alibaba 20161212
ClamAV 20161212
CMC 20161212
Kingsoft 20161212
Microsoft 20161212
nProtect 20161212
TheHacker 20161130
TotalDefense 20161212
Trustlook 20161212
VBA32 20161209
ViRobot 20161212
WhiteArmor 20161207
Yandex 20161211
Zoner 20161212
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 1998-2011 VMware, Inc.

Product VMware Virtual Image Editing Framework
Original name bootrun.exe
Internal name bootrun
File version 7.1.0 build-895003
Description Virtual BootRun Service
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-10-27 19:20:22
Entry Point 0x00006C21
Number of sections 4
PE sections
PE imports
RegEnumKeyExA
RegQueryValueExW
RegDeleteKeyW
Polygon
PatBlt
GetGlyphOutlineW
SaveDC
GetClipBox
GetGlyphOutlineA
Rectangle
GetDeviceCaps
GetColorAdjustment
SetBkMode
GetTextColor
GetCharWidthA
CreateFontA
CreateBrushIndirect
ExtTextOutA
SelectClipRgn
SetBoundsRect
GetCharWidthFloatA
ArcTo
SelectObject
Pie
SetTextJustification
GetSystemPaletteUse
GetKerningPairsA
ResetDCW
ReplaceFileA
GetStdHandle
GetConsoleOutputCP
WaitForSingleObject
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
MoveFileA
LoadResource
TlsGetValue
SetLastError
WriteProcessMemory
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
LockFileEx
CreateThread
SetEnvironmentVariableW
GetExitCodeThread
SetUnhandledExceptionFilter
TerminateProcess
CreateSemaphoreW
WriteConsoleA
GlobalAlloc
GetVersion
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
OpenProcess
GetStartupInfoW
DeleteFileW
GetProcAddress
GetNamedPipeHandleStateW
AssignProcessToJobObject
GetCurrentThreadId
CreateHardLinkW
GlobalLock
GetPrivateProfileSectionW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
VirtualFree
GetEnvironmentStrings
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
ReleaseSemaphore
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
SizeofResource
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
SHGetFileInfoA
SHGetFileInfoW
UpdateWindow
GetScrollRange
EndDialog
EqualRect
FindWindowW
DefWindowProcA
SetScrollRange
GetWindowRect
SetMenu
DialogBoxParamW
ChildWindowFromPoint
GetDlgItemTextW
CopyImage
ReleaseDC
GetMenu
LoadStringW
GetDlgItem
SystemParametersInfoW
ScreenToClient
GetMenuState
wsprintfW
GetKeyboardLayoutList
DocumentPropertiesW
CoRegisterMessageFilter
OleRegEnumFormatEtc
CoTaskMemFree
Number of PE resources by type
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.1.0.1664

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Virtual BootRun Service

CharacterSet
Unicode

InitializedDataSize
131072

EntryPoint
0x6c21

OriginalFileName
bootrun.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 1998-2011 VMware, Inc.

FileVersion
7.1.0 build-895003

TimeStamp
2015:10:27 20:20:22+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
bootrun

OLESelfRegister
yes (bootrun -service)

ProductVersion
7.1.0 build-895003

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
VMware, Inc.

CodeSize
48640

ProductName
VMware Virtual Image Editing Framework

ProductVersionNumber
7.1.0.1664

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 29306d4adb6dc90a2c88329a11b50f65
SHA1 a2e7af4e839824417d68abc4bfd14fc4907b735d
SHA256 0174433e3cb54bbaca81e9bc1fc4816555ef84214eda5839d03e0daa93b28a4b
ssdeep
3072:7I7eBKI/zHJgSnGYg1bYmph+RK46PcJxOFi:7BlaSn85+kTPcSU

authentihash 766c52ff6684742b53e864c0842d251c63422db88043bbb921300d200b4296ce
imphash ddd2939df9303ad6ccf7ae15948d8c67
File size 176.5 KB ( 180736 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.8%)
Win64 Executable (generic) (31.7%)
Windows screen saver (15.0%)
Win32 Dynamic Link Library (generic) (7.5%)
Win32 Executable (generic) (5.1%)
Tags
peexe

VirusTotal metadata
First submission 2015-10-27 21:15:14 UTC ( 3 years, 3 months ago )
Last submission 2015-11-30 17:19:57 UTC ( 3 years, 2 months ago )
File names bootrun
bfsvc.exx
bootrun.exe
59b6.exe
nut415.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.