× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4f2af74afeb261fd631bb642cf69d72b349817f8d30b4c46f19261adc024d1d0
File name: OOBEBALN.EXE
Detection ratio: 52 / 57
Analysis date: 2015-04-16 07:02:25 UTC ( 1 month, 1 week ago )
Antivirus Result Update
ALYac Trojan.Generic.KDZ.11584 20150416
AVG PSW.Generic10.CIDY 20150416
AVware Trojan.Win32.Zbot.za (v) 20150416
Ad-Aware Trojan.Generic.KDZ.11584 20150416
Agnitum Trojan.Agent!iSGW7Wnq+VQ 20150414
AhnLab-V3 Spyware/Win32.Zbot 20150416
Antiy-AVL Trojan[Spy]/Win32.Zbot 20150416
Avast Win32:Crypt-OZI [Trj] 20150416
Avira TR/Spy.ZBot.33382451 20150416
Baidu-International Trojan.Win32.Zbot.jwrq 20150415
BitDefender Trojan.Generic.KDZ.11584 20150416
Bkav HW32.Packed.675D 20150415
CAT-QuickHeal TrojanPWS.Zbot.Gen 20150416
CMC Packed.Win32.Fareit.2!O 20150413
Comodo TrojWare.Win32.Zbot.EB 20150416
Cyren W32/Backdoor.BGJP-5048 20150416
DrWeb Trojan.PWS.Panda.3734 20150416
ESET-NOD32 Win32/Spy.Zbot.AAU 20150416
Emsisoft Trojan.Generic.KDZ.11584 (B) 20150416
F-Prot W32/Backdoor2.HRVS 20150416
F-Secure Trojan.Generic.KDZ.11584 20150416
Fortinet W32/Zbot.AAU!tr 20150416
GData Trojan.Generic.KDZ.11584 20150416
Ikarus Trojan-Spy.Win32.Zbot 20150416
Jiangmin Trojan/Agent.jdlk 20150414
K7AntiVirus Riskware ( 0040eff71 ) 20150416
K7GW Riskware ( 0040eff71 ) 20150416
Kaspersky Trojan-Spy.Win32.Zbot.jwrq 20150416
Kingsoft Win32.Troj.Zbot.jw.(kcloud) 20150416
Malwarebytes Trojan.FakeMS.ED 20150416
McAfee Generic.pc 20150416
McAfee-GW-Edition Generic.pc 20150416
MicroWorld-eScan Trojan.Generic.KDZ.11584 20150416
Microsoft PWS:Win32/Zbot.gen!GO 20150416
NANO-Antivirus Trojan.Win32.PandaENT.cypvmb 20150416
Norman Kryptik.MFC 20150416
Panda Trj/Agent.IVN 20150415
Qihoo-360 Win32/Trojan.Spy.b41 20150416
Rising PE:Trojan.DL.Agent!1.67BF 20150415
SUPERAntiSpyware Trojan.Agent/Gen-Zbot 20150416
Sophos Troj/Zbot-EHY 20150416
Symantec Trojan.Zbot 20150416
Tencent Trojan.Win32.Qudamah.Gen.4 20150416
TheHacker Trojan/Kryptik.axfo 20150415
TotalDefense Win32/Zbot.HFX 20150415
TrendMicro TROJ_SPNR.14D113 20150416
TrendMicro-HouseCall TROJ_SPNR.14D113 20150416
VBA32 BScope.Malware-Cryptor.SB.01798 20150415
VIPRE Trojan.Win32.Zbot.za (v) 20150416
Zillya Trojan.Zbot.Win32.112961 20150416
Zoner Trojan.Zbot.AAU 20150416
nProtect Trojan-Spy/W32.ZBot.333824.AE 20150415
AegisLab 20150416
Alibaba 20150416
ByteHero 20150416
ClamAV 20150415
ViRobot 20150416
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© ?????????? ??????????. ??? ????? ????????.

Publisher ?????????? ??????????
Product ???????????? ??????? Microsoft® Windows®
Original name OOBEBALN.EXE
Internal name OOBEBALN.EXE
File version 5.1.2600.5512 (xpsp.080413-2111)
Description ??????????? Windows OOBE
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-21 16:20:57
Link date 5:20 PM 3/21/2013
Entry Point 0x00049DF0
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
ExitProcess
GetStartupInfoA
HeapFree
lstrcatA
FreeLibrary
lstrcpyA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
VirtualAlloc
SetCurrentDirectoryA
LoadIconW
LoadCursorA
LoadIconA
Number of PE resources by type
RT_ICON 9
RT_VERSION 1
RT_MANIFEST 1
RT_MESSAGETABLE 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 12
GERMAN SWISS 1
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
34816

OriginalFilename
OOBEBALN.EXE

MIMEType
application/octet-stream

LegalCopyright
. .

FileVersion
5.1.2600.5512 (xpsp.080413-2111)

TimeStamp
2013:03:21 17:20:57+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
OOBEBALN.EXE

ProductVersion
5.1.2600.5512

FileDescription
Windows OOBE

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
297984

ProductName
Microsoft Windows

ProductVersionNumber
5.1.2600.5512

EntryPoint
0x49df0

ObjectFileType
Executable application

File identification
MD5 87c658970958bb5794354a91f8cc5a7d
SHA1 cf82d01a8ec0ef89139e17d2d54e9a0df016edc8
SHA256 4f2af74afeb261fd631bb642cf69d72b349817f8d30b4c46f19261adc024d1d0
ssdeep
6144:bh0UgeTW9JLFVrcimSnxBmC4S8ObMWjlJPm7v3nv/x7asPZtT:bhUeTeFuDgmXS8INPA3v5ms

authentihash 5cdca646a8ac075f323aa6ca6cdcdd5ec53d386aacb7aa69f1c416b75c34ff8b
imphash 246353d1ab4aa0f49f14d416a5c2836e
File size 326.0 KB ( 333824 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-21 20:38:00 UTC ( 2 years, 2 months ago )
Last submission 2013-06-20 15:16:46 UTC ( 1 year, 11 months ago )
File names 87c658970958bb5794354a91f8cc5a7d
FYoREY1.exe
aUC1.exe
qAgs.exe
Zri.exe
ADP_w91qZ5.exe
87c658970958bb5794354a91f8cc5a7d
OOBEBALN.EXE
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.