× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 57ec93883261acee651dc5cb3f700befbb6d06ce3d55a4aebbb59e2a754379b2
File name: k76j5hg_dump.exe
Detection ratio: 11 / 53
Analysis date: 2016-02-01 20:37:15 UTC ( 3 years ago )
Antivirus Result Update
Avast Win32:Crypt-SKJ [Trj] 20160201
Avira (no cloud) TR/Crypt.XPACK.Gen 20160201
CAT-QuickHeal (Suspicious) - DNAScan 20160201
ESET-NOD32 a variant of Win32/Dridex.AA 20160201
Kaspersky HEUR:Trojan.Win32.Generic 20160201
McAfee-GW-Edition BehavesLike.Win32.FakeAlert.dh 20160201
Microsoft Backdoor:Win32/Drixed.M 20160201
NANO-Antivirus Virus.Win32.Gen.ccmw 20160201
Qihoo-360 QVM19.1.Malware.Gen 20160201
Rising PE:Malware.Generic(Thunder)!1.A1C4 [F] 20160201
VBA32 BScope.Trojan-Dropper.Injector 20160201
Ad-Aware 20160201
AegisLab 20160201
Yandex 20160201
AhnLab-V3 20160201
Alibaba 20160201
ALYac 20160201
Antiy-AVL 20160201
Arcabit 20160201
AVG 20160201
Baidu-International 20160201
BitDefender 20160201
Bkav 20160201
ByteHero 20160201
ClamAV 20160201
Comodo 20160201
Cyren 20160201
DrWeb 20160201
Emsisoft 20160201
F-Prot 20160129
F-Secure 20160201
Fortinet 20160201
GData 20160201
Ikarus 20160201
Jiangmin 20160201
K7AntiVirus 20160201
K7GW 20160201
Malwarebytes 20160201
McAfee 20160201
eScan 20160201
nProtect 20160201
Panda 20160201
Sophos AV 20160201
SUPERAntiSpyware 20160201
Symantec 20160201
Tencent 20160201
TheHacker 20160130
TrendMicro 20160201
TrendMicro-HouseCall 20160201
VIPRE 20160201
ViRobot 20160201
Zillya 20160201
Zoner 20160201
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-01-27 15:17:53
Entry Point 0x00001FD8
Number of sections 4
PE sections
ExifTool file metadata
CodeSize
56832

UninitializedDataSize
0

Comments
Brace Inventions Lost Looping Graphs

InitializedDataSize
34304

ImageVersion
0.0

ProductName
OverpaidConnectionstring

FileVersionNumber
7.8.21.4

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
10.0

FileTypeExtension
exe

OriginalFileName
OverpaidConnectionstring.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
7.8.21.4

TimeStamp
2016:01:27 16:17:53+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.1

ProductVersion
7.8.21.4

FileDescription
Brace Inventions Lost Looping Graphs

OSVersion
5.1

FileOS
Windows NT 32-bit

LegalCopyright
Copyright .PassMark Software All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
PassMark Software

LegalTrademarks
Copyright .PassMark Software All rights reserved.

FileSubtype
0

ProductVersionNumber
7.8.21.4

EntryPoint
0x1fd8

ObjectFileType
Executable application

File identification
MD5 b4706d536e339b6fae9c5b1e835d5ef1
SHA1 31df7be686789c151dbb599b9a02b0cc4e7f76ad
SHA256 57ec93883261acee651dc5cb3f700befbb6d06ce3d55a4aebbb59e2a754379b2
ssdeep
6144:DeoX8Bf/xAs97Bnv/dF8+4N9yN3zpA6gQOmX:Df8BnHFQ3yNDFj

authentihash a503fff48c78a8d62501b8560cb8b32b0f9ea5abe44bf5b18edbdd61b412c886
File size 260.0 KB ( 266240 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-01 20:37:15 UTC ( 3 years ago )
Last submission 2016-02-01 20:37:15 UTC ( 3 years ago )
File names k76j5hg_dump.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications