× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 37730a644aed8c76d8cc55bd2740c37d3ec488d3fa9b7c29aec4b52c160f0322
File name: malware.exe
Detection ratio: 4 / 57
Analysis date: 2015-03-11 11:35:43 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
McAfee Downloader-FAQD!148112DF459B 20150311
Norman Dridex.K 20150311
Qihoo-360 HEUR/QVM20.1.Malware.Gen 20150311
Rising PE:Malware.XPACK-LNR/Heur!1.5594 20150311
Ad-Aware 20150311
AegisLab 20150311
Yandex 20150310
AhnLab-V3 20150310
Alibaba 20150311
ALYac 20150311
Antiy-AVL 20150311
Avast 20150311
AVG 20150311
Avira (no cloud) 20150311
AVware 20150311
Baidu-International 20150311
BitDefender 20150311
Bkav 20150310
ByteHero 20150311
CAT-QuickHeal 20150311
ClamAV 20150311
CMC 20150304
Comodo 20150311
Cyren 20150311
DrWeb 20150311
Emsisoft 20150311
ESET-NOD32 20150311
F-Prot 20150311
F-Secure 20150311
Fortinet 20150310
GData 20150311
Ikarus 20150311
Jiangmin 20150310
K7AntiVirus 20150311
K7GW 20150311
Kaspersky 20150311
Kingsoft 20150311
Malwarebytes 20150311
McAfee-GW-Edition 20150311
Microsoft 20150311
eScan 20150311
NANO-Antivirus 20150311
nProtect 20150310
Panda 20150311
Sophos AV 20150311
SUPERAntiSpyware 20150311
Symantec 20150311
Tencent 20150311
TheHacker 20150310
TotalDefense 20150311
TrendMicro 20150311
TrendMicro-HouseCall 20150311
VBA32 20150311
VIPRE 20150311
ViRobot 20150311
Zillya 20150310
Zoner 20150311
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name WPDConns.DLL
Internal name WPDConns
File version 5.2.5721.5262 (WMP_11.090130-1421)
Description WPD Connection Objects
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1970-01-01 00:00:01
Entry Point 0x000062B0
Number of sections 8
PE sections
PE imports
GetUserDefaultUILanguage
GetLastError
EnumUILanguagesA
CreateFiberEx
FlushConsoleInputBuffer
GetNamedPipeInfo
SetCommState
GlobalGetAtomNameW
QueryPerformanceCounter
GetTimeFormatW
IsBadWritePtr
GetVolumePathNameW
FlushFileBuffers
GetModuleHandleW
VerifyVersionInfoW
GetProcessId
GetTapeParameters
DisconnectNamedPipe
EnumTimeFormatsW
Module32FirstW
WriteTapemark
DeleteFileA
QueryDosDeviceW
GetProcAddress
QueryMemoryResourceNotification
InitializeSListHead
FillConsoleOutputAttribute
EnumSystemCodePagesW
CreateMutexA
CreateHardLinkA
GetTempPathA
VirtualUnlock
GetModuleHandleA
LocalFlags
FindNextFileW
lstrcpyA
SetFirmwareEnvironmentVariableA
SetSystemPowerState
SetCommTimeouts
ClearCommError
ExitThread
ExpandEnvironmentStringsA
GetBinaryTypeA
GetProcessAffinityMask
ReadConsoleA
ConnectNamedPipe
GetModuleHandleExW
IsValidCodePage
GetDefaultCommConfigW
WriteProfileStringW
GetCurrentConsoleFont
TlsGetValue
Sleep
SetCurrentDirectoryW
AddRefActCtx
VarR8FromBool
VarCyFromI1
SHGetNewLinkInfoW
ShowOwnedPopups
MessageBoxA
rename
fputc
malloc
mbtowc
strtod
fclose
system
fsetpos
iscntrl
tmpfile
towupper
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
4.1

InitializedDataSize
54272

ImageVersion
1.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
5.2.5721.5262

UninitializedDataSize
4608

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
5.23

FileTypeExtension
exe

OriginalFileName
WPDConns.DLL

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
5.2.5721.5262 (WMP_11.090130-1421)

TimeStamp
1970:01:01 01:00:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
WPDConns

ProductVersion
5.2.5721.5262

FileDescription
WPD Connection Objects

OSVersion
4.1

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
23040

FileSubtype
0

ProductVersionNumber
5.2.5721.5262

EntryPoint
0x62b0

ObjectFileType
Dynamic link library

File identification
MD5 148112df459ba40b9127f7d4f1c08df2
SHA1 f2afc35d514ee368ca3900b1ece96a28df18551e
SHA256 37730a644aed8c76d8cc55bd2740c37d3ec488d3fa9b7c29aec4b52c160f0322
ssdeep
1536:P9cpSWDODgJ1Q/1xEN1mBAiPryZHeor45UT3xScZnajKOE:PO8W/Y1x1BA+uHlr4KxEjKL

authentihash ccae83d7f03b59d65a42d89104f6cc2c87d768d4da81579f8eb3fffec787d996
imphash c698c1b5d364ffc5cd9add699c5fcce9
File size 77.5 KB ( 79360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2015-03-11 09:53:52 UTC ( 2 years, 6 months ago )
Last submission 2016-09-05 02:27:04 UTC ( 1 year ago )
File names WPDConns.DLL
zzcasr.exe
dsfsdFFFv.cab
F2AFC35D514EE368CA3900B1ECE96A28DF18551E
60355362
malware.exe
zzcasr_exe
hNpw.vbs
WPDConns
148112df459ba40b9127f7d4f1c08df2.exe
output.60355362.txt
dsfsdfffv.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
TCP connections