× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 69d9927c9eaf5f89a9899488df7f162aef5d36536f7e5f1dced4f0ce7c3dc32c
File name: feeaefdfe1ceaf976e447be4e45d37e2.virus
Detection ratio: 19 / 54
Analysis date: 2016-07-18 08:40:58 UTC ( 2 years, 7 months ago )
Antivirus Result Update
Avast Win32:Malware-gen 20160718
AVG Downloader.Generic14.BBOZ 20160718
Avira (no cloud) TR/AD.Gootkit.Y.xuqw 20160718
AVware Trojan.Win32.Generic!BT 20160718
DrWeb Trojan.Siggen6.58358 20160718
ESET-NOD32 Win32/TrojanDownloader.Agent.CFH 20160718
Fortinet W32/Agent.CFH!tr.dldr 20160718
GData Win32.Trojan.Agent.72I2C8 20160718
K7GW Trojan-Downloader ( 004e141d1 ) 20160718
Kaspersky Trojan-Downloader.Win32.Gootkit.pw 20160718
McAfee Artemis!FEEAEFDFE1CE 20160718
McAfee-GW-Edition BehavesLike.Win32.VirRansom.fh 20160718
Microsoft Trojan:Win32/Dynamer!ac 20160718
Panda Trj/GdSda.A 20160717
Qihoo-360 QVM09.0.Malware.Gen 20160718
Sophos AV Mal/Generic-S 20160718
Symantec Heur.AdvML.C 20160718
Tencent Win32.Trojan-downloader.Gootkit.Eivi 20160718
VIPRE Trojan.Win32.Generic!BT 20160718
Ad-Aware 20160718
AegisLab 20160718
AhnLab-V3 20160718
Alibaba 20160718
ALYac 20160718
Antiy-AVL 20160718
Arcabit 20160718
Baidu 20160718
BitDefender 20160718
Bkav 20160716
CAT-QuickHeal 20160718
ClamAV 20160718
CMC 20160715
Comodo 20160718
Cyren 20160718
Emsisoft 20160718
F-Prot 20160718
F-Secure 20160718
Ikarus 20160718
Jiangmin 20160718
K7AntiVirus 20160718
Kingsoft 20160718
Malwarebytes 20160718
eScan 20160718
NANO-Antivirus 20160718
nProtect 20160715
SUPERAntiSpyware 20160718
TheHacker 20160717
TotalDefense 20160718
TrendMicro 20160718
TrendMicro-HouseCall 20160718
VBA32 20160718
ViRobot 20160718
Zillya 20160717
Zoner 20160718
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copy right(c) 2014. All rights reserved.

Product Successwatch Nineseparate
Original name armshell.exe
Internal name armshell.exe
File version 1.0.0.1
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-06-10 09:03:26
Entry Point 0x0000FFDD
Number of sections 4
PE sections
PE imports
GetStdHandle
GetConsoleOutputCP
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
LocalFree
InitializeCriticalSection
TlsGetValue
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
SetUnhandledExceptionFilter
TerminateProcess
CreateSemaphoreW
WriteConsoleA
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetWindowsDirectoryW
GetStartupInfoW
GetUserDefaultLCID
GetProcessHeap
WaitNamedPipeA
IsValidLocale
GetProcAddress
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetSystemInfo
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GetEnvironmentStrings
GetCurrentProcessId
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
CoUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.1

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
278528

EntryPoint
0xffdd

OriginalFileName
armshell.exe

MIMEType
application/octet-stream

LegalCopyright
Copy right(c) 2014. All rights reserved.

FileVersion
1.0.0.1

TimeStamp
2006:06:10 10:03:26+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
armshell.exe

ProductVersion
1.0.0.1

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
241664

ProductName
Successwatch Nineseparate

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 feeaefdfe1ceaf976e447be4e45d37e2
SHA1 51e02a0ccb40e3958487a964172b83a4e93c4193
SHA256 69d9927c9eaf5f89a9899488df7f162aef5d36536f7e5f1dced4f0ce7c3dc32c
ssdeep
6144:dQcFx9Vj/xZb+Wc5iLW2vF32VvDnXGpAuENlYTP5Ya6:drTbCfQLWPlLCAZYTua6

authentihash fb722985c90fcb8f6d345d7def27cab5931626c1231ed7d02ee7cd533ff5f3b2
imphash 7e84dd17d115eebe38463d9b5a4f71c6
File size 300.0 KB ( 307200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2016-07-18 08:40:58 UTC ( 2 years, 7 months ago )
Last submission 2016-07-18 08:40:58 UTC ( 2 years, 7 months ago )
File names feeaefdfe1ceaf976e447be4e45d37e2.virus
armshell.exe
69d9927c9eaf5f89a9899488df7f162aef5d36536f7e5f1dced4f0ce7c3dc32c.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications