× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3c65ca0ecea9f858423b90464b5024f268e343023952149b5d59947aa01f8e35
File name: c33c256b9f07b2adcf607e90bd417fc6.spa
Detection ratio: 14 / 52
Analysis date: 2015-12-19 21:08:18 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.2935419 20151219
Arcabit Trojan.Generic.D2CCA7B 20151219
Avast Win32:Malware-gen 20151219
Baidu-International Adware.Win32.iBryte.EIUG 20151219
BitDefender Trojan.GenericKD.2935419 20151219
Emsisoft Trojan.GenericKD.2935419 (B) 20151219
ESET-NOD32 a variant of Win32/Kryptik.EIUG 20151219
GData Trojan.GenericKD.2935419 20151219
Kaspersky Trojan-Dropper.Win32.Injector.nujo 20151219
Malwarebytes Trojan.Injector.ABE 20151219
McAfee Artemis!C33C256B9F07 20151219
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.dt 20151219
eScan Trojan.GenericKD.2935419 20151219
Panda Generic Suspicious 20151219
AegisLab 20151219
Yandex 20151219
AhnLab-V3 20151219
Alibaba 20151208
Antiy-AVL 20151219
AVG 20151219
AVware 20151219
Bkav 20151219
ByteHero 20151219
CAT-QuickHeal 20151219
ClamAV 20151219
CMC 20151217
Comodo 20151219
Cyren 20151219
DrWeb 20151219
F-Prot 20151219
F-Secure 20151218
Fortinet 20151219
Ikarus 20151219
Jiangmin 20151219
K7AntiVirus 20151219
K7GW 20151219
Microsoft 20151219
NANO-Antivirus 20151219
nProtect 20151218
Rising 20151218
Sophos AV 20151219
SUPERAntiSpyware 20151219
Symantec 20151217
TheHacker 20151219
TotalDefense 20151219
TrendMicro 20151219
TrendMicro-HouseCall 20151219
VBA32 20151218
VIPRE 20151219
ViRobot 20151219
Zillya 20151218
Zoner 20151219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-12-18 21:33:08
Entry Point 0x00038585
Number of sections 4
PE sections
PE imports
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegSetValueExW
RegQueryValueExA
RegEnumKeyExW
RegOpenKeyExW
RegDeleteValueA
RegDeleteKeyW
RegOpenKeyExA
EqualSid
RegEnumKeyExA
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
VirtualAllocEx
WaitForSingleObject
GetOEMCP
LCMapStringA
HeapDestroy
HeapAlloc
IsBadWritePtr
TlsAlloc
GetEnvironmentStringsW
GetVersionExA
LoadLibraryA
WaitForSingleObjectEx
RtlUnwind
GetModuleFileNameA
GlobalSize
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetEnvironmentStrings
LocalAlloc
SetHandleCount
WideCharToMultiByte
UnhandledExceptionFilter
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
TlsFree
GetCurrentThread
GetCPInfo
GetStringTypeA
GetModuleHandleA
InterlockedExchange
WriteFile
GetCurrentProcess
CloseHandle
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
FreeLibrary
TerminateProcess
GetVersion
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
SetLastError
LeaveCriticalSection
ReleaseCapture
DestroyWindow
SetMenuItemInfoA
SetWindowPos
SetWindowLongW
SendMessageW
SetCapture
MoveWindow
ShowWindowAsync
AdjustWindowRectEx
PostMessageW
SetActiveWindow
GetKeyState
GetCursorPos
ReleaseDC
CheckMenuItem
GetMenu
UnregisterClassA
LoadStringW
SetWindowTextW
CreateWindowExA
ClientToScreen
DrawFocusRect
SetTimer
GetClientRect
CreateWindowExW
GetMenuStringW
PtInRect
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:12:18 22:33:08+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
241664

LinkerVersion
7.1

EntryPoint
0x38585

InitializedDataSize
16384

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 c33c256b9f07b2adcf607e90bd417fc6
SHA1 c7706aa7e5a6de4534b9ce5b71ca1085ca3db738
SHA256 3c65ca0ecea9f858423b90464b5024f268e343023952149b5d59947aa01f8e35
ssdeep
6144:d5QcKivqFAlYIIi8P5XmKq6ELmdV1YfJzyU:jK8qMYWU

authentihash 46c177924b6844c7a1d38015b11ec51faf49f338daa65432ac443d5edbc2c9e0
imphash e21b8b4a896fa51d1668e5f8f256b3cf
File size 256.0 KB ( 262144 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2015-12-18 17:57:21 UTC ( 3 years, 3 months ago )
Last submission 2016-04-08 15:33:18 UTC ( 2 years, 11 months ago )
File names mocore.spa
c33c256b9f07b2adcf607e90bd417fc6.spa
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections