× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 365e6aec879f8e186ef80aa26519aefd227fb4692140f1c35515d84e903428a5
File name: SessMgr.exe
Detection ratio: 35 / 47
Analysis date: 2013-09-13 10:45:27 UTC ( 7 months, 1 week ago )
Antivirus Result Update
Agnitum Trojan.Rodecap!5w7YcBnLy20 20130912
AhnLab-V3 Trojan/Win32.Blocker 20130912
AntiVir TR/Small.bhoumb 20130913
Antiy-AVL Trojan/Win32.Generic 20130912
Avast Win32:Rodecap-F [Trj] 20130913
Baidu-International Trojan.Win32.Generic 20130913
BitDefender Gen:Variant.Graftor.54485 20130913
CAT-QuickHeal Trojan.Small.gen 20130913
Commtouch W32/SmallDl.F.gen!Eldorado 20130913
Comodo TrojWare.Win32.Agent.AWR 20130913
DrWeb Trojan.DownLoader9.44777 20130913
ESET-NOD32 a variant of Win32/Rodecap.BB 20130913
Emsisoft Gen:Variant.Graftor.54485 (B) 20130913
F-Prot W32/SmallDl.F.gen!Eldorado 20130913
F-Secure Gen:Variant.Graftor.54485 20130913
Fortinet W32/Rodecap.BBC!tr 20130913
GData Gen:Variant.Graftor.54485 20130913
Ikarus Trojan.Win32.Small 20130913
K7AntiVirus Trojan-Downloader 20130912
Kaspersky Trojan-Ransom.Win32.Blocker.bvxm 20130913
Kingsoft Win32.Troj.Generic.a.(kcloud) 20130829
Malwarebytes Trojan.Rodecap 20130913
McAfee Downloader-FKE!A1AE35EADF75 20130913
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.H 20130913
Microsoft Trojan:Win32/Small.BH 20130913
NANO-Antivirus Trojan.Win32.Small.bxmiyg 20130913
Norman Malware.AINVX 20130913
Panda Trj/Genetic.gen 20130913
Sophos Mal/Generic-S 20130913
Symantec Downloader 20130913
TheHacker Trojan/Rodecap.bb 20130912
TrendMicro TROJ_GEN.R030C0FGH13 20130913
TrendMicro-HouseCall TROJ_RODECAP.SMO 20130913
VIPRE Trojan.Win32.Small.bhm (v) 20130913
nProtect Trojan/W32.Blocker.375808 20130913
AVG 20130913
ByteHero 20130903
ClamAV 20130913
Jiangmin 20130903
K7GW 20130912
MicroWorld-eScan 20130913
PCTools 20130913
Rising 20130913
SUPERAntiSpyware 20130913
TotalDefense 20130912
VBA32 20130912
ViRobot 20130913
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
Authenticode signature block
Copyright
? Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft? Windows? Operating System
Version 5.1.2600.5512
Original name SessMgr.exe
Internal name SessMgr.exe
File version 5.1.2600.5512
Description Microsoft? Remote Desktop Help Session Manager
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-02-05 12:04:04
Entry Point 0x00029CCB
Number of sections 5
PE sections
PE imports
LookupPrivilegeValueA
RegCloseKey
RegNotifyChangeKeyValue
AdjustTokenPrivileges
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
DnsFree
DnsQuery_A
GetStdHandle
GetConsoleOutputCP
VerifyVersionInfoA
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
IsValidLocale
SetConsoleCursorPosition
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
FormatMessageW
GetLogicalDriveStringsA
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
BeginUpdateResourceA
SetLastError
GetSystemTime
InitializeCriticalSection
CopyFileA
HeapAlloc
GetVersionExA
GetModuleFileNameA
UpdateResourceA
GetPriorityClass
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateMutexA
SetFilePointer
SetUnhandledExceptionFilter
SetPriorityClass
GlobalMemoryStatus
WriteConsoleA
GlobalAlloc
SetFirmwareEnvironmentVariableA
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
FillConsoleOutputCharacterA
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
EndUpdateResourceA
RtlUnwind
GlobalSize
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetUserDefaultLCID
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
CompareStringW
FindFirstFileA
CompareStringA
TerminateProcess
GetProcAddress
GetCurrencyFormatA
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GetShortPathNameA
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
WideCharToMultiByte
HeapSize
GetConsoleTitleA
GetCommandLineA
OpenMutexA
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetConsoleTitleA
CloseHandle
GetVolumeInformationA
GetACP
GetModuleHandleW
EnumSystemLocalesA
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
GetCursorPos
GetActiveWindow
GetCapture
GetClipboardOwner
wsprintfW
GetCaretPos
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
FtpGetFileSize
HttpSendRequestA
HttpOpenRequestA
HttpAddRequestHeadersA
InternetCloseHandle
InternetOpenA
InternetReadFile
FtpOpenFileA
InternetConnectA
HttpQueryInfoA
InternetCrackUrlA
InternetCreateUrlA
Ord(3)
Ord(23)
Ord(20)
Ord(115)
Ord(52)
Ord(9)
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
File identification
MD5 a1ae35eadf7599d2f661a9ca7f0f2150
SHA1 4c3eb3c5cf563d20c02ac4affd783f4b93449657
SHA256 365e6aec879f8e186ef80aa26519aefd227fb4692140f1c35515d84e903428a5
ssdeep
6144:TO/DVuhywMptQmZp2DyPCA02HsQ2KZj93cDDj7LAT+:a/DohTMSePCA04+KZhw/O+

File size 367.0 KB ( 375808 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2013-07-18 20:57:54 UTC ( 9 months, 1 week ago )
Last submission 2013-07-25 22:10:25 UTC ( 9 months ago )
File names vt-upload-9Hwt4
SessMgr.exe
vt-upload-DZy3X
vt-upload-FYY8q
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Moved files
Deleted files
Set keys
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications