× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 57e22f3b90335bb179b080c9c15a11ea9701ab49ea85e98efa58fbfecd3c363b
File name: test.EXE
Detection ratio: 5 / 49
Analysis date: 2014-02-25 14:08:23 UTC ( 3 years ago )
Antivirus Result Update
Yandex HackTool.CheatEngine!h2lP7QG9eRI 20140223
Antiy-AVL Trojan/Win32.Tgenic 20140225
ESET-NOD32 a variant of Win32/HackTool.CheatEngine.AF 20140225
Jiangmin TrojanDropper.Injector.bhlg 20140225
VBA32 Hoax.Blocker 20140224
AVG 20140225
Ad-Aware 20140225
AhnLab-V3 20140224
AntiVir 20140225
Avast 20140225
Baidu-International 20140225
BitDefender 20140225
Bkav 20140224
ByteHero 20140225
CAT-QuickHeal 20140225
CMC 20140220
ClamAV 20140225
Commtouch 20140225
Comodo 20140225
DrWeb 20140225
Emsisoft 20140225
F-Prot 20140225
F-Secure 20140225
Fortinet 20140225
GData 20140225
Ikarus 20140225
K7AntiVirus 20140225
K7GW 20140225
Kaspersky 20140225
Kingsoft 20140225
Malwarebytes 20140225
McAfee 20140225
McAfee-GW-Edition 20140225
eScan 20140225
Microsoft 20140225
NANO-Antivirus 20140225
Norman 20140224
Panda 20140225
Qihoo-360 20140220
Rising 20140223
SUPERAntiSpyware 20140225
Sophos 20140225
Symantec 20140225
TheHacker 20140224
TotalDefense 20140225
TrendMicro 20140225
TrendMicro-HouseCall 20140225
VIPRE 20140225
ViRobot 20140225
nProtect 20140225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-06-28 14:45:44
Entry Point 0x000015EB
Number of sections 5
PE sections
PE imports
ConvertStringSecurityDescriptorToSecurityDescriptorA
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
SetStdHandle
SetHandleCount
LoadLibraryA
WaitForSingleObject
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
RemoveDirectoryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
GetConsoleOutputCP
WriteConsoleW
CreateDirectoryA
DeleteFileA
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetConsoleCP
LeaveCriticalSection
LCMapStringW
SetFilePointer
GetTempPathA
WideCharToMultiByte
TlsFree
GetModuleHandleA
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetTempFileNameA
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
HeapAlloc
TerminateProcess
GetEnvironmentStrings
CreateProcessA
LCMapStringA
WriteConsoleA
IsValidCodePage
LoadResource
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
FindResourceA
VirtualAlloc
HeapCreate
SetLastError
InterlockedIncrement
PathRemoveFileSpecA
PathAddBackslashA
PathStripPathA
MessageBoxA
Number of PE resources by type
RT_RCDATA 2
RT_ICON 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 3
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:06:28 15:45:44+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
36352

LinkerVersion
9.0

FileAccessDate
2014:02:25 15:08:31+01:00

EntryPoint
0x15eb

InitializedDataSize
4140032

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

FileCreateDate
2014:02:25 15:08:31+01:00

UninitializedDataSize
0

File identification
MD5 021f75e240b6fa7b50a7cb0ac70e9539
SHA1 72f1c5f90749e755eefba0a8d522e51e13299cb0
SHA256 57e22f3b90335bb179b080c9c15a11ea9701ab49ea85e98efa58fbfecd3c363b
ssdeep
49152:9LK3hNPbD/aWY4Dpczi232XhQxQ2jzH7wNs8etyzUQHehC9iSQFfXMvD7Gq+J/T:92vYoWiA2xryr7wNH46mC9iSSOQOBdd

imphash 8d92fa1956a6a631c642190121740197
File size 4.0 MB ( 4177408 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2014-02-25 14:08:23 UTC ( 3 years ago )
Last submission 2014-02-25 14:08:23 UTC ( 3 years ago )
File names test.EXE
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Deleted files
Created processes
Runtime DLLs