× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6f0a1c3564fae4dc25e7c24c886702a635b573a3610bb5671d0451b1210e22a9
File name: 9168bcf9695cdf16a06a4ad321fc147ed497240d
Detection ratio: 8 / 56
Analysis date: 2015-07-26 12:09:13 UTC ( 3 years, 8 months ago )
Antivirus Result Update
Avira (no cloud) TR/Crypt.EPACK.1759 20150726
ByteHero Trojan.Malware.Obscu.Gen.004 20150726
DrWeb Trojan.Siggen6.44357 20150726
ESET-NOD32 a variant of Win32/Kryptik.DRHI 20150726
Kaspersky Trojan-Spy.Win32.Zbot.vtfw 20150726
McAfee-GW-Edition BehavesLike.Win32.Fujacks.dm 20150726
Panda Generic Suspicious 20150726
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20150726
Ad-Aware 20150726
AegisLab 20150726
Yandex 20150725
AhnLab-V3 20150726
Alibaba 20150724
ALYac 20150725
Antiy-AVL 20150726
Arcabit 20150726
Avast 20150726
AVG 20150726
AVware 20150726
Baidu-International 20150726
BitDefender 20150726
Bkav 20150724
CAT-QuickHeal 20150725
ClamAV 20150726
Comodo 20150726
Cyren 20150726
Emsisoft 20150726
F-Prot 20150726
F-Secure 20150725
Fortinet 20150726
GData 20150726
Ikarus 20150726
Jiangmin 20150725
K7AntiVirus 20150726
K7GW 20150726
Kingsoft 20150726
Malwarebytes 20150724
McAfee 20150726
Microsoft 20150726
eScan 20150726
NANO-Antivirus 20150726
nProtect 20150723
Rising 20150722
Sophos AV 20150726
SUPERAntiSpyware 20150726
Symantec 20150726
Tencent 20150726
TheHacker 20150723
TotalDefense 20150723
TrendMicro 20150726
TrendMicro-HouseCall 20150726
VBA32 20150725
VIPRE 20150726
ViRobot 20150726
Zillya 20150726
Zoner 20150726
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-06-16 06:47:46
Entry Point 0x00001000
Number of sections 14
PE sections
Overlays
MD5 bf619eac0cdf3f68d496ea9344137e8b
File type ASCII text
Offset 267264
Size 512
Entropy 0.00
PE imports
RegCreateKeyExW
RegDeleteKeyW
RegQueryValueExA
AdjustTokenPrivileges
InitializeAcl
RegCreateKeyExA
RegQueryValueExW
SetSecurityDescriptorDacl
CloseServiceHandle
OpenProcessToken
AddAccessAllowedAce
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
RegEnumValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
EmptyClipboard
RegisterHotKey
GetMessagePos
UnregisterHotKey
PostQuitMessage
ModifyMenuW
GetMenuState
CharPrevW
FindWindowA
IsWindowEnabled
SetWindowWord
CharUpperW
GetMenuItemRect
DdeEnableCallback
DestroyCaret
CheckDlgButton
GetKeyState
WINNLSEnableIME
GetDlgCtrlID
SetParent
OpenDesktopW
IsZoomed
GetMessageTime
CloseWindow
PackDDElParam
FrameRect
CharPrevExA
EnumDisplaySettingsA
CreateWindowExA
LoadIconA
GetKeyboardType
AdjustWindowRect
CharNextA
SetActiveWindow
CloseDesktop
ExcludeUpdateRgn
LoadIconW
GetFocus
GetActiveWindow
GetUpdateRect
DefDlgProcW
Number of PE resources by type
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2005:06:16 07:47:46+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
205312

LinkerVersion
0.0

EntryPoint
0x1000

InitializedDataSize
38400

SubsystemVersion
4.1

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 b8f1927cb652dfa4d10dd23905a8b0d9
SHA1 ab9e73e13237ff64a1180e5e3e48006f7ad15180
SHA256 6f0a1c3564fae4dc25e7c24c886702a635b573a3610bb5671d0451b1210e22a9
ssdeep
3072:QZj9F02g4mMepHCAjofuB04tvVv4v5W17aKC4P:Q9FOLpiAjo0jtvVvw5W17aKC4P

authentihash d2250aa4a731b0a5752eec717cdcd200fa38814e9aea96f8ff4cf3916a07b516
imphash eccd4484d19a245b1c38289b380e916a
File size 261.5 KB ( 267776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.7%)
Generic Win/DOS Executable (23.4%)
DOS Executable Generic (23.4%)
VXD Driver (0.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-07-25 22:40:27 UTC ( 3 years, 8 months ago )
Last submission 2015-07-26 12:09:13 UTC ( 3 years, 8 months ago )
File names 9168bcf9695cdf16a06a4ad321fc147ed497240d
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0726.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs