× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0271ee1062381a4d0010a52f2dd180fd0306fac739d16385e4c1721320ae67a0
File name: 0271ee1062381a4d0010a52f2dd180fd0306fac739d16385e4c1721320ae67a0
Detection ratio: 9 / 54
Analysis date: 2016-02-14 23:42:58 UTC ( 3 years ago ) View latest
Antivirus Result Update
AhnLab-V3 Trojan/Win32.MDA 20160214
Avira (no cloud) TR/Crypt.ZPACK.216867 20160214
Baidu-International Trojan.Win32.Qadars.AO 20160214
ESET-NOD32 Win32/Qadars.AO 20160214
Kaspersky UDS:DangerousObject.Multi.Generic 20160215
Microsoft Trojan:Win32/Qadars.A 20160214
Qihoo-360 QVM09.0.Malware.Gen 20160215
Rising PE:Malware.XPACK-HIE/Heur!1.9C48 [F] 20160214
Sophos AV Mal/Generic-S 20160214
Ad-Aware 20160214
AegisLab 20160214
Yandex 20160213
Alibaba 20160214
Antiy-AVL 20160214
Arcabit 20160214
Avast 20160214
AVG 20160214
BitDefender 20160214
Bkav 20160204
ByteHero 20160215
CAT-QuickHeal 20160213
ClamAV 20160214
CMC 20160214
Comodo 20160214
Cyren 20160214
DrWeb 20160214
Emsisoft 20160214
F-Prot 20160214
F-Secure 20160213
Fortinet 20160214
GData 20160214
Ikarus 20160214
Jiangmin 20160215
K7AntiVirus 20160214
K7GW 20160215
Malwarebytes 20160214
McAfee 20160214
McAfee-GW-Edition 20160214
eScan 20160214
NANO-Antivirus 20160214
nProtect 20160212
Panda 20160214
SUPERAntiSpyware 20160214
Symantec 20160214
Tencent 20160215
TheHacker 20160213
TotalDefense 20160214
TrendMicro 20160214
TrendMicro-HouseCall 20160214
VBA32 20160214
VIPRE 20160214
ViRobot 20160214
Zillya 20160213
Zoner 20160214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-08-04 16:09:17
Entry Point 0x0001C2F7
Number of sections 3
PE sections
PE imports
GetSystemTime
GetLastError
TlsGetValue
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GlobalFree
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
TlsAlloc
GlobalUnlock
GetEnvironmentStringsW
GetVersionExA
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
CreatePipe
GetStartupInfoA
GetDateFormatA
GetEnvironmentStrings
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
WriteProfileStringA
OpenProcess
WriteConsoleW
GetWindowsDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetProcessHeap
SetStdHandle
SetFilePointer
GetTempPathA
QueryPerformanceFrequency
CreateSemaphoreA
GetCPInfo
TlsFree
GetModuleHandleA
FlushFileBuffers
DeleteCriticalSection
ReadFile
GetConsoleOutputCP
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
HeapDestroy
TerminateProcess
LCMapStringA
WideCharToMultiByte
InitializeCriticalSection
HeapCreate
GlobalAlloc
VirtualFree
WriteConsoleA
InterlockedIncrement
Sleep
GetFileType
GetTickCount
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
FindResourceA
VirtualAlloc
SetLastError
LeaveCriticalSection
InflateRect
SetParent
IntersectRect
EndDeferWindowPos
ExitWindowsEx
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2004:08:04 17:09:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
176128

LinkerVersion
8.0

EntryPoint
0x1c2f7

InitializedDataSize
77824

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 b0f13a3c725d4ce04abfd6a4cb59cbcc
SHA1 f361eb0d8c853f052d45a36a99049ba6b352211a
SHA256 0271ee1062381a4d0010a52f2dd180fd0306fac739d16385e4c1721320ae67a0
ssdeep
3072:DbtNUwoxTsUOmkr14Kom21t6cVTnTcApzR+QVMJ3Mkgf:DofOmkrZl2t6cVTnTcqtRqJJ

authentihash fbf343eb1befa5e104de58f8f5a27bda58fac9534003f996866ed828ea17213d
imphash 8d77f14986eb6a54e6977b73512ecc17
File size 204.0 KB ( 208896 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-14 23:42:58 UTC ( 3 years ago )
Last submission 2016-02-14 23:42:58 UTC ( 3 years ago )
File names systray.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
DNS requests
UDP communications