× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0d1ebf616bbe3047eee0f32e7edd7f0b3f2ecda17011bd83af5442d11e263cb7
Detection ratio: 3 / 67
Analysis date: 2018-06-08 21:18:35 UTC ( 7 months, 2 weeks ago )
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20180530
Qihoo-360 HEUR/QVM41.1.Malware.Gen 20180608
SentinelOne (Static ML) static engine - malicious 20180225
Ad-Aware 20180608
AegisLab 20180608
AhnLab-V3 20180608
Alibaba 20180608
ALYac 20180608
Antiy-AVL 20180608
Arcabit 20180608
Avast 20180608
Avast-Mobile 20180608
AVG 20180608
Avira (no cloud) 20180608
AVware 20180608
Babable 20180406
Baidu 20180608
BitDefender 20180608
Bkav 20180608
CAT-QuickHeal 20180608
ClamAV 20180608
CMC 20180608
Comodo 20180608
Cybereason 20180225
Cylance 20180608
Cyren 20180608
DrWeb 20180608
eGambit 20180608
Emsisoft 20180608
Endgame 20180507
ESET-NOD32 20180608
F-Prot 20180608
F-Secure 20180608
Fortinet 20180608
GData 20180608
Ikarus 20180608
Sophos ML 20180601
Jiangmin 20180608
K7AntiVirus 20180608
K7GW 20180608
Kaspersky 20180608
Kingsoft 20180608
MAX 20180608
McAfee 20180608
McAfee-GW-Edition 20180608
Microsoft 20180608
eScan 20180608
NANO-Antivirus 20180608
Palo Alto Networks (Known Signatures) 20180608
Panda 20180608
Rising 20180608
Sophos AV 20180608
SUPERAntiSpyware 20180608
Symantec 20180608
Symantec Mobile Insight 20180605
TACHYON 20180608
Tencent 20180608
TheHacker 20180608
TotalDefense 20180608
TrendMicro 20180608
TrendMicro-HouseCall 20180608
Trustlook 20180608
VBA32 20180608
VIPRE 20180608
ViRobot 20180608
Webroot 20180608
Yandex 20180608
Zillya 20180608
ZoneAlarm by Check Point 20180608
Zoner 20180608
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT ZIP, appended, NSIS, UTF-8, Unicode, INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-12-01 08:08:28
Entry Point 0x000108AF
Number of sections 4
PE sections
Overlays
MD5 52237ca6a10fbaf0c81bff94f94d1713
File type application/zip
Offset 141824
Size 4893940
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
InitCommonControlsEx
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
GetFileAttributesW
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
OpenFileMappingW
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
SetLastError
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetFullPathNameW
SetEnvironmentVariableW
MoveFileExW
SetUnhandledExceptionFilter
TerminateProcess
WriteConsoleA
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatW
CreateDirectoryW
DeleteFileW
GetProcAddress
CreateFileMappingW
CompareStringW
WriteFile
ExpandEnvironmentStringsW
FindNextFileW
FindFirstFileW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
GetConsoleCP
LCMapStringA
GetTimeFormatW
GetEnvironmentStringsW
IsDBCSLeadByte
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
UnmapViewOfFile
FindResourceW
VirtualFree
Sleep
VirtualAlloc
VariantInit
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
MapWindowPoints
SetFocus
GetParent
UpdateWindow
EndDialog
LoadBitmapW
SetWindowTextW
DefWindowProcW
IsWindow
GetWindowTextW
GetMessageW
ShowWindow
SetWindowPos
wvsprintfW
GetSystemMetrics
SetWindowLongW
MessageBoxW
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
GetWindowLongW
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
GetClientRect
GetDlgItem
GetWindow
OemToCharBuffA
DispatchMessageW
GetClassNameW
PeekMessageW
OemToCharA
CopyRect
WaitForInputIdle
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
EnableWindow
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
CoCreateInstance
CLSIDFromString
OleInitialize
OleUninitialize
Number of PE resources by type
RT_STRING 9
RT_DIALOG 6
RT_ICON 4
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN NEUTRAL 22
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:12:01 09:08:28+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
100352

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
40448

SubsystemVersion
5.0

EntryPoint
0x108af

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 aeb1cd9be1498b6c64e7a40c502b3f1f
SHA1 d01d647d5464c62f67826283d91674291f20ef5c
SHA256 0d1ebf616bbe3047eee0f32e7edd7f0b3f2ecda17011bd83af5442d11e263cb7
ssdeep
98304:6NBopv05Whw8TrHO+KkW2F58kLor7WFoDJmaDq4sgIxoGORgM:Hm5WhXy+KQ7amAggIxoG0gM

authentihash 12d30b807be90e39296a8bc84019832fe78a67e938c7610d65e362f2fb9391b4
imphash cb23e26cc45ed9aa58fdce155e7da31a
File size 4.8 MB ( 5035764 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2015-03-12 22:44:58 UTC ( 3 years, 10 months ago )
Last submission 2018-05-21 02:13:06 UTC ( 8 months, 1 week ago )
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications