× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 13c7fb1c2e1aba1ebe01dbc3477db760889b214a98e0a1e99f6f4d46ce8789c5
File name: example1.exe
Detection ratio: 3 / 64
Analysis date: 2017-08-01 11:39:12 UTC ( 1 year ago ) View latest
Antivirus Result Update
McAfee-GW-Edition BehavesLike.Win32.Downloader.nh 20170801
Rising Malware.Heuristic!ET#91% (rdm+) 20170801
WhiteArmor Malware.HighConfidence 20170731
Ad-Aware 20170801
AegisLab 20170801
AhnLab-V3 20170801
Alibaba 20170801
ALYac 20170801
Antiy-AVL 20170801
Arcabit 20170801
Avast 20170801
AVG 20170801
Avira (no cloud) 20170801
AVware 20170801
Baidu 20170728
BitDefender 20170801
Bkav 20170801
CAT-QuickHeal 20170801
ClamAV 20170801
CMC 20170801
Comodo 20170801
CrowdStrike Falcon (ML) 20170710
Cylance 20170801
Cyren 20170801
DrWeb 20170801
Emsisoft 20170801
Endgame 20170721
ESET-NOD32 20170801
F-Prot 20170801
F-Secure 20170801
Fortinet 20170801
GData 20170801
Ikarus 20170801
Sophos ML 20170607
Jiangmin 20170801
K7AntiVirus 20170801
K7GW 20170801
Kaspersky 20170801
Kingsoft 20170801
Malwarebytes 20170801
MAX 20170801
McAfee 20170801
Microsoft 20170801
eScan 20170801
NANO-Antivirus 20170801
nProtect 20170801
Palo Alto Networks (Known Signatures) 20170801
Panda 20170731
Qihoo-360 20170801
SentinelOne (Static ML) 20170718
Sophos AV 20170801
SUPERAntiSpyware 20170801
Symantec 20170801
Symantec Mobile Insight 20170801
Tencent 20170801
TheHacker 20170730
TrendMicro 20170801
TrendMicro-HouseCall 20170801
Trustlook 20170801
VBA32 20170801
VIPRE 20170801
ViRobot 20170801
Webroot 20170801
Yandex 20170801
Zillya 20170731
ZoneAlarm by Check Point 20170801
Zoner 20170801
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-08-01 00:34:02
Entry Point 0x000031F1
Number of sections 5
PE sections
Overlays
MD5 c181eef06a62df30dc306ac293421072
File type data
Offset 36352
Size 1272
Entropy 7.84
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
RemoveDirectoryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GetProcAddress
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GlobalLock
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 4
RT_ICON 1
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2017:08:01 01:34:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
25600

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
162816

SubsystemVersion
4.0

EntryPoint
0x31f1

OSVersion
4.0

ImageVersion
6.0

UninitializedDataSize
1024

Compressed bundles
File identification
MD5 5c54b87e44001776848260d8ab9566e9
SHA1 a04e7f747dde1e8044b92dad76c639bc1867a426
SHA256 13c7fb1c2e1aba1ebe01dbc3477db760889b214a98e0a1e99f6f4d46ce8789c5
ssdeep
768:snnw4xRMjJ8FBDOLQmzPjhAVHx10Z0D3yuInmBd0cnbJK:unw8RSijDtSA5xeZ0DbBCcnb0

authentihash 36079f94b00f4b955a81893d352fb0fdfb526e3e19db0fb0be9dd6c05fc2f657
imphash 3abe302b6d9a1256e6a915429af4ffd2
File size 36.7 KB ( 37624 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2017-08-01 11:39:12 UTC ( 1 year ago )
Last submission 2017-11-22 13:16:24 UTC ( 8 months, 3 weeks ago )
File names example1.exe
example1.exe
example1.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Deleted files
Created mutexes
Runtime DLLs