× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1104fc8c2804e2b005559732e46ae63d04ec32210bde9a78e665b431d1deaeb3
Detection ratio: 43 / 46
Analysis date: 2013-04-05 12:44:22 UTC ( 5 years, 10 months ago ) View latest
Antivirus Result Update
Yandex Trojan.DL.Injecter!WaiBHLG0sfE 20130404
AhnLab-V3 Win-Trojan/Lethic.40448.C 20130404
AntiVir TR/Crypt.XPACK.Gen 20130405
Antiy-AVL Trojan/Win32.Injecter.gen 20130405
Avast Win32:Crypt-MEQ [Trj] 20130405
AVG Generic27.AOOY 20130405
BitDefender Backdoor.Generic.708762 20130405
CAT-QuickHeal Trojan.Lethic.B 20130405
ClamAV Trojan.Injecter-10 20130405
Commtouch W32/AutoRun.AJ.gen!Eldorado 20130405
Comodo Worm.Win32.Agent.NFR 20130405
DrWeb Worm.Siggen.6096 20130405
Emsisoft Backdoor.Generic.708762 (B) 20130405
ESET-NOD32 a variant of Win32/Kryptik.ACHO 20130405
F-Prot W32/AutoRun.AJ.gen!Eldorado 20130405
F-Secure Backdoor.Generic.708762 20130405
Fortinet W32/Zbot.CGZF!tr 20130405
GData Backdoor.Generic.708762 20130405
Ikarus Trojan.Win32.Ransom 20130405
Jiangmin TrojanDownloader.Injecter.dkw 20130405
K7AntiVirus EmailWorm 20130404
Kaspersky Worm.Win32.Ngrbot.kpb 20130405
Kingsoft Win32.Malware.Heur_Generic.A.(kcloud) 20130401
Malwarebytes Trojan.Agent 20130405
McAfee Generic.dx!bdk4 20130405
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.H 20130405
Microsoft Trojan:Win32/Lethic.F 20130405
eScan Backdoor.Generic.708762 20130405
NANO-Antivirus Trojan.Win32.Ngrbot.rgzar 20130404
Norman Troj_Generic.ALNPS 20130404
nProtect Worm/W32.Ngrbot.40448.H 20130405
Panda Generic Trojan 20130405
PCTools Malware.Pilleuz!rem 20130405
Sophos AV W32/Ngrbot-F 20130405
SUPERAntiSpyware Trojan.Agent/Gen-FraudPE 20130405
Symantec W32.Pilleuz 20130405
TheHacker Trojan/Downloader.Injecter.jjm 20130404
TotalDefense Win32/Dorkbot.K!generic 20130404
TrendMicro WORM_NGRBOT.TU 20130405
TrendMicro-HouseCall WORM_NGRBOT.TU 20130405
VBA32 TrojanDownloader.Injecter 20130405
VIPRE Trojan.Win32.Autorun.as (v) 20130405
ViRobot Backdoor.Win32.A.Inject.8176.A 20130405
ByteHero 20130322
eSafe 20130403
Rising 20130403
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product hitachi
Original name DIALER.EXE
Internal name DIALER.EXE
Description hitachi Phone Dialer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-03-05 19:50:06
Entry Point 0x00001046
Number of sections 5
PE sections
PE imports
FreeADsMem
DllGetClassObject
RegCreateKeyExW
RegDeleteValueW
GetFileSecurityW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegCreateKeyW
RegEnumKeyW
RegDeleteKeyW
RegSetValueW
SetFileSecurityW
RegQueryValueExW
RegQueryValueW
RegOpenKeyW
AutoDialFunc
CmCustomHangUp
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetNearestColor
GetPaletteEntries
CombineRgn
PlayMetaFile
GetROP2
GetViewportOrgEx
GetObjectType
CreateMetaFileW
SetColorAdjustment
EndDoc
IntersectClipRect
OffsetWindowOrgEx
GetTextFaceW
CreatePalette
GetPolyFillMode
SetTextAlign
StretchDIBits
ScaleViewportExtEx
ArcTo
AbortDoc
CloseMetaFile
SetViewportExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
TextOutW
CreateFontIndirectW
OffsetRgn
GetCurrentPositionEx
CreateRectRgnIndirect
LPtoDP
GetPixel
PolyDraw
SetWindowExtEx
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
OffsetClipRgn
BitBlt
SetAbortProc
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
SelectPalette
SetROP2
EndPage
GetTextColor
Escape
DeleteObject
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
EnumMetaFile
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
GetCharWidthW
StartPage
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SelectClipPath
RectVisible
GetStockObject
UnrealizeObject
SelectClipRgn
GetTextAlign
GetTextExtentPoint32A
SetWindowOrgEx
GetClipRgn
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
PolylineTo
GetBkMode
SaveDC
RestoreDC
SetMapperFlags
GetStretchBltMode
CreateBitmap
SetTextColor
ExcludeClipRect
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetStretchBltMode
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
SetTextJustification
CreateSolidBrush
DPtoLP
StartDocW
CreateCompatibleBitmap
DeleteMetaFile
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetFileAttributesW
DuplicateHandle
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
UnhandledExceptionFilter
SetErrorMode
lstrcatW
GetFileTime
WideCharToMultiByte
LoadLibraryW
GetDiskFreeSpaceW
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
SetEvent
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
GetStringTypeExW
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
WritePrivateProfileStringW
SetLastError
LocalLock
GlobalFindAtomW
SuspendThread
LoadResource
FlushFileBuffers
GlobalHandle
lstrcmpiW
LoadLibraryExA
SetThreadPriority
DelayLoadFailureHook
GetVolumeInformationW
TlsGetValue
MultiByteToWideChar
GetPrivateProfileStringW
GetModuleHandleA
GetFullPathNameW
GlobalAddAtomW
CreateSemaphoreW
CreateMutexW
MulDiv
GetSystemDirectoryA
TerminateProcess
SetUnhandledExceptionFilter
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
GlobalGetAtomNameW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
CopyFileW
GlobalSize
UnlockFile
GetFileSize
GetModuleHandleW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetTempFileNameW
WriteFile
lstrcpyW
GlobalReAlloc
lstrcmpA
FindNextFileW
lstrcpyA
FreeConsole
FindFirstFileW
lstrcmpW
WaitForMultipleObjects
GetTempPathW
CreateEventW
SearchPathW
CreateFileW
TlsSetValue
LocalUnlock
InterlockedIncrement
GetLastError
LocalReAlloc
SystemTimeToFileTime
GlobalDeleteAtom
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
GetThreadLocale
GlobalUnlock
IsDBCSLeadByte
VirtualQuery
lstrlenW
LockFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
InterlockedCompareExchange
GetCurrentThread
lstrcpynW
ReleaseSemaphore
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GlobalLock
GetVersion
FreeResource
FindResourceW
Sleep
GetProcessVersion
VirtualAlloc
GetProcAddress
RedrawWindow
GetForegroundWindow
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
SetScrollPos
IsWindow
GrayStringW
ClientToScreen
ScrollWindowEx
WindowFromPoint
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
IsDialogMessageW
GetDlgCtrlID
DefFrameProcW
UnregisterClassW
GetClientRect
DefWindowProcW
GetWindow
GetNextDlgTabItem
InSendMessage
CallNextHookEx
IsClipboardFormatAvailable
TrackPopupMenu
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
DrawTextW
GetMenuItemID
DestroyWindow
DrawEdge
GetParent
MapDialogRect
UpdateWindow
GetPropW
EqualRect
CheckRadioButton
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
SetDlgItemInt
PeekMessageW
TranslateMDISysAccel
GetTabbedTextExtentA
EnableWindow
SetWindowPlacement
CharUpperW
GetSystemMenu
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetDlgItemTextW
GetDlgItemInt
GetTabbedTextExtentW
MsgWaitForMultipleObjects
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
LoadStringW
DrawMenuBar
EnableMenuItem
InvertRect
GetSubMenu
SetTimer
ShowOwnedPopups
FillRect
CopyRect
GetSysColorBrush
GetDialogBaseUnits
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetMenuStringW
IsChild
MapWindowPoints
RegisterWindowMessageW
IsIconic
GetWindowThreadProcessId
BeginPaint
OffsetRect
DefMDIChildProcW
GetScrollPos
KillTimer
ClipCursor
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
GetScrollRange
SendDlgItemMessageW
PostMessageW
EndDialog
WaitMessage
CheckMenuItem
DrawFocusRect
GetLastActivePopup
PtInRect
BeginDeferWindowPos
SetWindowTextW
GetDCEx
GetDlgItem
RemovePropW
BringWindowToTop
FindWindowW
ScreenToClient
CountClipboardFormats
PostThreadMessageW
GetMenuItemCount
IsDlgButtonChecked
CheckDlgButton
ValidateRect
SetWindowsHookExW
LoadCursorW
LoadIconW
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
SetFocus
WindowFromDC
GetAsyncKeyState
EndPaint
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
GetScrollInfo
SetWindowContextHelpId
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
wvsprintfW
DeferWindowPos
ShowScrollBar
MessageBoxW
SendMessageW
GetMenuState
SetMenu
SetRectEmpty
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
GetTopWindow
IsWindowVisible
WinHelpW
GetDesktopWindow
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
FrameRect
SetRect
DeleteMenu
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
ModifyMenuW
IsRectEmpty
CopyAcceleratorTableW
GetFocus
CreateMenu
wsprintfW
SetCursor
GetMenu
UnhookWindowsHookEx
TranslateAcceleratorW
InternetCanonicalizeUrlW
InternetSetStatusCallbackW
FtpRemoveDirectoryW
HttpEndRequestW
HttpSendRequestExW
InternetSetCookieW
FtpFindFirstFileW
InternetErrorDlg
InternetOpenW
HttpOpenRequestW
InternetSetOptionExW
FtpCreateDirectoryW
InternetQueryOptionW
InternetConnectW
GopherFindFirstFileW
InternetCloseHandle
FtpDeleteFileW
GopherOpenFileW
InternetGetLastResponseInfoW
HttpAddRequestHeadersW
HttpQueryInfoW
GopherCreateLocatorW
InternetFindNextFileW
InternetQueryDataAvailable
InternetWriteFile
FtpGetFileW
InternetReadFile
InternetSetFilePointer
InternetGetCookieW
FtpSetCurrentDirectoryW
FtpOpenFileW
InternetCrackUrlW
GopherGetAttributeW
FtpPutFileW
FtpGetCurrentDirectoryW
HttpSendRequestW
InternetOpenUrlW
FtpRenameFileW
_purecall
malloc
_expand
realloc
wcstoul
fread
fclose
_msize
__dllonexit
_open_osfhandle
_snwprintf
swprintf
wcstol
fflush
_wcsupr
_wfullpath
wcstod
_endthreadex
_except_handler3
wcslen
_ultow
clearerr
mktime
fwrite
fseek
_wcsnicmp
_onexit
_get_osfhandle
wcscmp
ftell
__argc
_itow
_beginthreadex
wcsrchr
localtime
_adjust_fdiv
__CxxFrameHandler
wcsftime
_CxxThrowException
wcspbrk
_fdopen
_wcsdup
wcschr
wcsncpy
time
_wcsrev
gmtime
free
ceil
wcscspn
vswprintf
__doserrno
__wargv
wcsncmp
calloc
_initterm
_wcslwr
fputws
memmove
wcsspn
floor
wcscpy
iswdigit
abort
modf
iswspace
wcsstr
_wsplitpath
_wtol
_ltow
fgetws
_wtoi
OleUninitialize
OleIsRunning
OleCreateFromData
StgOpenStorageOnILockBytes
OleTranslateAccelerator
OleRun
OleLockRunning
OleDestroyMenuDescriptor
DoDragDrop
OleSetClipboard
StgCreateDocfile
OleRegGetUserType
RegisterDragDrop
OleCreateLinkToFile
StringFromGUID2
ReadClassStg
CreateStreamOnHGlobal
CreateItemMoniker
OleFlushClipboard
ReleaseStgMedium
OleRegGetMiscStatus
SetConvertStg
OleCreateLinkFromData
GetHGlobalFromILockBytes
OleCreateFromFile
StringFromCLSID
OleSave
CoRegisterMessageFilter
RevokeDragDrop
ReadFmtUserTypeStg
OleGetClipboard
StgCreateDocfileOnILockBytes
OleCreate
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
CoGetClassObject
CoRegisterClassObject
CoInitialize
OleInitialize
OleLoadFromStream
CoLockObjectExternal
WriteFmtUserTypeStg
GetClassFile
CoCreateInstance
OleRegEnumVerbs
StgOpenStorage
CreateBindCtx
OleGetIconOfClass
OleDuplicateData
OleCreateStaticFromData
StgIsStorageFile
OleQueryCreateFromData
CreateDataCache
CoTaskMemAlloc
OleLoad
OleQueryLinkFromData
OleCreateMenuDescriptor
CreateDataAdviseHolder
WriteClassStm
CoRevokeClassObject
CoUninitialize
OleSaveToStream
CLSIDFromProgID
WriteClassStg
CoFreeUnusedLibraries
GetRunningObjectTable
IsAccelerator
CoDisconnectObject
OleSetMenuDescriptor
CoGetMalloc
CoTreatAsClass
OleSetContainedObject
OleIsCurrentClipboard
CreateFileMoniker
CoTaskMemFree
ReadClassStm
CreateGenericComposite
CLSIDFromString
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL DEFAULT 2
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2009:03:05 20:50:06+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
512

LinkerVersion
7.1

Warning
Error processing PE data dictionary

FileTypeExtension
exe

InitializedDataSize
120832

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x1046

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
81920

File identification
MD5 06d46cb81243a54cb19354df6dab5fc2
SHA1 40b310984bf45f4ec1afbcb6e10116e06003690b
SHA256 1104fc8c2804e2b005559732e46ae63d04ec32210bde9a78e665b431d1deaeb3
ssdeep
768:SgKGnnQo6ilqr6dE6jAA6GEn5YBBaVQo1ug8Pda4m4QDeKb4jG6kg:hjQo6dGq4ABJn6aZu3dcaK0q6X

authentihash 0f24835ed6d9dbbadffc661299d1f8e5ff6f41be99520addbaf29d4bbdbb7085
imphash f9ca4f20380d3af1ca1595a999aae016
File size 39.5 KB ( 40448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe usb-autorun

VirusTotal metadata
First submission 2012-03-10 07:21:23 UTC ( 6 years, 11 months ago )
Last submission 2019-01-05 21:37:53 UTC ( 1 month, 1 week ago )
File names aa
file-3779870_ex_
qSEVm.xltm
hJ0lTeK8Vr.ps1
mJ_ZA4X.ini
1104FC8C2804E2B005559732E46AE63D04EC32210BDE9A78E665B431D1DEAEB3.dat
bb.exe
DIALER.EXE
VirusShare_06d46cb81243a54cb19354df6dab5fc2
file
mails.exe
06D46CB81243A54CB19354DF6DAB5FC2.bin
mmails2.exe
MMAILS2.EXE
1587D99100493AB29E480042CA29D200C6C0BC8A.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!