× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 068d307ef8af9202ad6aca9d8da25edf53185177225fbb89bac5a43ebbcc4d52
File name: 39387
Detection ratio: 2 / 55
Analysis date: 2016-01-31 08:54:17 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
ByteHero Trojan.Malware.Obscu.Gen.001 20160131
ViRobot Trojan.Win32.A.VB.2524160[h] 20160129
Ad-Aware 20160130
AegisLab 20160130
Yandex 20160129
AhnLab-V3 20160129
Alibaba 20160129
ALYac 20160130
Antiy-AVL 20160130
Arcabit 20160130
Avast 20160130
AVG 20160130
Avira (no cloud) 20160130
Baidu-International 20160129
BitDefender 20160130
Bkav 20160129
CAT-QuickHeal 20160129
ClamAV 20160130
CMC 20160130
Comodo 20160130
Cyren 20160129
DrWeb 20160130
Emsisoft 20160130
ESET-NOD32 20160130
F-Prot 20160129
F-Secure 20160129
Fortinet 20160130
GData 20160130
Ikarus 20160129
Jiangmin 20160129
K7AntiVirus 20160129
K7GW 20160129
Kaspersky 20160129
Malwarebytes 20160130
McAfee 20160130
McAfee-GW-Edition 20160130
Microsoft 20160130
eScan 20160130
NANO-Antivirus 20160130
nProtect 20160129
Panda 20160129
Qihoo-360 20160131
Rising 20160129
Sophos AV 20160130
SUPERAntiSpyware 20160130
Symantec 20160129
Tencent 20160131
TheHacker 20160130
TotalDefense 20160129
TrendMicro 20160130
TrendMicro-HouseCall 20160130
VBA32 20160128
VIPRE 20160130
Zillya 20160130
Zoner 20160130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, Unicode, ZIP
PEiD WinZip 32-bit SFX v8.x module
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2001-01-09 14:09:05
Entry Point 0x00003F8F
Number of sections 5
PE sections
PE imports
GetDeviceCaps
CreateDCA
DeleteDC
CreateFontIndirectA
DeleteObject
GetTextExtentPoint32A
SetTextAlign
ExtTextOutA
SelectObject
SetBkColor
GetBkColor
SetTextColor
GetLastError
_lcreat
DosDateTimeToFileTime
LoadLibraryA
lstrlenA
GlobalFree
WaitForSingleObject
FreeLibrary
LocalAlloc
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GlobalHandle
RtlUnwind
GetModuleFileNameA
WinExec
OpenFile
GetVolumeInformationA
_lwrite
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
_llseek
GetCommandLineA
GetProcAddress
_lread
GetModuleHandleA
_lclose
MapViewOfFile
SetFilePointer
FindFirstFileA
lstrcpyA
_lopen
CloseHandle
CreateFileMappingA
FindNextFileA
GetACP
MoveFileExA
GlobalLock
SetFileAttributesA
GetDriveTypeA
LocalFree
CreateProcessA
GetEnvironmentVariableA
UnmapViewOfFile
GlobalAlloc
LocalFileTimeToFileTime
FindClose
FormatMessageA
SetEndOfFile
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
SetWindowWord
GetSystemMetrics
OemToCharBuffA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
PostMessageA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
GetSysColor
GetWindowWord
SetWindowTextA
SendDlgItemMessageA
GetLastActivePopup
SendMessageA
GetClientRect
GetDlgItem
RegisterClassA
SetRect
InvalidateRect
GetWindowLongA
SetTimer
LoadCursorA
LoadIconA
GetTopWindow
CharNextA
SetActiveWindow
wsprintfA
EndPaint
SetForegroundWindow
SetCursor
DialogBoxIndirectParamA
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 3
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2001:01:09 15:09:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
22016

LinkerVersion
5.1

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

FileTypeExtension
exe

InitializedDataSize
10752

SubsystemVersion
4.0

EntryPoint
0x3f8f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 f04964c3a0d656e976c8ef522f126ad3
SHA1 bf2fef65be2d971ab6f6cba6d8f16d02a02bf36e
SHA256 068d307ef8af9202ad6aca9d8da25edf53185177225fbb89bac5a43ebbcc4d52
ssdeep
49152:Jeu1LrjMB20GmT9S5jU8K+VDF/YZO9fdwPWYul+dY6IPhw0:Jh1LXg20GAA5YI/UOhdw1dY6IPhw0

authentihash 2ac790facf46a4f7f7f310bebc73d9fad3a4aeec406597b201910254e196ca5c
imphash 4c59c0b3420ca0877a0e6c8146bdb593
File size 2.4 MB ( 2524160 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (31.5%)
Win64 Executable (generic) (27.9%)
Winzip Win32 self-extracting archive (generic) (23.2%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
Tags
winzip peexe

VirusTotal metadata
First submission 2009-03-27 16:05:12 UTC ( 10 years, 2 months ago )
Last submission 2018-02-13 19:11:11 UTC ( 1 year, 3 months ago )
File names 1282331881-myfreecell.exe
vt46.xltm
myfreecell.exe
JK3ACV.docx
eLgxw.rtf
39387
myfreecell.exe
Vytxe8bc.vcf
003fbad8d6f8b1fd4cd70400a50755ac
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!