× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4367e142bfb4dda87d6ef5d6d96bca8fddc648f58a94d87a2735880d9877e8d3
File name: vt-upload-UxKr0
Detection ratio: 19 / 55
Analysis date: 2014-09-20 08:56:56 UTC ( 2 years, 9 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Kazy.429457 20140920
AhnLab-V3 Trojan/Win32.ZBot 20140919
Avast Win32:Injector-BYA [Trj] 20140920
BitDefender Gen:Variant.Kazy.429457 20140920
Bkav HW32.Laneul.bgye 20140919
Emsisoft Gen:Variant.Kazy.429457 (B) 20140920
ESET-NOD32 a variant of Win32/Kryptik.CIKK 20140919
F-Secure Gen:Variant.Kazy.429457 20140920
Fortinet W32/Kryptik.CIKK!tr 20140920
GData Gen:Variant.Kazy.429457 20140920
Kaspersky Trojan-Spy.Win32.Zbot.udqu 20140920
Malwarebytes Trojan.FakeMS 20140920
McAfee Downloader-FAGM!E34CF93B1825 20140920
McAfee-GW-Edition BehavesLike.Win32.Virut.dc 20140920
Microsoft PWS:Win32/Zbot 20140920
eScan Gen:Variant.Kazy.429457 20140920
Rising PE:Malware.XPACK-LNR/Heur!1.5594 20140919
Sophos Mal/Generic-S 20140920
Symantec WS.Reputation.1 20140920
AegisLab 20140920
Yandex 20140919
Antiy-AVL 20140920
AVG 20140920
Avira (no cloud) 20140920
AVware 20140920
Baidu-International 20140920
ByteHero 20140920
CAT-QuickHeal 20140920
ClamAV 20140920
CMC 20140918
Comodo 20140920
Cyren 20140920
DrWeb 20140920
F-Prot 20140919
Ikarus 20140920
Jiangmin 20140919
K7AntiVirus 20140919
K7GW 20140919
Kingsoft 20140920
NANO-Antivirus 20140920
Norman 20140919
nProtect 20140919
Panda 20140919
Qihoo-360 20140920
SUPERAntiSpyware 20140920
Tencent 20140920
TheHacker 20140919
TotalDefense 20140919
TrendMicro 20140920
TrendMicro-HouseCall 20140920
VBA32 20140919
VIPRE 20140920
ViRobot 20140920
Zillya 20140919
Zoner 20140919
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
FileVersionInfo properties
Copyright
(C) Microsoft Corporation. All rights reserved.

Publisher Microsoft Corporation
Product Microsoft® Visual Studio® 2010
Original name uiwrapperres.dll
Internal name uiwrapperres.dll
File version 10.0.30319.1 built by: RTMRel
Description UI Wrapper Resource DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-08-06 15:15:53
Entry Point 0x00005CF0
Number of sections 5
PE sections
Number of PE resources by type
RT_DIALOG 12
RT_ICON 10
RT_GROUP_ICON 6
RT_GROUP_CURSOR 1
RT_MESSAGETABLE 1
RT_CURSOR 1
RT_VERSION 1
Number of PE resources by language
CHINESE TRADITIONAL 32
PE resources
File identification
MD5 e34cf93b18253cd0c6c4364fb0496cb6
SHA1 eb4cc447e99b22efca41725e443ad7e8b1b8e898
SHA256 4367e142bfb4dda87d6ef5d6d96bca8fddc648f58a94d87a2735880d9877e8d3
ssdeep
3072:Sz75bHVBMxcQWJQrPs7alamJNZhia1kSW7qS5tkgPTkzaXddfRfEUQ0TbnO/8a3m:SXJHVmiJYPlXVca/SDnPjNDEUfTYm

authentihash 97b9b8d7a4ec629156e2d342605723238a1a46063d3943a4b5fa814f706be124
imphash aacdfd454fcb21b33b09da506aa6e17a
File size 245.0 KB ( 250880 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2014-09-20 08:56:56 UTC ( 2 years, 9 months ago )
Last submission 2014-09-20 08:56:56 UTC ( 2 years, 9 months ago )
File names vt-upload-UxKr0
uiwrapperres.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.