× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3440b66c9c5e020389b1a4d4a2fe4ced6beffab7520641088ec9fb77ee54d668
File name: servicedesk.exe
Detection ratio: 0 / 64
Analysis date: 2019-03-12 08:46:15 UTC ( 2 months, 2 weeks ago )
Antivirus Result Update
Acronis 20190222
Ad-Aware 20190312
AegisLab 20190312
AhnLab-V3 20190312
Alibaba 20190306
ALYac 20190312
Antiy-AVL 20190312
Arcabit 20190312
Avast 20190312
Avast-Mobile 20190312
AVG 20190312
Avira (no cloud) 20190312
Babable 20180918
Baidu 20190306
BitDefender 20190312
Bkav 20190311
CAT-QuickHeal 20190311
ClamAV 20190311
CMC 20190312
Comodo 20190312
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cyren 20190312
DrWeb 20190312
eGambit 20190312
Emsisoft 20190312
Endgame 20190215
ESET-NOD32 20190312
F-Secure 20190312
Fortinet 20190312
GData 20190312
Ikarus 20190311
Sophos ML 20181128
Jiangmin 20190312
K7AntiVirus 20190312
K7GW 20190312
Kaspersky 20190312
Kingsoft 20190312
Malwarebytes 20190312
MAX 20190312
McAfee 20190312
McAfee-GW-Edition 20190312
Microsoft 20190312
eScan 20190312
NANO-Antivirus 20190312
Palo Alto Networks (Known Signatures) 20190312
Panda 20190311
Qihoo-360 20190312
Rising 20190312
SentinelOne (Static ML) 20190311
Sophos AV 20190312
SUPERAntiSpyware 20190307
Symantec Mobile Insight 20190220
TACHYON 20190312
Tencent 20190312
TheHacker 20190308
TotalDefense 20190312
Trapmine 20190301
TrendMicro-HouseCall 20190312
Trustlook 20190312
VBA32 20190311
ViRobot 20190312
Yandex 20190310
ZoneAlarm by Check Point 20190312
Zoner 20190312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-05-10 19:45:56
Entry Point 0x00003E03
Number of sections 4
PE sections
PE imports
WideCharToMultiByte
LoadLibraryW
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
FindNextFileW
GetVersionExW
FreeLibrary
FindNextFileA
FindClose
FindFirstFileA
FindFirstFileW
GetModuleFileNameA
GetProcAddress
GetModuleHandleW
__p__fmode
malloc
sscanf
setlocale
realloc
_getcwd
_wfopen
wcschr
strcat
_stricmp
swprintf
wcstol
toupper
fgets
towupper
fopen
strlen
strncpy
_except_handler3
wcslen
memset
_wgetenv
_wcsdup
wcscmp
strcpy
exit
sprintf
_strdup
__setusermatherr
wcsncpy
wcsrchr
_XcptFilter
_adjust_fdiv
strchr
_wcsicmp
fclose
__p__commode
free
getenv
__wgetmainargs
wcscat
strrchr
_wgetcwd
memcpy
_stat
strtol
swscanf
wcscpy
_exit
_wstat
__p___winitenv
_initterm
_controlfp
strcmp
fgetws
__set_app_type
CreateWindowExA
MessageBoxW
LoadIconA
SetClassLongW
MessageBoxA
LoadIconW
CreateWindowExW
SetClassLongA
Number of PE resources by type
RT_ICON 7
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:05:10 21:45:56+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

EntryPoint
0x3e03

InitializedDataSize
36864

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Compressed bundles
File identification
MD5 019afa3902b494a9698cd027c9e982c1
SHA1 41d9b1f5d19c61e7c07d7d4dfe08c460f5461e6e
SHA256 3440b66c9c5e020389b1a4d4a2fe4ced6beffab7520641088ec9fb77ee54d668
ssdeep
768:TswbG0l5gTlOMA900wReVekjjwMMLnnjjjwwwwwwwwwwwwwwwwwwwwwwwwwwwwwT:wOG0LgT3AhCeV

authentihash e91e8133d2252eae9a393394c985d67103ec1ece5f872670cdb78dec23b67c7b
imphash 04e0c5df114f88a233dc4b3deb63ffd9
File size 52.0 KB ( 53248 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (45.0%)
Microsoft Visual C++ compiled executable (generic) (26.9%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe

VirusTotal metadata
First submission 2011-05-10 17:13:01 UTC ( 8 years ago )
Last submission 2019-03-12 08:46:15 UTC ( 2 months, 2 weeks ago )
File names alt3c71.tmp
altb9e7.tmp
alt8062.tmp
altd5b7.tmp
alt6740.tmp
alt48b9.tmp
alt3f01.tmp
alt5762.tmp
alt4531.tmp
alt3c60.tmp
altdc3c.tmp
alt8cbb.tmp
alt8271.tmp
alt4f3c.tmp
alt3c5f.tmp
altd598.tmp
alt8cdc.tmp
alta876.tmp
alt94de.tmp
altb2b7.tmp
alt59e0.tmp
alt66fb.tmp
alte311.tmp
alt3c70.tmp
altb402.tmp
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.