× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4245a01cd9e209f8aea7e88f8ed910a0e909210f5459ddba8256f36a72093d1a
File name: .
Detection ratio: 40 / 71
Analysis date: 2019-01-11 18:22:38 UTC ( 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Application.Bundler.BUR 20190111
AhnLab-V3 PUP/Win32.Bundler.R248253 20190111
Antiy-AVL Trojan/Win32.GenKryptik 20190111
Arcabit Application.Bundler.BUR 20190111
Avast Win32:Trojan-gen 20190111
AVG Win32:Trojan-gen 20190111
BitDefender Application.Bundler.BUR 20190111
Comodo TrojWare.Win32.IcedID.PE@7z1oof 20190111
Cybereason malicious.5e2363 20190109
Cyren W32/S-bc8840cd!Eldorado 20190111
DrWeb Trojan.IcedID.15 20190111
Emsisoft Application.Bundler.BUR (B) 20190111
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNPE 20190111
F-Prot W32/S-bc8840cd!Eldorado 20190111
F-Secure Application.Bundler.BUR 20190111
Fortinet W32/GenKryptik.CTIC!tr 20190111
GData Application.Bundler.BUR 20190111
Ikarus PUA.Bundler 20190111
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.IcedID.ei 20190111
Kaspersky HEUR:Trojan.Win32.Generic 20190111
Malwarebytes Trojan.Banker 20190111
MAX malware (ai score=73) 20190111
McAfee GenericRXGQ-XP!00B4C355E236 20190111
McAfee-GW-Edition GenericRXGQ-XP!00B4C355E236 20190111
Microsoft Program:Win32/Unwaders.C!ml 20190111
eScan Application.Bundler.BUR 20190111
NANO-Antivirus Trojan.Win32.IcedID.fkxfpw 20190111
Panda Trj/GdSda.A 20190111
Rising Trojan.Kryptik!1.B520 (RDM+:cmRtazqwyPT9xVLrvL9H2jUFuoA1) 20190111
Sophos AV Troj/BokBot-D 20190111
SUPERAntiSpyware Trojan.Agent/Gen-Banker 20190109
Symantec ML.Attribute.HighConfidence 20190111
Trapmine suspicious.low.ml.score 20190103
VBA32 TrojanBanker.IcedID 20190111
Webroot W32.Trojan.Gen 20190111
Yandex Trojan.PWS.IcedID! 20190111
Zillya Trojan.Generic.Win32.396989 20190110
ZoneAlarm by Check Point HEUR:Trojan.Win32.Generic 20190111
Acronis 20190111
AegisLab 20190111
Alibaba 20180921
ALYac 20190111
Avast-Mobile 20190111
Avira (no cloud) 20190111
AVware 20180925
Babable 20180918
Baidu 20190111
Bkav 20190108
CAT-QuickHeal 20190111
CMC 20190111
CrowdStrike Falcon (ML) 20181023
Cylance 20190111
eGambit 20190111
K7AntiVirus 20190111
K7GW 20190111
Kingsoft 20190111
Palo Alto Networks (Known Signatures) 20190111
Qihoo-360 20190111
SentinelOne (Static ML) 20181223
TACHYON 20190111
Tencent 20190111
TheHacker 20190106
TotalDefense 20190111
TrendMicro 20190111
TrendMicro-HouseCall 20190111
Trustlook 20190111
VIPRE 20190111
ViRobot 20190111
Zoner 20190111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Successwall
Original name handsurprise.exe
Internal name Successwall
File version 2.2.90.41
Description Successwall
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-12-06 11:11:37
Entry Point 0x000017AC
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
OpenServiceA
RegQueryValueExA
RegCreateKeyExA
DeleteService
RegOpenKeyA
OpenProcessToken
QueryServiceStatus
RegEnumKeyA
GetTokenInformation
OpenThreadToken
RegOpenKeyExA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
SetEntriesInAclA
OpenSCManagerA
AVIFileInit
AVIStreamTimeToSample
AVIStreamFindSample
AVIFileExit
AVIStreamRelease
AVIStreamEndStreaming
GetCharWidthA
CreateBitmap
SetTextColor
GetClipBox
GetLastError
IsValidCodePage
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
GetConsoleCP
GetOEMCP
GetEnvironmentStringsW
IsDebuggerPresent
HeapAlloc
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
GetACP
GetStdHandle
HeapSetInformation
GetCurrentProcess
GetFileType
GetConsoleMode
DecodePointer
GetCurrentProcessId
WideCharToMultiByte
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetCommandLineA
GetProcAddress
EncodePointer
GetStartupInfoW
SetStdHandle
CompareStringW
GetCPInfo
LoadLibraryW
TlsFree
SetFilePointer
DeleteCriticalSection
SetSystemPowerState
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
GetSystemDirectoryA
HeapReAlloc
GetStringTypeW
GetModuleHandleW
TerminateProcess
QueryPerformanceCounter
GetEnvironmentVariableA
HeapCreate
CreateFileW
InterlockedDecrement
Sleep
SetLastError
GetTickCount
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InterlockedIncrement
SetFocus
SystemParametersInfoA
GetWindowTextLengthA
AppendMenuA
GetWindowLongA
FrameRect
SetWindowsHookExA
CallWindowProcA
GetClassInfoExA
GetFocus
GetCursorPos
ClientToScreen
RegisterClassExA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
AddPrinterConnectionA
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 12
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.2.90.41

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Successwall

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
228864

EntryPoint
0x17ac

OriginalFileName
handsurprise.exe

MIMEType
application/octet-stream

FileVersion
2.2.90.41

TimeStamp
2011:12:06 12:11:37+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Successwall

ProductVersion
2.2.90.41

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Orchestro Land

CodeSize
131072

ProductName
Successwall

ProductVersionNumber
2.2.90.41

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 00b4c355e23637601eb2cda365c900d1
SHA1 521f00c6b66e8e7d643529e2b5de08eaf4667f4c
SHA256 4245a01cd9e209f8aea7e88f8ed910a0e909210f5459ddba8256f36a72093d1a
ssdeep
3072:7QVo9UICyBrvzyWd1/utraZ3EqUVBNL2CoIeHwVyzAuOqanYu+xDshT6Q:7yoKICGvekYcZ30NKRIeHXsuOqand8Y

authentihash 6702d963a5b50c4b326b070e472c72146e2bada04b64601fca625c271cb6b396
imphash 65dd3263ab1c77d0a686b889a982ec55
File size 320.5 KB ( 328192 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-11 18:22:38 UTC ( 1 month ago )
Last submission 2019-01-11 18:22:38 UTC ( 1 month ago )
File names handsurprise.exe
Successwall
.
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.