× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 05d7dbbb5043e2b7be1af768b0801c2ea88b0c45ca2b9e8dd207b544ff716729
File name: DropclothInstaller 0.3.exe
Detection ratio: 1 / 57
Analysis date: 2015-02-01 21:53:03 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
Jiangmin Trojan.Antavmu.bij 20150131
ALYac 20150201
AVG 20150201
AVware 20150201
Ad-Aware 20150201
AegisLab 20150130
Agnitum 20150201
AhnLab-V3 20150201
Alibaba 20150201
Antiy-AVL 20150201
Avast 20150201
Avira 20150201
Baidu-International 20150130
BitDefender 20150201
Bkav 20150130
ByteHero 20150201
CAT-QuickHeal 20150131
CMC 20150129
ClamAV 20150201
Comodo 20150201
Cyren 20150201
DrWeb 20150201
ESET-NOD32 20150201
Emsisoft 20150201
F-Prot 20150201
F-Secure 20150201
Fortinet 20150201
GData 20150201
Ikarus 20150201
K7AntiVirus 20150201
K7GW 20150130
Kaspersky 20150201
Kingsoft 20150201
Malwarebytes 20150201
McAfee 20150201
McAfee-GW-Edition 20150201
MicroWorld-eScan 20150201
Microsoft 20150201
NANO-Antivirus 20150201
Norman 20150201
Panda 20150201
Qihoo-360 20150201
Rising 20150130
SUPERAntiSpyware 20150201
Sophos 20150201
Symantec 20150201
Tencent 20150201
TheHacker 20150131
TotalDefense 20150201
TrendMicro 20150201
TrendMicro-HouseCall 20150201
VBA32 20150129
VIPRE 20150201
ViRobot 20150201
Zillya 20150131
Zoner 20150130
nProtect 20150130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
File version 1, 0, 46, 05
Packers identified
F-PROT AutoIt, UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-01-04 17:09:51
Link date 6:09 PM 1/4/2007
Entry Point 0x00071460
Number of sections 3
PE sections
PE imports
RegCloseKey
BitBlt
LoadLibraryA
ExitProcess
GetProcAddress
OleLoadPicture
DragFinish
VerQueryValueA
mixerOpen
WSACleanup
GetOpenFileNameA
CoInitialize
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 7
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 21
ExifTool file metadata
UninitializedDataSize
253952

LinkerVersion
7.1

ImageVersion
0.0

FileVersionNumber
1.0.46.5

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
20480

MIMEType
application/octet-stream

FileVersion
1, 0, 46, 05

TimeStamp
2007:01:04 18:09:51+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2015:02:01 22:53:12+01:00

ProductVersion
1, 0, 46, 05

SubsystemVersion
4.0

OSVersion
4.0

FileCreateDate
2015:02:01 22:53:12+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
208896

FileSubtype
0

ProductVersionNumber
1.0.46.5

EntryPoint
0x71460

ObjectFileType
Executable application

File identification
MD5 ed3e67a9637e7f9a02194f7033531410
SHA1 f07f057c8d72982c8289cff48c715911dd0a3313
SHA256 05d7dbbb5043e2b7be1af768b0801c2ea88b0c45ca2b9e8dd207b544ff716729
ssdeep
12288:rOF3k/KxAYIRT+rgHXfbgFQqIs+hwp4yUN:rOW/BRT+ryXfsonCp4yI

authentihash 42c6a8a2907f08d8599cef01615b015396848508dea02a9f92be75ee16b87025
imphash 0999a26b575dfc90d79c90c14fd5ba55
File size 434.1 KB ( 444538 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2009-07-27 17:48:26 UTC ( 5 years, 8 months ago )
Last submission 2015-02-01 21:53:03 UTC ( 1 month, 3 weeks ago )
File names DropclothInstaller 0.3.exe
DropclothInstaller 0.3.exe
Dropcloth 0.3 (released March 22, 2007).exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Searched windows
Runtime DLLs