× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 260cc9d7656ee67ac8855c9565b993051e3012fd9e2f49a6033e26298af304b9
Detection ratio: 11 / 40
Analysis date: 2010-04-25 18:27:56 UTC ( 8 years, 1 month ago )
Antivirus Result Update
Avast Win32:Trojan-gen 20100425
Avast5 Win32:Trojan-gen 20100425
AVG Dropper.Generic2.CBW 20100425
DrWeb Trojan.DownLoad1.54810 20100425
eTrust-Vet Win32/DfInject.HX 20100424
GData Win32:Trojan-gen 20100425
Kaspersky Trojan-Downloader.Win32.Agent.dmbv 20100425
Microsoft VirTool:Win32/DelfInject.gen!BI 20100425
NOD32 Win32/Boberog.AS 20100425
Symantec W32.Pilleuz!gen2 20100425
ViRobot Trojan.Win32.DelfInject.30720 20100425
a-squared 20100425
AhnLab-V3 20100424
AntiVir 20100423
Antiy-AVL 20100423
Authentium 20100425
BitDefender 20100425
CAT-QuickHeal 20100423
ClamAV 20100425
Comodo 20100425
eSafe 20100425
F-Prot 20100425
F-Secure 20100425
Fortinet 20100425
Ikarus 20100425
Jiangmin 20100425
McAfee 20100425
McAfee-GW-Edition 20100423
Norman 20100425
nProtect 20100425
Panda 20100424
PCTools 20100425
Prevx 20100425
Rising 20100425
Sophos AV 20100425
Sunbelt 20100425
TheHacker 20100425
TrendMicro 20100425
VBA32 20100423
VirusBuster 20100424
The file being studied is a Portable Executable file! More specifically, it is a unknown file.
PE header basic information
Number of sections 8
PE sections
PE imports
MoveToEx
GetTextFaceW
GetTextAlign
CreateCompatibleDC
ColorMatchToTarget
CancelDC
AbortPath
GetCurrentThreadId
ExitProcess
RtlUnwind
RaiseException
GetCommandLineA
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
UnlockFile
TlsAlloc
Sleep
SetFilePointer
ReadFile
LockFile
LoadLibraryExA
IsBadHugeReadPtr
GetTickCount
FreeResource
FreeEnvironmentStringsA
FlushConsoleInputBuffer
DisconnectNamedPipe
DisableThreadLibraryCalls
CreateFileW
CreateFileA
CreateFiber
CloseHandle
SysFreeString
SysReAllocStringLen
CharNextA
mouse_event
keybd_event
AnimateWindow
ShowWindow
SetWindowTextW
MessageBoxA
GetClassNameA
ExcludeUpdateRgn
EnumPropsA
EndMenu
EmptyClipboard
DestroyMenu
AttachThreadInput
ArrangeIconicWindows
timeKillEvent
timeGetSystemTime
timeBeginPeriod
SendDriverMessage
mixerGetDevCapsA
midiStreamRestart
midiStreamPosition
midiOutPrepareHeader
midiOutOpen
midiOutGetNumDevs
midiOutGetID
midiOutGetErrorTextW
midiOutGetDevCapsW
midiOutGetDevCapsA
midiOutClose
midiInUnprepareHeader
midiInOpen
midiInGetNumDevs
midiInGetDevCapsA
midiInAddBuffer
midiDisconnect
File identification
MD5 f8c51cfb26d0d73361a6c1305378a0aa
SHA1 da8b3bb38216b839ad8acefa57839e22d8d46224
SHA256 260cc9d7656ee67ac8855c9565b993051e3012fd9e2f49a6033e26298af304b9
ssdeep
1536:bh4S9dntRKh9TZ/HV1nZLW1AVcA6oPo+I:bhDdtoDtnnGSc/qot

File size 68.0 KB ( 69632 bytes )
File type unknown
Magic literal

TrID Win32 Executable Generic (38.4%)
Win32 Dynamic Link Library (generic) (34.1%)
Win16/32 Executable Delphi generic (9.3%)
Generic Win/DOS Executable (9.0%)
DOS Executable Generic (9.0%)
VirusTotal metadata
First submission 2010-04-25 18:27:56 UTC ( 8 years, 1 month ago )
Last submission 2010-04-25 18:27:56 UTC ( 8 years, 1 month ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!