× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4e39bd58201c28e1923b5c597db7490f2b18408185f0220953b289f886e23bdb
File name: bot.exe
Detection ratio: 9 / 55
Analysis date: 2015-11-09 09:06:34 UTC ( 2 years, 7 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Kazy.763604 20151109
ALYac Gen:Variant.Kazy.763604 20151109
Arcabit Trojan.Kazy.DBA6D4 20151109
BitDefender Gen:Variant.Kazy.763604 20151109
Cyren W32/Agent.XL.gen!Eldorado 20151109
Emsisoft Gen:Variant.Kazy.763604 (B) 20151109
F-Prot W32/Agent.XL.gen!Eldorado 20151109
GData Gen:Variant.Kazy.763604 20151109
Qihoo-360 QVM10.1.Malware.Gen 20151109
AegisLab 20151109
Yandex 20151108
AhnLab-V3 20151108
Alibaba 20151109
Antiy-AVL 20151109
Avast 20151109
AVG 20151109
Avira (no cloud) 20151109
AVware 20151109
Baidu-International 20151108
Bkav 20151107
ByteHero 20151109
CAT-QuickHeal 20151109
ClamAV 20151109
CMC 20151109
Comodo 20151109
DrWeb 20151109
ESET-NOD32 20151109
F-Secure 20151106
Fortinet 20151109
Ikarus 20151109
Jiangmin 20151108
K7AntiVirus 20151109
K7GW 20151109
Kaspersky 20151109
Malwarebytes 20151109
McAfee 20151109
McAfee-GW-Edition 20151109
Microsoft 20151109
NANO-Antivirus 20151109
nProtect 20151106
Panda 20151108
Rising 20151108
Sophos AV 20151109
SUPERAntiSpyware 20151108
Symantec 20151108
Tencent 20151109
TheHacker 20151108
TotalDefense 20151109
TrendMicro 20151109
TrendMicro-HouseCall 20151109
VBA32 20151107
VIPRE 20151109
ViRobot 20151109
Zillya 20151108
Zoner 20151109
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
©Copyright Innovasys 1997-2012. All Rights Reserved.

Product Innovasys Luminitix
Original name LuminitixTransport.exe
Internal name LuminitixTransport.exe
File version 1.0.0.0
Description Innovasys Luminitix Transport
Comments Innovasys Luminitix Transport Agent
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-11-09 09:00:09
Entry Point 0x0001C792
Number of sections 4
PE sections
Overlays
MD5 dc7322469baa8ea28094ad3fae5e2688
File type data
Offset 656384
Size 1958
Entropy 7.85
PE imports
RegCreateKeyExW
SetThreadToken
CombineRgn
PatBlt
GdiFlush
GetMetaRgn
GetCharABCWidthsI
Rectangle
GetDeviceCaps
SetBkMode
CreateDiscardableBitmap
SetWorldTransform
GetRandomRgn
GetObjectW
BitBlt
GetICMProfileW
SetPaletteEntries
CreateEllipticRgn
SetViewportOrgEx
GetOutlineTextMetricsW
GetGraphicsMode
GetEnhMetaFileBits
GetFontUnicodeRanges
SetROP2
GetGlyphIndicesA
SetRectRgn
DeleteMetaFile
SetThreadLocale
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
GetNamedPipeInfo
SetHandleCount
GetOEMCP
QueryPerformanceCounter
HeapReAlloc
IsDebuggerPresent
HeapAlloc
TlsAlloc
ClearCommError
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetACP
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetEnvironmentStrings
GetLocaleInfoA
DecodePointer
GetCurrentProcessId
GetUserDefaultLCID
GetFileInformationByHandle
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCPInfo
GetCommandLineA
GetProcAddress
GetStringTypeA
CancelIo
LCMapStringW
CompareStringW
WideCharToMultiByte
TlsFree
GetModuleHandleA
GetSystemDirectoryW
SetDllDirectoryA
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
lstrcmpW
GetDiskFreeSpaceA
CreateThread
GetModuleHandleW
FreeResource
TerminateProcess
SizeofResource
LCMapStringA
IsValidCodePage
HeapCreate
VirtualFree
SetCommBreak
TlsGetValue
Sleep
GetFileType
GetTickCount
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetStringTypeW
SetLastError
InterlockedIncrement
SHGetFolderPathW
DragQueryFileW
DragAcceptFiles
ShellExecuteW
ExtractIconExW
CommandLineToArgvW
RedrawWindow
GetForegroundWindow
SetMenuItemBitmaps
GetGuiResources
DrawStateW
SetWindowPos
IsWindow
GrayStringW
EndPaint
WindowFromPoint
CharUpperBuffW
GetWindowWord
GetDC
GetAsyncKeyState
MapDialogRect
GetDlgCtrlID
GetMenu
GetClientRect
ToAscii
DrawTextW
GetNextDlgTabItem
GetThreadDesktop
CallNextHookEx
LoadImageW
MapVirtualKeyExW
GetKeyState
DestroyWindow
EqualRect
CreateCaret
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
CreateIconFromResourceEx
PeekMessageW
CharUpperW
TranslateMessage
IsWindowEnabled
GetIconInfo
SetClipboardData
IsZoomed
GetWindowPlacement
LoadStringW
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
GetScrollRange
OpenClipboard
IsDialogMessageW
FillRect
MonitorFromPoint
CopyRect
GetSysColorBrush
EnumDesktopWindows
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsChild
SetFocus
EmptyClipboard
BeginPaint
OffsetRect
DefWindowProcW
CopyIcon
MapVirtualKeyW
SendDlgItemMessageA
IsIconic
GetWindowRect
InflateRect
SetCapture
DrawIcon
DrawTextExW
SendDlgItemMessageW
PostMessageW
InvalidateRect
CheckDlgButton
CheckMenuItem
GetWindowLongA
GetClassLongW
GetLastActivePopup
PtInRect
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
GetClassLongA
CountClipboardFormats
PostThreadMessageW
GetMenuState
SetWindowsHookExW
GetSystemMenu
NotifyWinEvent
GetMenuStringW
GetCursorPos
CreateDialogIndirectParamW
IntersectRect
EndDialog
FindWindowW
GetCapture
RemoveMenu
GetWindowThreadProcessId
HiliteMenuItem
MessageBoxW
SendMessageW
UnhookWindowsHookEx
MoveWindow
CallWindowProcA
CascadeWindows
IsCharAlphaNumericW
SendMessageTimeoutW
RegisterClipboardFormatW
CopyImage
wvsprintfW
UpdateLayeredWindow
DestroyIcon
IsWindowVisible
WinHelpW
TileWindows
SystemParametersInfoW
UnionRect
FrameRect
SetRect
GetKeyNameTextW
GetUserObjectSecurity
CallWindowProcW
GetClassNameW
ModifyMenuW
ValidateRect
IsRectEmpty
GetFocus
CloseClipboard
SetCursor
GetFileVersionInfoSizeW
VerQueryValueA
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCloseHandle
HttpSendRequestW
InternetOpenW
HttpOpenRequestW
Number of PE resources by type
RT_BITMAP 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 2
ENGLISH US 1
PE resources
ExifTool file metadata
FileDescription
Innovasys Luminitix Transport

Comments
Innovasys Luminitix Transport Agent

InitializedDataSize
503296

ImageVersion
0.0

ProductName
Innovasys Luminitix

FileVersionNumber
1.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
LuminitixTransport.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.0

TimeStamp
2015:11:09 09:00:09+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
LuminitixTransport.exe

SubsystemVersion
5.0

ProductVersion
1.0.0.0

UninitializedDataSize
0

OSVersion
5.0

FileOS
Win32

LegalCopyright
Copyright Innovasys 1997-2012. All Rights Reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Innovasys

CodeSize
152064

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x1c792

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 7dd81b268585c596ed83a38f696a7d4f
SHA1 519b27f05c8e1a8adf3babab4cc08a25c3213ca6
SHA256 4e39bd58201c28e1923b5c597db7490f2b18408185f0220953b289f886e23bdb
ssdeep
12288:3mFKlR4XP918q6Xrret6HbkNFEuRUeb8O1EGSYT79AihA8y/Ix:3mFGmXP918q6XrrPbuzRUeac9AqM6

authentihash 6d1ee43caf991bc3f5633ec739b5cf6c4cac344e4c6378d0667df0e691c0a6fa
imphash 4eba41d786608c494e101d5e95251d31
File size 642.9 KB ( 658342 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-11-09 09:06:34 UTC ( 2 years, 7 months ago )
Last submission 2015-11-09 09:06:34 UTC ( 2 years, 7 months ago )
File names LuminitixTransport.exe
bot.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Created mutexes
Opened mutexes
Runtime DLLs