× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4fb7fd26be5999acd6dd9e88c268fc72f4b794d5a955e4d4818e0ade097cd8f3
File name: r3d-models-pk2.exe
Detection ratio: 0 / 56
Analysis date: 2016-05-22 04:31:36 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160522
AegisLab 20160521
AhnLab-V3 20160521
Alibaba 20160520
ALYac 20160522
Antiy-AVL 20160522
Arcabit 20160522
Avast 20160522
AVG 20160522
Avira (no cloud) 20160521
AVware 20160521
Baidu 20160520
Baidu-International 20160521
BitDefender 20160522
Bkav 20160521
CAT-QuickHeal 20160521
ClamAV 20160522
CMC 20160520
Comodo 20160522
Cyren 20160522
DrWeb 20160522
Emsisoft 20160522
ESET-NOD32 20160521
F-Prot 20160522
F-Secure 20160522
Fortinet 20160522
GData 20160522
Ikarus 20160521
Jiangmin 20160522
K7AntiVirus 20160521
K7GW 20160522
Kaspersky 20160522
Kingsoft 20160522
Malwarebytes 20160522
McAfee 20160522
McAfee-GW-Edition 20160521
Microsoft 20160520
eScan 20160522
NANO-Antivirus 20160522
nProtect 20160520
Panda 20160521
Qihoo-360 20160522
Rising 20160522
Sophos AV 20160522
SUPERAntiSpyware 20160521
Symantec 20160522
Tencent 20160522
TheHacker 20160522
TrendMicro 20160522
TrendMicro-HouseCall 20160522
VBA32 20160520
VIPRE 20160522
ViRobot 20160521
Yandex 20160521
Zillya 20160521
Zoner 20160522
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, RAR, UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2001-09-07 15:52:24
Entry Point 0x000151A0
Number of sections 3
PE sections
Overlays
MD5 268c67b2e481db90715b0d8f07dc8087
File type application/x-rar
Offset 23040
Size 18692310
Entropy 8.00
PE imports
RegCloseKey
DeleteObject
LoadLibraryA
ExitProcess
GetProcAddress
SHGetMalloc
SetFocus
Number of PE resources by type
RT_DIALOG 5
RT_STRING 4
RT_ICON 3
RT_RCDATA 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 13
NEUTRAL 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2001:09:07 16:52:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
20480

LinkerVersion
5.0

FileTypeExtension
exe

InitializedDataSize
8192

SubsystemVersion
4.0

EntryPoint
0x151a0

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
65536

Compressed bundles
File identification
MD5 3416dfbe5246b548bb3925120d9698a2
SHA1 8f86ab2d64629ba489a31554af5aa1cb6616bfb8
SHA256 4fb7fd26be5999acd6dd9e88c268fc72f4b794d5a955e4d4818e0ade097cd8f3
ssdeep
393216:SABkPXuhFSp/Tqia+FvrEZoYp63HxWoU8te54CHiFtuT3Cx7zCl5w:SAHhblErEppWoHdaCCFQT3oUq

authentihash 3216ed26540d82dc9f382393be95de8594a5092531b2970806541aa111a03efb
imphash 8a25d70a2abf00ec77958fcb6fe16820
File size 17.8 MB ( 18715350 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID WinRAR Self Extracting archive (87.7%)
UPX compressed Win32 Executable (5.1%)
Win32 EXE Yoda's Crypter (4.5%)
Win32 Dynamic Link Library (generic) (1.1%)
Win32 Executable (generic) (0.7%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2013-05-07 15:45:40 UTC ( 5 years, 11 months ago )
Last submission 2016-05-22 04:31:36 UTC ( 2 years, 11 months ago )
File names r3d-models-pk2.exe
filename
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
UDP communications