× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 22971181ff576a512b7b0bfc8343bb28ba2f5c970b0cffea776d9bbda0fa7f73
File name: 8ada8e19929b27c07a15b99e3ac86851836fe1cb
Detection ratio: 27 / 51
Analysis date: 2014-06-07 11:00:40 UTC ( 4 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.1706683 20140607
AntiVir TR/Crypt.ZPACK.68718 20140607
Avast Win32:Malware-gen 20140607
AVG Pakes_c.BXMG 20140607
Baidu-International Trojan.Win32.Zbot.bYW 20140607
BitDefender Trojan.GenericKD.1706683 20140607
Bkav HW32.Laneul.ayoe 20140606
ByteHero Trojan.Malware.Obscu.Gen.004 20140607
Emsisoft Trojan.GenericKD.1706683 (B) 20140607
ESET-NOD32 Win32/Spy.Zbot.YW 20140607
F-Secure Trojan.GenericKD.1706683 20140607
Fortinet W32/Kryptik.CBVT!tr 20140607
GData Trojan.GenericKD.1706683 20140607
Kaspersky Trojan-Spy.Win32.Zbot.teea 20140607
Malwarebytes Spyware.Zbot.VXGen 20140607
McAfee Artemis!A76C63683FCB 20140607
McAfee-GW-Edition Artemis!A76C63683FCB 20140606
eScan Trojan.GenericKD.1706683 20140607
Norman Suspicious_Gen4.GKUMR 20140607
Panda Trj/OCJ.F 20140607
Qihoo-360 HEUR/Malware.QVM20.Gen 20140607
Rising PE:Malware.XPACK-LNR/Heur!1.5594 20140606
Sophos AV Mal/Generic-S 20140607
Symantec WS.Reputation.1 20140607
Tencent Win32.Trojan-spy.Zbot.Lmkq 20140607
TrendMicro-HouseCall TROJ_GEN.F47V0605 20140607
VIPRE Trojan.Win32.Generic!BT 20140607
AegisLab 20140607
Yandex 20140606
AhnLab-V3 20140607
Antiy-AVL 20140607
CAT-QuickHeal 20140607
ClamAV 20140607
CMC 20140606
Commtouch 20140607
Comodo 20140607
DrWeb 20140607
F-Prot 20140607
Ikarus 20140607
K7AntiVirus 20140606
K7GW 20140606
Kingsoft 20140607
Microsoft 20140607
NANO-Antivirus 20140607
nProtect 20140605
SUPERAntiSpyware 20140607
TheHacker 20140606
TotalDefense 20140607
TrendMicro 20140607
VBA32 20140607
ViRobot 20140607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 1989 - 2012

Product pjn124
Original name YWR37u30Fyu.exe
Internal name YWR37u30Fyu.exe
File version 3.9.3.3
Description iMS545F
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-06-05 13:03:18
Entry Point 0x00008EB0
Number of sections 4
PE sections
PE imports
RegUnLoadKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegUnLoadKeyW
SetBkColor
SetBkMode
SetTextColor
LocalReAlloc
GlobalFree
WaitForSingleObject
SetEvent
IsDebuggerPresent
GlobalUnlock
LoadLibraryA
lstrlenW
GlobalSize
GetStartupInfoA
LocalAlloc
GetCommandLineW
CreateThread
UnhandledExceptionFilter
lstrcatW
WriteProfileStringW
lstrcpynW
GetProfileStringW
lstrcpyW
GlobalReAlloc
GetModuleHandleA
SetUnhandledExceptionFilter
GetCurrentProcess
ResetEvent
IsProcessorFeaturePresent
lstrcmpW
GlobalLock
GetProcAddress
IsBadStringPtrW
LocalFree
GetProfileIntW
TerminateProcess
CreateEventW
GlobalCompact
GlobalAlloc
Sleep
CloseHandle
ShellAboutW
MapWindowPoints
TrackPopupMenuEx
UpdateWindow
EndDialog
PostQuitMessage
HideCaret
OffsetRect
SetFocus
CheckRadioButton
GetProcessDefaultLayout
DestroyMenu
RegisterClassExW
SetProcessDefaultLayout
ShowWindow
MessageBeep
LoadMenuW
GetClipboardData
GetSysColorBrush
SetCursor
SetWindowLongW
MessageBoxW
GetMenu
GetWindowRect
EnableWindow
SetMenu
DialogBoxParamW
SetDlgItemInt
ChildWindowFromPoint
SetWindowPos
TranslateMessage
GetSysColor
CheckMenuRadioItem
CheckDlgButton
DispatchMessageW
CreateDialogParamW
GetDlgCtrlID
CheckMenuItem
SendMessageW
TranslateAcceleratorW
GetMessageW
WinHelpW
LoadStringW
SetWindowTextW
GetDlgItem
DefWindowProcW
SystemParametersInfoW
DrawTextW
EnableMenuItem
ScreenToClient
InvalidateRect
GetSubMenu
IsClipboardFormatAvailable
CharNextW
CallWindowProcW
IsDialogMessageW
CharNextA
GetWindowTextW
SetDlgItemTextW
GetDesktopWindow
LoadCursorW
LoadIconW
CreateWindowExW
LoadAcceleratorsW
GetWindowLongW
CloseClipboard
GetClientRect
DestroyWindow
IsChild
OpenClipboard
MapAndLoad
Number of PE resources by type
RT_ACCELERATOR 3
ACTKR7SPH 1
RT_DIALOG 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 6
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2014:06:05 14:03:18+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
286720

LinkerVersion
10.0

FileTypeExtension
exe

InitializedDataSize
1334272

SubsystemVersion
5.1

EntryPoint
0x8eb0

OSVersion
5.1

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 a76c63683fcbd1bc2fb1b5ea99307c94
SHA1 6b670755f20deec22450919aec8000617024ecf2
SHA256 22971181ff576a512b7b0bfc8343bb28ba2f5c970b0cffea776d9bbda0fa7f73
ssdeep
12288:8rjHKbeGMQISMcjTlJNVOMCOTi2wgJknmQNBUJx2dS4J94:8rrKiGMQ7McjZJWjOTi2hQNw3

authentihash cf5881869e10975cf4ce978557e6251eb103323f9bc2c3e537b44fb7ba5fb16c
imphash be4e488915663294d45ebaf980510ae4
File size 406.5 KB ( 416256 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2014-06-05 13:47:52 UTC ( 4 years, 9 months ago )
Last submission 2016-12-24 11:40:47 UTC ( 2 years, 2 months ago )
File names sdferferf.exe
YWR37u30Fyu.exe
egrgsr.exe
dURwhyc.dotx
egrgsr.exe
8ada8e19929b27c07a15b99e3ac86851836fe1cb
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications