× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 545ac55e76a122c7303f074a4733f5363e2c758465e80a0dfbc80e6da7fbae35
File name: RalinkRegistryWriter
Detection ratio: 0 / 68
Analysis date: 2018-09-12 01:33:19 UTC ( 8 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware 20180911
AegisLab 20180912
AhnLab-V3 20180911
Alibaba 20180713
ALYac 20180911
Antiy-AVL 20180912
Arcabit 20180911
Avast 20180911
Avast-Mobile 20180911
AVG 20180911
Avira (no cloud) 20180911
AVware 20180911
Babable 20180907
Baidu 20180910
BitDefender 20180911
Bkav 20180911
CAT-QuickHeal 20180909
ClamAV 20180912
CMC 20180911
Comodo 20180911
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180912
Cyren 20180911
DrWeb 20180912
eGambit 20180912
Emsisoft 20180912
Endgame 20180730
ESET-NOD32 20180911
F-Prot 20180912
F-Secure 20180912
Fortinet 20180912
GData 20180912
Ikarus 20180911
Sophos ML 20180717
Jiangmin 20180911
K7AntiVirus 20180911
K7GW 20180911
Kaspersky 20180912
Kingsoft 20180912
Malwarebytes 20180912
MAX 20180912
McAfee 20180912
McAfee-GW-Edition 20180911
Microsoft 20180911
eScan 20180911
NANO-Antivirus 20180912
Palo Alto Networks (Known Signatures) 20180912
Panda 20180911
Qihoo-360 20180912
Rising 20180911
SentinelOne (Static ML) 20180830
Sophos AV 20180911
SUPERAntiSpyware 20180907
Symantec 20180911
Symantec Mobile Insight 20180911
TACHYON 20180912
Tencent 20180912
TheHacker 20180907
TotalDefense 20180911
TrendMicro 20180911
TrendMicro-HouseCall 20180911
Trustlook 20180912
VBA32 20180911
VIPRE 20180911
ViRobot 20180911
Webroot 20180912
Yandex 20180910
Zillya 20180911
ZoneAlarm by Check Point 20180911
Zoner 20180911
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
(c) Copyright 2012, Ralink Technology, Inc.

Product Ralink RalinkRegistryWriter
Original name RalinkRegistryWriter.exe
Internal name RalinkRegistryWriter
File version 1, 0, 0, 33
Description RalinkRegistryWriter
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-04 11:10:03
Entry Point 0x0000A6E0
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
OpenServiceA
RegQueryValueExA
ControlService
RegCreateKeyExA
DeleteService
InitializeSecurityDescriptor
CloseServiceHandle
DeregisterEventSource
QueryServiceStatus
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegisterEventSourceA
RegOpenKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CreateServiceA
RegSetValueExA
StartServiceA
RegDeleteValueA
OpenSCManagerA
ReportEventA
Ord(12)
Ord(3)
Ord(1)
ICSDHCP_GetAdaptersInfoEx
Ord(4)
Ord(5)
GetStdHandle
GetConsoleOutputCP
WaitForSingleObject
HeapDestroy
DebugBreak
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
lstrcatA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
ResumeThread
InitializeCriticalSection
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
OutputDebugStringA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
EnumSystemLocalesA
GetPrivateProfileStringA
SetConsoleCtrlHandler
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FatalAppExitA
GetModuleHandleA
CreateThread
SetUnhandledExceptionFilter
ExitThread
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
VirtualQuery
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
FindFirstFileA
lstrcpyA
HeapValidate
CompareStringA
IsValidLocale
GetProcAddress
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
CreateNamedPipeA
WinExec
GetEnvironmentStrings
GetCurrentProcessId
WideCharToMultiByte
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
VirtualAlloc
GetTimeFormatA
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElement
VariantClear
RpcServerUseProtseqEpA
RpcServerRegisterAuthInfoA
RpcMgmtStopServerListening
RpcServerRegisterIf
RpcServerListen
RpcServerUnregisterIf
NdrServerCall2
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiClassGuidsFromNameA
SetupDiDestroyDeviceInfoList
SetupDiSetClassInstallParamsA
SHDeleteKeyA
SHCopyKeyA
wsprintfW
CoUninitialize
CoInitializeEx
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
CHINESE TRADITIONAL 1
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
73728

ImageVersion
0.0

ProductName
Ralink RalinkRegistryWriter

FileVersionNumber
1.0.0.33

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit, Removable run from swap, Net run from swap

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
RalinkRegistryWriter.exe

MIMEType
application/octet-stream

Subsystem
Windows command line

FileVersion
1, 0, 0, 33

TimeStamp
2012:07:04 12:10:03+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RalinkRegistryWriter

ProductVersion
1, 0, 0, 33

FileDescription
RalinkRegistryWriter

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
(c) Copyright 2012, Ralink Technology, Inc.

MachineType
Intel 386 or later, and compatibles

CompanyName
Ralink Technology, Corp.

CodeSize
294912

FileSubtype
0

ProductVersionNumber
1.0.0.33

EntryPoint
0xa6e0

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Execution parents
Compressed bundles
File identification
MD5 4e033a3d13f2d3611a7df0a60ce090cb
SHA1 f4304d4234811d250a168f17eb5301d156dbf57a
SHA256 545ac55e76a122c7303f074a4733f5363e2c758465e80a0dfbc80e6da7fbae35
ssdeep
6144:BilXzccFlrcEuGa8JFOmdVhgbsOJReLLc4eMDENf0kV5tBFO3QZaoumkOKXitpYo:IlXzLNt/afmdVhgbsOJReLJ/DER1tBFn

authentihash 8c3909c814994ec57d04a7bbc41ea4d54646e3a5afea63c1c62dde2a857ceec5
imphash 15d06360ee6a6b9e7b731918b3d45cad
File size 364.0 KB ( 372736 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2012-12-27 10:01:43 UTC ( 6 years, 4 months ago )
Last submission 2018-08-13 13:44:31 UTC ( 9 months, 1 week ago )
File names RalinkRegistryWriter.exe
RalinkRegistryWriter
rare8463.rra
RaRegistry.exe
RaRegistry.exe
RaRegistry.exe
RaRegistry.exe
F4304D4234811D250A168F17EB5301D156DBF57A.exe
raregistry.exe
RaRegistry.exe
RaRegistry.exe
file-6249863_exe
raregistry.exe
RaRegistry.exe
RaRegistry.exe
4E033A3D13F2D3611A7DF0A60CE090CB
rare86f3.rra
RAREGISTRY.EXE
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!