× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 68aadcf93a28f2427cf27fb70b457d70ec3fed48b34df06c429cd1f530102f67
File name: 053.exe
Detection ratio: 3 / 57
Analysis date: 2015-04-14 07:59:55 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20150414
Rising PE:Malware.XPACK-LNR/Heur!1.5594 20150413
Tencent Trojan.Win32.YY.Gen.4 20150414
Ad-Aware 20150414
AegisLab 20150414
Yandex 20150413
AhnLab-V3 20150414
Alibaba 20150414
ALYac 20150414
Antiy-AVL 20150414
Avast 20150414
AVG 20150414
Avira (no cloud) 20150414
AVware 20150414
Baidu-International 20150413
BitDefender 20150414
Bkav 20150413
ByteHero 20150414
CAT-QuickHeal 20150414
ClamAV 20150414
CMC 20150413
Comodo 20150414
Cyren 20150414
DrWeb 20150413
Emsisoft 20150414
ESET-NOD32 20150413
F-Prot 20150414
F-Secure 20150414
Fortinet 20150414
GData 20150414
Ikarus 20150414
Jiangmin 20150413
K7AntiVirus 20150414
K7GW 20150414
Kaspersky 20150414
Kingsoft 20150414
Malwarebytes 20150414
McAfee 20150414
McAfee-GW-Edition 20150413
Microsoft 20150414
eScan 20150414
NANO-Antivirus 20150414
Norman 20150414
nProtect 20150413
Panda 20150413
Sophos AV 20150414
SUPERAntiSpyware 20150414
Symantec 20150414
TheHacker 20150414
TotalDefense 20150413
TrendMicro 20150414
TrendMicro-HouseCall 20150414
VBA32 20150412
VIPRE 20150414
ViRobot 20150414
Zillya 20150413
Zoner 20150413
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Корпорация Майкрософт. Все права защищены.

Product Операционная система Microsoft® Windows®
Original name MMFUtil.exe
Internal name MMFUtil.exe
File version 5.1.2601.5512 (xpsp.080413-2108)
Description WMI Snapin Helpers
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-04-14 06:50:31
Entry Point 0x00001078
Number of sections 11
PE sections
PE imports
JetRestore2
ExitThread
SetupGetLineTextW
isalpha
sin
Number of PE resources by type
RT_STRING 3
RT_DIALOG 1
AVI 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 6
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
115712

ImageVersion
0.0

ProductName
Microsoft Windows

FileVersionNumber
5.1.2601.5512

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
MMFUtil.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
5.1.2601.5512 (xpsp.080413-2108)

TimeStamp
2015:04:14 07:50:31+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
MMFUtil.exe

ProductVersion
5.1.2601.5512

FileDescription
WMI Snapin Helpers

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
. .

MachineType
Intel 386 or later, and compatibles

CodeSize
52224

FileSubtype
0

ProductVersionNumber
5.1.2601.5512

EntryPoint
0x1078

ObjectFileType
Dynamic link library

PCAP parents
File identification
MD5 e46dcc4a49547b547f357a948337b929
SHA1 a3886bc1ce84a6842be114ff553809dcc0368648
SHA256 68aadcf93a28f2427cf27fb70b457d70ec3fed48b34df06c429cd1f530102f67
ssdeep
1536:Ib+uQfrz2v69QsVCB7a2Kyqjz0Q67c8hPJtJ8GQS9+uzHDiohwI8HXaFis:IYCsMB2WVQ67Bp8nS9+upeI8HXa8s

authentihash f2535df38acd5358871655a8d9caefa44eabc20ed8fe0b9e82b0a3009cb608d4
imphash 6384d6d488c18982af7e30e62ca0af0d
File size 146.0 KB ( 149504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe cve-2013-3660 exploit via-tor

VirusTotal metadata
First submission 2015-04-14 07:41:11 UTC ( 2 years, 5 months ago )
Last submission 2015-11-09 21:40:33 UTC ( 1 year, 10 months ago )
File names stepk1.6a.exe
e46dcc4a49547b547f357a948337b929.bin
053.exe
VirusShare_e46dcc4a49547b547f357a948337b929
stepk1.3a.exe
e46dcc4a49547b547f357a948337b929
MMFUtil.exe
_mvbtD.png
053_exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications