× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 05d7dbbb5043e2b7be1af768b0801c2ea88b0c45ca2b9e8dd207b544ff716729
File name: DropclothInstaller 0.3.exe
Detection ratio: 1 / 51
Analysis date: 2014-04-17 05:10:38 UTC ( 6 days, 4 hours ago )
Antivirus Result Update
Jiangmin Trojan.Antavmu.bij 20140417
AVG 20140416
Ad-Aware 20140416
AegisLab 20140417
Agnitum 20140416
AhnLab-V3 20140416
AntiVir 20140417
Antiy-AVL 20140417
Avast 20140417
Baidu-International 20140416
BitDefender 20140417
Bkav 20140416
ByteHero 20140417
CAT-QuickHeal 20140416
CMC 20140411
ClamAV 20140417
Commtouch 20140417
Comodo 20140416
DrWeb 20140417
ESET-NOD32 20140416
Emsisoft 20140417
F-Prot 20140417
F-Secure 20140417
Fortinet 20140417
GData 20140417
Ikarus 20140417
K7AntiVirus 20140416
K7GW 20140416
Kaspersky 20140417
Kingsoft 20140417
Malwarebytes 20140417
McAfee 20140417
McAfee-GW-Edition 20140417
MicroWorld-eScan 20140417
Microsoft 20140417
NANO-Antivirus 20140417
Norman 20140416
Panda 20140416
Qihoo-360 20140417
Rising 20140416
SUPERAntiSpyware 20140416
Sophos 20140417
Symantec 20140417
TheHacker 20140416
TotalDefense 20140416
TrendMicro 20140417
TrendMicro-HouseCall 20140417
VBA32 20140416
VIPRE 20140417
ViRobot 20140417
nProtect 20140417
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
File version 1, 0, 46, 05
Packers identified
F-PROT UPX, AutoIt, UPX, AutoIt, AutoIt, AutoIt, AutoIt, AutoIt, AutoIt, AutoIt
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-01-04 17:09:51
Link date 6:09 PM 1/4/2007
Entry Point 0x00071460
Number of sections 3
PE sections
PE imports
RegCloseKey
BitBlt
LoadLibraryA
ExitProcess
GetProcAddress
OleLoadPicture
DragFinish
VerQueryValueA
mixerOpen
WSACleanup
GetOpenFileNameA
CoInitialize
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 7
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 21
ExifTool file metadata
UninitializedDataSize
253952

LinkerVersion
7.1

ImageVersion
0.0

FileVersionNumber
1.0.46.5

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
20480

MIMEType
application/octet-stream

FileVersion
1, 0, 46, 05

TimeStamp
2007:01:04 18:09:51+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:04:17 06:10:44+01:00

ProductVersion
1, 0, 46, 05

SubsystemVersion
4.0

OSVersion
4.0

FileCreateDate
2014:04:17 06:10:44+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
208896

FileSubtype
0

ProductVersionNumber
1.0.46.5

EntryPoint
0x71460

ObjectFileType
Executable application

File identification
MD5 ed3e67a9637e7f9a02194f7033531410
SHA1 f07f057c8d72982c8289cff48c715911dd0a3313
SHA256 05d7dbbb5043e2b7be1af768b0801c2ea88b0c45ca2b9e8dd207b544ff716729
ssdeep
12288:rOF3k/KxAYIRT+rgHXfbgFQqIs+hwp4yUN:rOW/BRT+ryXfsonCp4yI

imphash 0999a26b575dfc90d79c90c14fd5ba55
File size 434.1 KB ( 444538 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2009-07-27 17:48:26 UTC ( 4 years, 9 months ago )
Last submission 2014-04-17 05:10:38 UTC ( 6 days, 4 hours ago )
File names DropclothInstaller 0.3.exe
Dropcloth 0.3 (released March 22, 2007).exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Searched windows
Runtime DLLs