× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 150872022d30ede70f0d959b671281d44b55883a229e07dd0bdcf33a0a827274
File name: soundrec.exe
Detection ratio: 40 / 51
Analysis date: 2014-04-22 01:36:38 UTC ( 2 days, 22 hours ago )
Antivirus Result Update
AVG Generic33.EEO 20140421
Ad-Aware Gen:Variant.Kazy.172419 20140422
AhnLab-V3 Spyware/Win32.Zbot 20140421
AntiVir Worm/Cridex.E.23 20140421
Antiy-AVL Trojan[Spy]/Win32.Zbot 20140422
Avast Win32:LockScreen-AAT [Trj] 20140422
Baidu-International Trojan.Win32.Bublik.At 20140421
BitDefender Gen:Variant.Kazy.172419 20140422
CAT-QuickHeal Worm.Cridex 20140421
CMC Trojan.Win32.Obfuscated.2!O 20140421
Commtouch W32/Zbot.JC2.gen!Eldorado 20140422
Comodo TrojWare.Win32.Trojan.Agent.Gen 20140421
DrWeb Trojan.Necurs.97 20140422
ESET-NOD32 a variant of Win32/Kryptik.BBBG 20140421
Emsisoft Gen:Variant.Kazy.172419 (B) 20140422
F-Prot W32/Zbot.JC2.gen!Eldorado 20140422
F-Secure Gen:Variant.Kazy.172419 20140421
GData Gen:Variant.Kazy.172419 20140422
Ikarus Worm.Win32.Cridex 20140422
K7AntiVirus Riskware ( 0040eff71 ) 20140421
K7GW Riskware ( 0040eff71 ) 20140421
Kaspersky Trojan.Win32.Bublik.auyd 20140421
Kingsoft Win32.Troj.Bublik.au.(kcloud) 20140422
Malwarebytes Spyware.Zbot.ED 20140422
McAfee PWS-Zbot-FATG!330AD00466BD 20140422
McAfee-GW-Edition PWS-Zbot-FATG!330AD00466BD 20140422
MicroWorld-eScan Gen:Variant.Kazy.172419 20140422
Microsoft Worm:Win32/Cridex.E 20140422
NANO-Antivirus Trojan.Win32.Bublik.csfbse 20140422
Norman Kryptik.CBVJ 20140421
Panda Trj/Genetic.gen 20140421
Qihoo-360 HEUR/Malware.QVM19.Gen 20140422
Rising PE:Malware.XPACK!1.9C22 20140421
Sophos Troj/Zbot-FCO 20140422
Symantec Trojan.Zbot 20140421
TrendMicro WORM_CRIDEX.RD 20140422
TrendMicro-HouseCall WORM_CRIDEX.RD 20140422
VBA32 SScope.Malware-Cryptor.Mystig 20140421
VIPRE Trojan.Win32.ZAccess.n (v) 20140422
ViRobot Trojan.Win32.A.Bublik.296448 20140422
AegisLab 20140422
Agnitum 20140421
Bkav 20140418
ByteHero 20140422
ClamAV 20140422
Fortinet 20140421
Jiangmin 20140421
SUPERAntiSpyware 20140422
TheHacker 20140421
TotalDefense 20140421
nProtect 20140421
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
© ?????????? ??????????. ??? ????? ????????.

Publisher ?????????? ??????????
Product ???????????? ??????? Microsoft® Windows®
Original name sndrec32.exe
Internal name soundrec.exe
File version 5.1.2600.5512 (xpsp.080413-0845)
Description ???????????
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-05-07 07:28:20
Link date 8:28 AM 5/7/2013
Entry Point 0x00036E30
Number of sections 11
PE sections
PE imports
OpenEncryptedFileRawW
RegOpenKeyExW
CreateFileW
GetWindowsDirectoryW
ReadFile
ExitProcess
GetStartupInfoW
LoadLibraryA
GetProcAddress
LoadIconW
LoadIconA
_purecall
__p__fmode
malloc
_putenv
__wgetmainargs
_ftol
_wfopen
_wcsnicmp
__dllonexit
_open_osfhandle
_snwprintf
fread
_wcsicmp
wcsrchr
_wcsupr
fflush
_onexit
_vsnwprintf
_cexit
wcslen
_c_exit
wcscpy
clearerr
wcscmp
_errno
_tzset
fseek
_mbslen
_getpid
_wcsdup
mktime
ftell
isalpha
exit
_XcptFilter
realloc
wcsncat
_filelength
_local_unwind2
_adjust_fdiv
_wcmdln
__CxxFrameHandler
_mbscpy
_CxxThrowException
wcspbrk
_fdopen
wcstok
fclose
__p__commode
__setusermatherr
_wcsrev
free
wcscat
wcsncmp
_except_handler3
calloc
_controlfp
wprintf
_wcslwr
wcsncpy
memmove
localtime
swscanf
isspace
wcschr
swprintf
time
fwrite
wcsstr
_initterm
_exit
_wtoi
__set_app_type
Number of PE resources by type
RT_ICON 15
RT_STRING 9
RT_DIALOG 4
RT_GROUP_ICON 4
RT_RCDATA 2
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 35
ENGLISH US 3
GERMAN SWISS 1
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
86528

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
. .

FileVersion
5.1.2600.5512 (xpsp.080413-0845)

TimeStamp
2013:05:07 08:28:20+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
soundrec.exe

FileAccessDate
2014:04:22 02:46:01+01:00

ProductVersion
5.1.2600.5512

SubsystemVersion
5.0

OSVersion
5.0

FileCreateDate
2014:04:22 02:46:01+01:00

OriginalFilename
sndrec32.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
208896

ProductName
Microsoft Windows

ProductVersionNumber
5.1.2600.5512

EntryPoint
0x36e30

ObjectFileType
Executable application

File identification
MD5 330ad00466bd44a5fb2786f0f5e2d0da
SHA1 c86324d9ad20731e34d1c1be5631a6dfe544f328
SHA256 150872022d30ede70f0d959b671281d44b55883a229e07dd0bdcf33a0a827274
ssdeep
6144:X4p93q+aP+MWChp8Nnt32dHEwJMqzU3b:XUDspWBL32+wJtq

imphash b882e34f1a027824a4c2aa420665e203
File size 289.5 KB ( 296448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-07 22:38:59 UTC ( 11 months, 3 weeks ago )
Last submission 2013-05-09 06:40:27 UTC ( 11 months, 2 weeks ago )
File names 1867988.exe
sndrec32.exe
330ad00466bd44a5fb2786f0f5e2d0da.exe
KB00240793.vir
soundrec.exe
KB00678383.exe
readme.exe
info.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications