× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 150872022d30ede70f0d959b671281d44b55883a229e07dd0bdcf33a0a827274
File name: soundrec.exe
Detection ratio: 45 / 56
Analysis date: 2016-02-24 07:44:13 UTC ( 2 months, 1 week ago )
Antivirus Result Update
ALYac Gen:Variant.Kazy.172419 20160224
AVG Worm/Generic3.DY 20160224
AVware Trojan.Win32.ZAccess.n (v) 20160224
Ad-Aware Gen:Variant.Kazy.172419 20160224
AegisLab Troj.W32.Bublik!c 20160224
Yandex Trojan.Bublik!LdrAGmPeehg 20160221
AhnLab-V3 Spyware/Win32.Zbot 20160224
Antiy-AVL Trojan[Spy]/Win32.Zbot 20160224
Arcabit Trojan.Kazy.D2A183 20160224
Avast Win32:Crypt-PJM [Trj] 20160224
Avira (no cloud) TR/Crypt.EPACK.Gen2 20160223
Baidu-International Trojan.Win32.Bublik.auyd 20160223
BitDefender Gen:Variant.Kazy.172419 20160224
CAT-QuickHeal Worm.Cridex.rb 20160224
CMC Trojan.Win32.Obfuscated.2!O 20160223
Comodo TrojWare.Win32.Trojan.Agent.Gen 20160224
Cyren W32/Zbot.JC.gen!Eldorado 20160224
DrWeb Trojan.Necurs.97 20160224
ESET-NOD32 a variant of Win32/Kryptik.BAZP 20160224
Emsisoft Gen:Variant.Kazy.172419 (B) 20160224
F-Prot W32/Zbot.JC.gen!Eldorado 20160224
F-Secure Gen:Variant.Kazy.172419 20160224
GData Gen:Variant.Kazy.172419 20160224
Ikarus Worm.Win32.Cridex 20160224
K7AntiVirus Riskware ( 0040eff71 ) 20160224
K7GW Riskware ( 0040eff71 ) 20160224
Kaspersky Trojan.Win32.Bublik.auyd 20160224
Malwarebytes Spyware.Zbot.ED 20160224
McAfee PWS-Zbot-FATG!330AD00466BD 20160224
McAfee-GW-Edition BehavesLike.Win32.Downloader.dt 20160224
eScan Gen:Variant.Kazy.172419 20160224
Microsoft Worm:Win32/Cridex.E 20160224
NANO-Antivirus Trojan.Win32.Bublik.csfbse 20160224
Panda Trj/Genetic.gen 20160223
Qihoo-360 Win32/Trojan.688 20160224
Rising PE:Malware.XPACK!1.9C22 [F] 20160224
Sophos Troj/Zbot-FCO 20160224
Symantec Trojan.Zbot 20160223
Tencent Win32.Trojan.Bublik.Lfzu 20160224
TrendMicro WORM_CRIDEX.RD 20160224
TrendMicro-HouseCall WORM_CRIDEX.RD 20160224
VBA32 SScope.Malware-Cryptor.Hlux 20160223
VIPRE Trojan.Win32.ZAccess.n (v) 20160224
ViRobot Trojan.Win32.A.Bublik.296448[h] 20160224
Zillya Trojan.Bublik.Win32.11210 20160223
Alibaba 20160224
Bkav 20160223
ByteHero 20160224
ClamAV 20160224
Fortinet 20160224
Jiangmin 20160224
SUPERAntiSpyware 20160224
TheHacker 20160222
TotalDefense 20160223
Zoner 20160224
nProtect 20160223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© ?????????? ??????????. ??? ????? ????????.

Product ???????????? ??????? Microsoft® Windows®
Original name sndrec32.exe
Internal name soundrec.exe
File version 5.1.2600.5512 (xpsp.080413-0845)
Description ???????????
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-05-07 07:28:20
Entry Point 0x00036E30
Number of sections 11
PE sections
PE imports
OpenEncryptedFileRawW
RegOpenKeyExW
CreateFileW
GetWindowsDirectoryW
ReadFile
ExitProcess
GetStartupInfoW
LoadLibraryA
GetProcAddress
LoadIconW
LoadIconA
_purecall
__p__fmode
malloc
_putenv
__wgetmainargs
_ftol
_wfopen
_wcsnicmp
__dllonexit
_open_osfhandle
_snwprintf
fread
_wcsicmp
wcsrchr
_wcsupr
fflush
_onexit
_vsnwprintf
_cexit
wcslen
_c_exit
wcscpy
clearerr
wcscmp
_errno
_tzset
fseek
_mbslen
_getpid
_wcsdup
mktime
ftell
isalpha
exit
_XcptFilter
realloc
wcsncat
_filelength
_local_unwind2
_adjust_fdiv
_wcmdln
__CxxFrameHandler
_mbscpy
_CxxThrowException
wcspbrk
_fdopen
wcstok
fclose
__p__commode
__setusermatherr
_wcsrev
free
wcscat
wcsncmp
_except_handler3
calloc
_controlfp
wprintf
_wcslwr
wcsncpy
memmove
localtime
swscanf
isspace
wcschr
swprintf
time
fwrite
wcsstr
_initterm
_exit
_wtoi
__set_app_type
Number of PE resources by type
RT_ICON 15
RT_STRING 9
RT_DIALOG 4
RT_GROUP_ICON 4
RT_RCDATA 2
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 35
ENGLISH US 3
GERMAN SWISS 1
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
86528

EntryPoint
0x36e30

OriginalFileName
sndrec32.exe

MIMEType
application/octet-stream

LegalCopyright
. .

FileVersion
5.1.2600.5512 (xpsp.080413-0845)

TimeStamp
2013:05:07 08:28:20+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
soundrec.exe

ProductVersion
5.1.2600.5512

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
208896

ProductName
Microsoft Windows

ProductVersionNumber
5.1.2600.5512

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 330ad00466bd44a5fb2786f0f5e2d0da
SHA1 c86324d9ad20731e34d1c1be5631a6dfe544f328
SHA256 150872022d30ede70f0d959b671281d44b55883a229e07dd0bdcf33a0a827274
ssdeep
6144:X4p93q+aP+MWChp8Nnt32dHEwJMqzU3b:XUDspWBL32+wJtq

authentihash e8e5d95d88e73b5e32d31f7223ebd107472a5c15c2e12cbf6fb589a0cfcc817b
imphash b882e34f1a027824a4c2aa420665e203
File size 289.5 KB ( 296448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-07 22:38:59 UTC ( 2 years, 12 months ago )
Last submission 2013-05-09 06:40:27 UTC ( 2 years, 12 months ago )
File names 1867988.exe
sndrec32.exe
330ad00466bd44a5fb2786f0f5e2d0da.exe
KB00240793.vir
soundrec.exe
KB00678383.exe
readme.exe
info.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications