× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3f134a1526c324ddd364d29a741dba61e5147e1a7cb0c2cc68c7fd7e1b464040
Detection ratio: 2 / 66
Analysis date: 2018-01-14 11:43:44 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Cylance Unsafe 20180114
TheHacker Adware/EShoper.do 20180114
Ad-Aware 20180114
AegisLab 20180114
AhnLab-V3 20180114
Alibaba 20180114
ALYac 20180114
Antiy-AVL 20180114
Arcabit 20180114
Avast 20180114
Avast-Mobile 20180114
AVG 20180114
Avira (no cloud) 20180113
AVware 20180103
Baidu 20180112
BitDefender 20180114
Bkav 20180112
CAT-QuickHeal 20180113
ClamAV 20180114
CMC 20180114
Comodo 20180114
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cyren 20180114
DrWeb 20180114
eGambit 20180114
Emsisoft 20180114
Endgame 20171130
ESET-NOD32 20180114
F-Prot 20180114
F-Secure 20180114
Fortinet 20180114
GData 20180114
Ikarus 20180114
Sophos ML 20170914
Jiangmin 20180114
K7AntiVirus 20180114
K7GW 20180112
Kaspersky 20180114
Kingsoft 20180114
Malwarebytes 20180114
MAX 20180114
McAfee 20180114
McAfee-GW-Edition 20180114
Microsoft 20180114
eScan 20180114
NANO-Antivirus 20180114
nProtect 20180114
Palo Alto Networks (Known Signatures) 20180114
Panda 20180114
Qihoo-360 20180114
Rising 20180114
SentinelOne (Static ML) 20171224
Sophos AV 20180114
SUPERAntiSpyware 20180114
Symantec 20180113
Symantec Mobile Insight 20180112
Tencent 20180114
TrendMicro 20180114
TrendMicro-HouseCall 20180114
Trustlook 20180114
VBA32 20180112
VIPRE 20180114
ViRobot 20180113
Webroot 20180114
WhiteArmor 20180110
Yandex 20180112
ZoneAlarm by Check Point 20180114
Zoner 20180114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Stalker ShOC Türkçe Paket Kurulumu
File version 2, 0, 0, 32
Packers identified
F-PROT UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-10-23 12:16:16
Entry Point 0x000310E0
Number of sections 3
PE sections
Overlays
MD5 ff232d29f297d066951802acc8ff5caf
File type data
Offset 91648
Size 13882442
Entropy 8.00
PE imports
RegCloseKey
BitBlt
LoadLibraryA
ExitProcess
GetProcAddress
DragFinish
IsIconic
VerFindFileA
GetOpenFileNameA
CoGetMalloc
Number of PE resources by type
RT_ICON 5
RT_DIALOG 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 12
PE resources
ExifTool file metadata
UninitializedDataSize
118784

InitializedDataSize
12288

ImageVersion
0.0

ProductName
Stalker ShOC T rk e Paket Kurulumu

FileVersionNumber
2.0.0.32

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

MIMEType
application/octet-stream

FileVersion
2, 0, 0, 32

TimeStamp
2008:10:23 13:16:16+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2, 0, 0, 32

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
81920

FileSubtype
0

ProductVersionNumber
2.0.0.32

EntryPoint
0x310e0

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 ae605a5844e0544e076a8a6332913962
SHA1 d98176f29f1ebb5fadf2e1746b28b1138a5c0dcf
SHA256 3f134a1526c324ddd364d29a741dba61e5147e1a7cb0c2cc68c7fd7e1b464040
ssdeep
393216:ldotoIefqi+CkSB2VLYQHrP4E9Tc33DvtwO:ldd5BkS0VLYGpKbtwO

authentihash 6e79ba3848c0d93bb629a88e64ad0e56a3312bdcceb16cf2a6b53582b9c94c4c
imphash dd643fe47127e173d2302c8f84c76bad
File size 13.3 MB ( 13974090 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2010-07-09 18:07:21 UTC ( 8 years, 7 months ago )
Last submission 2018-01-14 11:43:44 UTC ( 1 year, 1 month ago )
File names 3f134a1526c324ddd364d29a741dba61e5147e1a7cb0c2cc68c7fd7e1b464040.file
file.exe
Stalker_ShOC_Trke_Paket_0.9.89.exe
Stalker ShOC Turkce Yama.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.