× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5113d5ccd545796068f62b9508fb2a4ef4b88a389318adc397c65e2454e37353
File name: x.exe
Detection ratio: 39 / 58
Analysis date: 2016-09-04 16:50:30 UTC ( 1 year, 1 month ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.2024258 20160904
AegisLab Troj.Dropper.W32.Agent.ogpe!c 20160904
AhnLab-V3 Dropper/Win32.Agent.N1361987235 20160904
ALYac Trojan.Keylogger.locx 20160904
Antiy-AVL Trojan[Dropper]/Win32.Agent 20160904
Avast Win32:Evo-gen [Susp] 20160904
AVG Pakes2_c.NRC 20160904
Avira (no cloud) TR/Rogue.311808.11 20160904
AVware Trojan.Win32.Generic!BT 20160904
BitDefender Trojan.GenericKD.2024258 20160904
Bkav W32.eHeur.Malware03 20160901
CAT-QuickHeal TrojanDropper.Agent.r8 20160904
Comodo TrojWare.Win32.UMal.~A 20160904
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
DrWeb Trojan.Siggen6.29368 20160904
Emsisoft Trojan.GenericKD.2024258 (B) 20160904
ESET-NOD32 Win32/Spy.KeyLogger.ORZ 20160904
F-Secure Trojan.GenericKD.2024258 20160904
Fortinet W32/Agent.ITMNMRT!tr 20160904
GData Trojan.GenericKD.2024258 20160904
Ikarus Virus.Win32.DelfInject 20160904
Sophos ML worm.win32.yeltminky.a 20160830
Kaspersky HEUR:Trojan.Win32.Generic 20160904
McAfee Artemis!148F5259EFD3 20160904
McAfee-GW-Edition BehavesLike.Win32.FakeAlert.fh 20160904
eScan Trojan.GenericKD.2024258 20160904
NANO-Antivirus Trojan.Win32.Agent.dklmdd 20160904
Panda Trj/CI.A 20160904
Qihoo-360 HEUR/QVM05.1.Malware.Gen 20160904
Rising Malware.Generic!CcLB1TCfBXN@4 (thunder) 20160904
Sophos AV Mal/Generic-S 20160904
Symantec Heur.AdvML.B 20160904
Tencent Win32.Trojan-dropper.Agent.Dxnj 20160904
TrendMicro TROJ_SPNV.01LI14 20160904
TrendMicro-HouseCall TROJ_SPNV.01LI14 20160904
VBA32 TrojanDropper.Agent 20160902
VIPRE Trojan.Win32.Generic!BT 20160831
Yandex Trojan.DR.Agent!4SLHR8RRhnU 20160903
Zillya Dropper.Agent.Win32.177211 20160902
Alibaba 20160901
Arcabit 20160904
Baidu 20160903
ClamAV 20160904
CMC 20160901
Cyren 20160904
F-Prot 20160904
Jiangmin 20160904
K7AntiVirus 20160904
K7GW 20160904
Kingsoft 20160904
Malwarebytes 20160904
Microsoft 20160904
nProtect 20160904
SUPERAntiSpyware 20160904
TheHacker 20160903
TotalDefense 20160904
ViRobot 20160904
Zoner 20160904
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001275C
Number of sections 8
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetLastError
GetStdHandle
EnterCriticalSection
ReadFile
lstrlenA
GetStringTypeExA
WaitForSingleObject
FreeLibrary
ExitProcess
GetThreadLocale
GetVersionExA
GetModuleFileNameA
RtlUnwind
GetLocalTime
DeleteCriticalSection
GetStartupInfoA
GetDateFormatA
LoadLibraryExA
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetCommandLineA
GetProcAddress
SetFilePointer
RaiseException
CompareStringA
CloseHandle
WideCharToMultiByte
GetModuleHandleA
FindFirstFileA
WriteFile
EnumCalendarInfoA
ResetEvent
lstrcpynA
OutputDebugStringA
GetACP
GetDiskFreeSpaceA
GetCurrentThreadId
GetFullPathNameA
SetEvent
LocalFree
FindResourceA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
CreateEventA
FindClose
InterlockedDecrement
Sleep
FormatMessageA
SetEndOfFile
TlsSetValue
CreateFileA
GetTickCount
GetVersion
LeaveCriticalSection
VirtualAlloc
InterlockedIncrement
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
LoadStringA
CharNextA
MessageBoxA
GetKeyboardType
CharToOemA
Number of PE resources by type
RT_ICON 6
GYRATOR 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 8
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
71680

LinkerVersion
2.25

FileTypeExtension
exe

InitializedDataSize
239104

SubsystemVersion
4.0

EntryPoint
0x1275c

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 148f5259efd310a3598dd28dadba37d2
SHA1 73a5e90d4c7d2ffd26c10cc16ad582c93078349e
SHA256 5113d5ccd545796068f62b9508fb2a4ef4b88a389318adc397c65e2454e37353
ssdeep
6144:PR7BFlffGXwzkXQu4xj8PJlmR7NzUneTjxuVg+6KYl7bl2t:PRlFFfGXwzkAu4+BlyzKeHYVg+6X7p2t

authentihash e5fd1809f2563e785d287ab8c66e42af340fb925fc53eab7f3b06ae81d95688f
imphash b4a0cd126749021c0b08f84926fe31fe
File size 304.5 KB ( 311808 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (57.2%)
Win32 Executable (generic) (18.2%)
Win16/32 Executable Delphi generic (8.3%)
Generic Win/DOS Executable (8.0%)
DOS Executable Generic (8.0%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2014-12-12 13:48:00 UTC ( 2 years, 10 months ago )
Last submission 2016-09-04 16:50:30 UTC ( 1 year, 1 month ago )
File names msgss.exe
x.ex1
output.49975506.txt
49975506
vti-rescan
x.exe
8dKuulz.xls
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Copied files
Created processes
Shell commands
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.