× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4547355772d1eeff2b9cb6c8d3e8a3defb02fe9c16a278e625bc02451a49d81d
File name: 8AF535B0682EBF67D4BE04FB229491004DBB4862.exe
Detection ratio: 1 / 43
Analysis date: 2011-03-25 23:10:46 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
Panda Suspicious file 20110325
AVG 20110325
AhnLab-V3 20110325
AntiVir 20110325
Antiy-AVL 20110325
Avast 20110325
Avast5 20110325
BitDefender 20110325
CAT-QuickHeal 20110325
ClamAV 20110325
Commtouch 20110324
Comodo 20110325
DrWeb 20110325
Emsisoft 20110325
F-Prot 20110325
F-Secure 20110323
Fortinet 20110325
GData 20110325
Ikarus 20110325
Jiangmin 20110325
K7AntiVirus 20110325
Kaspersky 20110325
McAfee 20110325
McAfee-GW-Edition 20110325
Microsoft 20110325
NOD32 20110325
Norman 20110324
PCTools 20110325
Prevx 20110326
Rising 20110325
SUPERAntiSpyware 20110325
Sophos 20110325
Symantec 20110325
TheHacker 20110325
TrendMicro 20110325
TrendMicro-HouseCall 20110325
VBA32 20110325
VIPRE 20110325
ViRobot 20110325
VirusBuster 20110325
eSafe 20110324
eTrust-Vet 20110325
nProtect 20110215
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Signature verification The digital signature of the object did not verify.
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-12-06 08:07:21
Link date 9:07 AM 12/6/2005
Entry Point 0x0014D6B0
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 2
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2005:12:06 09:07:21+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
311296

LinkerVersion
5.12

FileAccessDate
2014:05:28 02:59:00+01:00

EntryPoint
0x14d6b0

InitializedDataSize
4096

SubsystemVersion
4.0

ImageVersion
4.0

OSVersion
4.0

FileCreateDate
2014:05:28 02:59:00+01:00

UninitializedDataSize
1052672

File identification
MD5 4d233e3d26c1215e6821371a83db605c
SHA1 ce519d9cb4f4636ac5d1b6e42b577a5f864d022b
SHA256 4547355772d1eeff2b9cb6c8d3e8a3defb02fe9c16a278e625bc02451a49d81d
ssdeep
6144:29BxSmoKxEqklsiq0IEiJAt2lf1WXUrWIVX3ChOIwQA5MFkvZ5LY:2RoIb0si+EEAt2lf1WX4xMAacnbY

imphash d8ffd01375769ab5ef057d6a238f55de
File size 309.1 KB ( 316520 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2011-03-25 23:10:46 UTC ( 3 years, 3 months ago )
Last submission 2012-10-03 06:28:49 UTC ( 1 year, 9 months ago )
File names 8AF535B0682EBF67D4BE04FB229491004DBB4862.exe
4d233e3d26c1215e6821371a83db605c.exe
4d233e3d26c1215e6821371a83db605c
sTou35.exe
zeusbin_4d233e3d26c1215e6821371a83db605c.ex0
readme.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
DNS requests