× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2f7210a1359cb31053e09c241a8b0d24cf5047ad118678a6f1ea5b17205a6c6a
File name: 0oi545gfgf.exe
Detection ratio: 5 / 51
Analysis date: 2016-02-02 10:10:13 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
K7GW Trojan ( 700001211 ) 20160202
Kaspersky UDS:DangerousObject.Multi.Generic 20160202
McAfee Artemis!86EE4E066471 20160202
McAfee-GW-Edition BehavesLike.Win32.Suspect.ch 20160202
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20160202
Ad-Aware 20160202
AegisLab 20160202
Yandex 20160202
AhnLab-V3 20160201
Alibaba 20160202
ALYac 20160202
Antiy-AVL 20160202
Arcabit 20160202
Avast 20160202
AVG 20160202
Avira (no cloud) 20160201
Baidu-International 20160202
BitDefender 20160202
Bkav 20160201
ByteHero 20160202
CAT-QuickHeal 20160202
ClamAV 20160202
Comodo 20160202
Cyren 20160202
DrWeb 20160202
Emsisoft 20160202
ESET-NOD32 20160202
F-Prot 20160129
Fortinet 20160202
GData 20160202
Ikarus 20160202
Jiangmin 20160202
K7AntiVirus 20160202
Malwarebytes 20160201
Microsoft 20160202
eScan 20160202
NANO-Antivirus 20160202
nProtect 20160201
Panda 20160201
Rising 20160202
Sophos AV 20160202
SUPERAntiSpyware 20160201
Symantec 20160201
TheHacker 20160130
TrendMicro 20160202
TrendMicro-HouseCall 20160202
VBA32 20160201
VIPRE 20160202
ViRobot 20160202
Zillya 20160201
Zoner 20160202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name firewall.cpl
Internal name firewall.cpl
File version 5.1.2600.5512 (xpsp.080413-0852)
Description Windows Firewall Control Panel
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1970-01-01 01:08:16
Entry Point 0x00028D30
Number of sections 18
PE sections
PE imports
SetBkColor
CreateFiberEx
FileTimeToDosDateTime
ScrollConsoleScreenBufferA
EnumUILanguagesW
lstrcmpW
GetPrivateProfileStructW
DeleteCriticalSection
MapViewOfFileEx
LoadLibraryExW
IsProcessInJob
GetThreadContext
FindNextVolumeMountPointA
lstrcmpiA
SetComputerNameW
InterlockedExchange
HeapLock
GlobalMemoryStatusEx
HeapReAlloc
MoveFileA
TransmitCommChar
SetLocaleInfoA
GetStringTypeExW
AllocConsole
GetFullPathNameW
TlsAlloc
GetUserDefaultLangID
CopyFileA
FatalExit
FoldStringA
HeapSetInformation
EnumCalendarInfoA
GetPriorityClass
SetFileShortNameW
CreateActCtxA
GetVolumeInformationW
OpenWaitableTimerW
MultiByteToWideChar
EnumCalendarInfoW
GetFirmwareEnvironmentVariableA
GetVolumeNameForVolumeMountPointW
EnumSystemLanguageGroupsW
SetThreadIdealProcessor
SetHandleInformation
GlobalAddAtomA
AllocateUserPhysicalPages
GetProcessShutdownParameters
SetCurrentDirectoryW
GlobalAlloc
SearchPathA
CreateToolhelp32Snapshot
lstrcpynA
LoadLibraryW
CallNamedPipeA
GlobalUnfix
Process32First
SetVolumeMountPointA
SetFileValidData
SetCommMask
GetStartupInfoW
ProcessIdToSessionId
CreateDirectoryW
GetUserDefaultLCID
SetSystemTimeAdjustment
WriteFileGather
GlobalWire
FindFirstFileA
lstrcpyA
CreateMemoryResourceNotification
FreeConsole
DuplicateHandle
FindFirstFileExW
GetProcAddress
EscapeCommFunction
SetVolumeLabelW
WriteConsoleOutputCharacterW
GetConsoleWindow
GetCurrencyFormatW
InterlockedIncrement
UnmapViewOfFile
CreateNamedPipeW
CreateNamedPipeA
WinExec
Module32FirstW
ContinueDebugEvent
GetCommandLineW
MapUserPhysicalPages
CopyFileExW
WriteTapemark
QueryPerformanceFrequency
ReleaseSemaphore
VirtualUnlock
WriteFileEx
CloseHandle
EnumResourceTypesW
GetACP
LoadLibraryExA
CreateProcessA
GetProcessHandleCount
HeapCreate
OpenSemaphoreA
LocalHandle
SetMailslotInfo
OpenEventA
DnsHostnameToComputerNameA
MprConfigInterfaceTransportAdd
MprAdminUserSetInfo
SafeArraySetRecordInfo
VarR4CmpR8
SHInvokePrinterCommandA
DragQueryFileA
DrawFocusRect
wsprintfA
EnumDisplayDevicesW
FindWindowW
IsCharUpperW
TabbedTextOutW
wsprintfW
GetProcessWindowStation
GetThreadDesktop
PtInRect
_lock
_unlock
strxfrm
fgetwc
_onexit
__dllonexit
vfwprintf
is_wctype
swscanf
putc
rewind
setbuf
sscanf
tolower
qsort
wcscspn
isxdigit
iscntrl
iswxdigit
isprint
isgraph
wcsncmp
iswalpha
VerSetConditionMask
PdhGetRawCounterValue
PdhRemoveCounter
PdhCollectQueryData
URLOpenBlockingStreamA
CreateAsyncBindCtx
CreateURLMonikerEx
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
4.17

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
6656

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
42752

EntryPoint
0x28d30

OriginalFileName
firewall.cpl

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
5.1.2600.5512 (xpsp.080413-0852)

TimeStamp
1970:01:01 02:08:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
firewall.cpl

ProductVersion
5.1.2600.5512

FileDescription
Windows Firewall Control Panel

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
62976

ProductName
Microsoft Windows Operating System

ProductVersionNumber
5.1.2600.5512

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 86ee4e0664714aab881e25ec6be861e1
SHA1 b9b9bd8e361b5c668f10a19fcd7b22b742d113eb
SHA256 2f7210a1359cb31053e09c241a8b0d24cf5047ad118678a6f1ea5b17205a6c6a
ssdeep
3072:e6B5xdJp2GLxlFol0KoLn+DYpxpzu4Vs2Egl:ewTPLVRKy+DYfVu4Vse

authentihash 77a4dea7eee3250c075fab91eccf56e4eec8e843bce71f5c15ce2f2cf2953e43
imphash 4e3fe15b5de1736120336b66e62cb73d
File size 167.0 KB ( 171008 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-02 08:41:45 UTC ( 3 years, 1 month ago )
Last submission 2016-12-16 23:04:40 UTC ( 2 years, 3 months ago )
File names firewall.cpl
0oi545gfgf.exe
0oi545gfgf.exe
0oi545gfgf.exe
0oi545gfgf.exe
0oi545gfgf.exe.malware
86ee4e0664714aab881e25ec6be861e1.exe
0oi545gfgf.exe
Kryptik.A1.exe
0oi545gfgf_exe
69.dll
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications