× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3f54aaa6d2cb5c7ff3f6d41790b40de47e8f870fe96aaecec4342ab84f700def
File name: bd50b22d1caee56b5d3fbd8e7816ab88
Detection ratio: 37 / 57
Analysis date: 2016-05-19 08:13:08 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.160237 20160519
AegisLab Troj.W32.Gen.mCDY 20160518
AhnLab-V3 Spyware/Win32.Huntpos 20160519
ALYac Gen:Variant.Zusy.160237 20160519
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20160519
Arcabit Trojan.Zusy.D271ED 20160519
Avast Win32:Malware-gen 20160519
AVG Win32/DH{gVEDWwo?} 20160519
Avira (no cloud) TR/Rogue.80896.21 20160519
AVware Trojan.Win32.Generic!BT 20160518
BitDefender Gen:Variant.Zusy.160237 20160519
Bkav W32.GenericRogueO.Trojan 20160518
CAT-QuickHeal TrojanPOS.Huntpos.A5 20160518
ClamAV Win.Trojan.TreasureHunter-1 20160519
DrWeb Trojan.Fakealert.50992 20160519
Emsisoft Gen:Variant.Zusy.160237 (B) 20160519
ESET-NOD32 Win32/Agent.XAS 20160519
F-Secure Gen:Variant.Zusy.160237 20160519
Fortinet W32/Kryptik.1600!tr 20160519
GData Gen:Variant.Zusy.160237 20160519
Ikarus Trojan-Spy.POS.TreasureHunt 20160519
Jiangmin Trojan/Generic.bfrfz 20160519
K7AntiVirus Trojan ( 004bcf851 ) 20160519
K7GW Trojan ( 004bcf851 ) 20160519
Kaspersky HEUR:Trojan.Win32.Generic 20160519
Malwarebytes Trojan.Agent.ED 20160519
eScan Gen:Variant.Zusy.160237 20160519
NANO-Antivirus Trojan.Win32.Fakealert.dwrjpj 20160519
Qihoo-360 HEUR/QVM10.1.0000.Malware.Gen 20160519
Rising Malware.Generic!7gLepRrGxnV@5 (Thunder) 20160519
SUPERAntiSpyware Trojan.Agent/Gen-Malagent 20160519
TheHacker Trojan/Agent.xas 20160519
TrendMicro TSPY_HUNTPOS.SMA 20160519
TrendMicro-HouseCall TSPY_HUNTPOS.SMA 20160519
VIPRE Trojan.Win32.Generic!BT 20160519
Yandex Trojan.Agent!IJIIwRC6f7E 20160518
Zillya Trojan.FakeAV.Win32.314786 20160518
Alibaba 20160516
Baidu 20160519
Baidu-International 20160518
CMC 20160516
Comodo 20160519
Cyren 20160519
F-Prot 20160519
Kingsoft 20160519
McAfee 20160519
McAfee-GW-Edition 20160519
Microsoft 20160518
nProtect 20160518
Panda 20160518
Sophos AV 20160519
Symantec 20160519
Tencent 20160519
TotalDefense 20160519
VBA32 20160518
ViRobot 20160519
Zoner 20160519
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-10-19 07:14:39
Entry Point 0x0000523B
Number of sections 5
PE sections
PE imports
RegCloseKey
OpenProcessToken
RegSetValueExA
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
CreateToolhelp32Snapshot
DeviceIoControl
InterlockedDecrement
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
ReleaseMutex
LoadLibraryW
GetLastError
WaitForSingleObject
GetOEMCP
QueryPerformanceCounter
EncodePointer
CopyFileA
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
Process32NextW
DeleteCriticalSection
GetCurrentProcess
Module32FirstW
GetStartupInfoW
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
OpenProcess
WriteConsoleW
CreateDirectoryA
DeleteFileA
IsValidCodePage
WideCharToMultiByte
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
HeapSize
SetFilePointerEx
ReadProcessMemory
GetCPInfo
GetCommandLineA
GetProcAddress
Process32FirstW
GetProcessHeap
GetConsoleCP
SetStdHandle
CreateMutexA
InitializeCriticalSectionAndSpinCount
CreateThread
GetModuleFileNameW
TlsFree
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
WriteFile
CloseHandle
IsProcessorFeaturePresent
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
TerminateProcess
CreateProcessA
TlsGetValue
GetModuleHandleExW
InitializeCriticalSection
OutputDebugStringW
CreateFileW
VirtualQueryEx
IsDebuggerPresent
Sleep
GetFileType
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
SetLastError
LeaveCriticalSection
SHGetFolderPathA
MessageBoxA
MessageBoxW
WinHttpConnect
WinHttpSendRequest
WinHttpCloseHandle
WinHttpQueryDataAvailable
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpOpenRequest
WinHttpReadData
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2014:10:19 08:14:39+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
41472

LinkerVersion
11.0

EntryPoint
0x523b

InitializedDataSize
46080

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 bd50b22d1caee56b5d3fbd8e7816ab88
SHA1 55f39ca3b68b92e898f9f86f3de1b03d3b88f5d9
SHA256 3f54aaa6d2cb5c7ff3f6d41790b40de47e8f870fe96aaecec4342ab84f700def
ssdeep
1536:CtjtcydQPQpWARwR8xFMEcLssWjcd+Ceid3q1Hwa:CtjjuzACRaFMRz+Ceid3If

authentihash 6daf018136f8b78f1a426733b6122c244e73aab6a7205be4beac1d0ed94795ae
imphash 3e68822a115a7a54dd73bca4eb619c7d
File size 79.0 KB ( 80896 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-05-19 08:13:08 UTC ( 3 years ago )
Last submission 2017-11-29 15:53:33 UTC ( 1 year, 5 months ago )
File names visco.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections
UDP communications