× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1687feca55140ef92cc3ce20b0448d3f927e702405540162eae02a84a026d010
File name: OfficeMS.exe
Detection ratio: 4 / 55
Analysis date: 2016-02-26 13:51:02 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
Avast Win32:Malware-gen 20160226
ByteHero Trojan.Win32.Heur.098 20160226
Kaspersky UDS:DangerousObject.Multi.Generic 20160226
Rising PE:Malware.XPACK-LNR/Heur!1.5594 [F] 20160225
Ad-Aware 20160226
AegisLab 20160226
Yandex 20160226
AhnLab-V3 20160226
Alibaba 20160226
ALYac 20160226
Antiy-AVL 20160226
Arcabit 20160226
AVG 20160226
Avira (no cloud) 20160226
AVware 20160226
Baidu-International 20160226
BitDefender 20160226
Bkav 20160226
CAT-QuickHeal 20160225
ClamAV 20160226
CMC 20160225
Comodo 20160226
Cyren 20160226
DrWeb 20160226
Emsisoft 20160226
ESET-NOD32 20160226
F-Prot 20160226
F-Secure 20160226
Fortinet 20160226
GData 20160226
Ikarus 20160226
Jiangmin 20160226
K7AntiVirus 20160226
K7GW 20160226
Malwarebytes 20160226
McAfee 20160226
McAfee-GW-Edition 20160226
Microsoft 20160226
eScan 20160226
NANO-Antivirus 20160226
nProtect 20160226
Panda 20160225
Qihoo-360 20160226
Sophos AV 20160226
SUPERAntiSpyware 20160226
Symantec 20160226
Tencent 20160226
TheHacker 20160225
TrendMicro 20160226
TrendMicro-HouseCall 20160226
VBA32 20160226
VIPRE 20160226
ViRobot 20160226
Zillya 20160226
Zoner 20160226
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
© ?????????? ??????????. ??? ????? ????????.

Product ???????????? ??????? Microsoft® Windows®
Original name tracert.exe
Internal name tracert.exe
File version 5.1.2600.5512 (xpsp.080413-0852)
Description ??????? ??????????? ????????? TCP/IP
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-02-26 09:53:51
Entry Point 0x00001055
Number of sections 9
PE sections
PE imports
VerLanguageNameA
GetCurrentProcess
FreeConsole
GetDriveTypeW
GetFileAttributesExW
SetSystemPowerState
CreateTimerQueueTimer
CreateTimerQueue
GetThreadContext
SetCommTimeouts
AnimateWindow
isdigit
towupper
_chkstk
sin
Number of PE resources by type
RT_MESSAGETABLE 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 2
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
101376

EntryPoint
0x1055

OriginalFileName
tracert.exe

MIMEType
application/octet-stream

LegalCopyright
. .

FileVersion
5.1.2600.5512 (xpsp.080413-0852)

TimeStamp
2016:02:26 10:53:51+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
tracert.exe

ProductVersion
5.1.2600.5512

FileDescription
TCP/IP

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CodeSize
48640

ProductName
Microsoft Windows

ProductVersionNumber
5.1.2600.5512

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 995d881c396c844669481fc824d8d942
SHA1 b69ffa5f4499479457bd6cab583c7a9dc7524f4d
SHA256 1687feca55140ef92cc3ce20b0448d3f927e702405540162eae02a84a026d010
ssdeep
3072:N0lAoaQ4CPrmwoIr/1AS7eM7KKWf4gvYn:qlAN9Ir/1AoDpWf5vY

authentihash 50fd15903c0a7b04f4c96163df64896d22f9d4eab92163a3856c01a807cb25fd
imphash d0b5615dd60b00e19c1690ac0a6cc5a2
File size 142.0 KB ( 145408 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-26 10:13:20 UTC ( 2 years, 11 months ago )
Last submission 2016-02-29 11:48:12 UTC ( 2 years, 11 months ago )
File names tracert.exe
OfficeMS.exe
I3BJLBD54175.SCR
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications