× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0c189cb478ae3926cf38608e2b1d83f6e3bc39c37ae0f0385b20e28a1ebb9f06
File name: crypted121med.exe
Detection ratio: 23 / 53
Analysis date: 2016-02-02 19:20:38 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3023618 20160202
AegisLab Troj.W32.Waldek!c 20160202
Antiy-AVL Trojan/Win32.Waldek 20160202
Arcabit Trojan.Generic.D2E2302 20160202
Avast Win32:Trojan-gen 20160202
Avira (no cloud) TR/Crypt.ZPACK.192513 20160202
BitDefender Trojan.GenericKD.3023618 20160202
Emsisoft Trojan.GenericKD.3023618 (B) 20160202
ESET-NOD32 Win32/Dridex.AA 20160202
F-Secure Trojan.GenericKD.3023618 20160202
Fortinet W32/Waldek.CBN!tr 20160202
GData Trojan.GenericKD.3023618 20160202
Ikarus Trojan.Injector 20160202
Kaspersky Trojan.Win32.Waldek.cbn 20160202
Malwarebytes Trojan.Dridex 20160202
McAfee Artemis!54578EDE727F 20160202
McAfee-GW-Edition BehavesLike.Win32.Ransom.fh 20160202
Microsoft Backdoor:Win32/Drixed.M 20160202
eScan Trojan.GenericKD.3023618 20160202
Panda Trj/Dridex.B 20160201
Tencent Win32.Trojan.Waldek.Sudz 20160202
TrendMicro TROJ_SWIZZOR.ABD 20160202
TrendMicro-HouseCall TROJ_SWIZZOR.ABD 20160202
Yandex 20160202
AhnLab-V3 20160202
Alibaba 20160202
ALYac 20160202
AVG 20160202
Baidu-International 20160202
Bkav 20160201
ByteHero 20160202
CAT-QuickHeal 20160202
ClamAV 20160202
Comodo 20160202
Cyren 20160202
DrWeb 20160202
F-Prot 20160129
Jiangmin 20160202
K7AntiVirus 20160202
K7GW 20160202
NANO-Antivirus 20160202
nProtect 20160201
Qihoo-360 20160202
Rising 20160202
Sophos AV 20160202
SUPERAntiSpyware 20160202
Symantec 20160201
TheHacker 20160130
VBA32 20160201
VIPRE 20160202
ViRobot 20160202
Zillya 20160201
Zoner 20160202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-05-11 16:27:07
Entry Point 0x000414EE
Number of sections 4
PE sections
PE imports
GetServiceKeyNameW
SetSecurityDescriptorOwner
RegCloseKey
CopySid
RegOverridePredefKey
AdjustTokenPrivileges
ControlService
InitializeAcl
RegDeleteKeyW
RegCreateKeyA
GetAclInformation
RegQueryValueExW
LsaOpenPolicy
SetSecurityDescriptorDacl
GetSidSubAuthorityCount
RegFlushKey
ChangeServiceConfig2W
OpenProcessToken
RegQueryMultipleValuesW
RegEnumKeyW
SetFileSecurityW
SetServiceObjectSecurity
LookupAccountNameW
SetPrivateObjectSecurity
GetTokenInformation
DuplicateTokenEx
RegLoadKeyA
LsaLookupNames
CloseServiceHandle
IsValidSid
GetSidIdentifierAuthority
RegQueryInfoKeyW
ObjectCloseAuditAlarmW
GetPrivateObjectSecurity
GetSecurityDescriptorDacl
GetSecurityDescriptorSacl
BuildSecurityDescriptorW
RegSaveKeyA
RegQueryInfoKeyA
RegisterServiceCtrlHandlerA
MapGenericMask
ReadEventLogA
RevertToSelf
QueryServiceLockStatusA
SetSecurityDescriptorGroup
OpenSCManagerW
ReportEventW
RegQueryValueA
EqualSid
ChangeServiceConfigW
EnumDependentServicesA
AddAce
BuildTrusteeWithSidW
PropertySheetA
ImageList_BeginDrag
CreateToolbarEx
ImageList_Replace
ImageList_SetImageCount
FlatSB_GetScrollRange
Ord(6)
Ord(5)
ImageList_SetDragCursorImage
FlatSB_GetScrollInfo
UninitializeFlatSB
FlatSB_SetScrollRange
FlatSB_SetScrollProp
ImageList_Merge
ImageList_DrawEx
Ord(13)
FlatSB_ShowScrollBar
ImageList_GetImageCount
DrawStatusTextW
ImageList_SetOverlayImage
ImageList_Destroy
_TrackMouseEvent
ImageList_GetIconSize
FlatSB_EnableScrollBar
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
FlatSB_SetScrollPos
FlatSB_GetScrollProp
ImageList_Add
ImageList_AddMasked
ImageList_Duplicate
ImageList_LoadImageW
ImageList_LoadImageA
CreatePropertySheetPageW
FlatSB_GetScrollPos
ImageList_DragShowNolock
ImageList_Remove
CreatePropertySheetPageA
ImageList_Copy
Ord(8)
ImageList_EndDrag
SymGetSymPrev
FindExecutableImage
MapAndLoad
MapDebugInformation
SplitSymbols
SymRegisterCallback
ImageAddCertificate
SymEnumerateSymbols
SymLoadModule
ImageRemoveCertificate
BindImage
GetStartupInfoA
GetLongPathNameW
GetModuleHandleA
FindNextFileW
GetStringTypeExW
GetDateFormatW
__p__fmode
cos
getc
_acmdln
ctime
_mbschr
_adjust_fdiv
__setusermatherr
_controlfp
__getmainargs
_initterm
__p__commode
__set_app_type
VARIANT_UserFree
midiOutGetNumDevs
midiStreamPause
SendDriverMessage
waveInPrepareHeader
Number of PE resources by type
RT_ICON 5
RT_GROUP_ICON 5
RT_MENU 3
RT_ACCELERATOR 3
RT_BITMAP 1
E1w0u58E88 1
RT_VERSION 1
Number of PE resources by language
ZULU DEFAULT 12
ENGLISH US 7
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
7.0

ImageVersion
0.0

FileVersionNumber
0.183.125.165

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
151552

EntryPoint
0x414ee

OriginalFileName
Actinides.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015

FileVersion
138, 136, 132, 92

TimeStamp
2007:05:11 17:27:07+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Absorbent

ProductVersion
124, 217, 245, 72

FileDescription
Archival

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Cegetel

CodeSize
266240

FileSubtype
0

ProductVersionNumber
0.20.188.55

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 54578ede727f341f6dcf8252307bf4df
SHA1 193e59cec27a1350d6394a068db22e2d50efb720
SHA256 0c189cb478ae3926cf38608e2b1d83f6e3bc39c37ae0f0385b20e28a1ebb9f06
ssdeep
6144:O3mAN/Wr+5NWVwpmrHmvHL07O6hhYQlpyc82a95/BEj5jX:8NOq2VOmb2L06uHwc82a95/BQJX

authentihash 366c0168cc7967b9f7879ad3465ef0129629399e1db8c318d3a66d74b9bd304c
imphash c7820a31e2baf89a58fa9776563ce336
File size 308.0 KB ( 315392 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Windows screen saver (46.4%)
Win32 Dynamic Link Library (generic) (23.3%)
Win32 Executable (generic) (15.9%)
Generic Win/DOS Executable (7.1%)
DOS Executable Generic (7.0%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-01 12:34:03 UTC ( 3 years ago )
Last submission 2016-02-10 16:46:04 UTC ( 3 years ago )
File names crypted121med.exe
83.220.171.223_wikipedia_upload.php
0c189cb478ae3926cf38608e2b1d83f6e3bc39c37ae0f0385b20e28a1ebb9f06.bin
yFUYIdsf.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications