× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 72ceb758b3314012517a95e62bbb852cfa63d12cb891dcc3e52ffd17d02a4463
File name: ComplainceId2550203.scr
Detection ratio: 23 / 67
Analysis date: 2019-01-24 14:09:23 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Arcabit Trojan.Generic.D1E1C8D0 20190124
Avast FileRepMalware 20190124
AVG FileRepMalware 20190124
Avira (no cloud) TR/AD.ArkeiStealer.qpzoc 20190124
BitDefender Trojan.GenericKD.31574224 20190124
Cylance Unsafe 20190124
DrWeb Trojan.DownLoader27.17994 20190124
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOYP 20190124
GData Win32.Packed.Kryptik.4UB2BO 20190124
Ikarus Packed.Win32.Crypt 20190124
Sophos ML heuristic 20181128
Kaspersky Trojan.Win32.Lolopak.ln 20190124
Malwarebytes Backdoor.Bot 20190124
MAX malware (ai score=84) 20190124
McAfee Artemis!E75F454369BD 20190124
McAfee-GW-Edition BehavesLike.Win32.Injector.hh 20190124
Microsoft Trojan:Win32/Sonbokli.A!cl 20190124
eScan Trojan.GenericKD.31574224 20190124
Qihoo-360 Win32/Trojan.dff 20190124
Symantec ML.Attribute.HighConfidence 20190124
Trapmine malicious.moderate.ml.score 20190123
ZoneAlarm by Check Point Trojan.Win32.Lolopak.ln 20190124
Acronis 20190124
Ad-Aware 20190124
AegisLab 20190124
AhnLab-V3 20190124
Alibaba 20180921
ALYac 20190124
Antiy-AVL 20190124
Avast-Mobile 20190124
Babable 20180918
Baidu 20190124
Bkav 20190124
CAT-QuickHeal 20190124
ClamAV 20190124
CMC 20190124
Comodo 20190124
Cyren 20190124
eGambit 20190124
Emsisoft 20190124
F-Prot 20190124
F-Secure 20190124
Fortinet 20190124
Jiangmin 20190124
K7AntiVirus 20190124
K7GW 20190124
Kingsoft 20190124
NANO-Antivirus 20190124
Palo Alto Networks (Known Signatures) 20190124
Panda 20190124
Rising 20190124
SentinelOne (Static ML) 20190118
Sophos AV 20190124
SUPERAntiSpyware 20190123
TACHYON 20190124
Tencent 20190124
TheHacker 20190118
TrendMicro 20190127
TrendMicro-HouseCall 20190124
Trustlook 20190124
VBA32 20190124
ViRobot 20190124
Webroot 20190124
Yandex 20190124
Zillya 20190123
Zoner 20190124
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Lavasoft Copyright © 2000 - 2014 KG and its Licensors

Product Feed
Original name Feed
Internal name Feed
File version 4.2.7.570
Description Dissimilar Per Developer 2004 Tom
Comments Dissimilar Per Developer 2004 Tom
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-23 19:34:25
Entry Point 0x00040228
Number of sections 5
PE sections
PE imports
QueryServiceStatus
OpenProcessToken
CreateToolbarEx
ImageList_Destroy
ImageList_GetIconSize
ImageList_Create
ImageList_DrawEx
Ord(17)
ImageList_ReplaceIcon
GetOpenFileNameA
GetTextMetricsW
TextOutA
CreateFontIndirectA
GetObjectA
DeleteDC
SetBkMode
EndDoc
StartPage
BitBlt
SetTextColor
GetDeviceCaps
FillRgn
MoveToEx
GetStockObject
SetViewportOrgEx
SelectClipRgn
EndPage
SelectObject
StartDocA
AddFontResourceExW
SetBkColor
DeleteObject
GetStdHandle
GetFileAttributesA
WaitForSingleObject
EncodePointer
GetFileAttributesW
GetExitCodeProcess
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetTempPathA
WideCharToMultiByte
LoadLibraryW
GetDiskFreeSpaceW
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
FormatMessageW
GetTimeZoneInformation
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
OutputDebugStringA
SetLastError
GetSystemTime
InitializeCriticalSection
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
FreeLibrary
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
SetFilePointer
LockFileEx
CreateThread
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
OpenProcess
lstrcmpiA
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
Process32Next
UnlockFile
GetFileSize
Process32First
DeleteFileA
GetStartupInfoW
DeleteFileW
GetProcAddress
GetProcessHeap
CompareStringW
VirtualLock
FindFirstFileExA
ResetEvent
GetTempFileNameA
FindNextFileA
GlobalAlloc
CreateEventW
CreateFileW
GetConsoleWindow
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
GlobalFree
GetConsoleCP
GetEnvironmentStringsW
WaitForSingleObjectEx
LockFile
GetCurrentProcessId
GetCommandLineW
GetCPInfo
HeapSize
GetCommandLineA
InterlockedCompareExchange
RaiseException
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetFileAttributesExW
CreateProcessA
IsValidCodePage
WriteFile
Sleep
VirtualAlloc
GetModuleFileNameExA
UuidToStringA
UuidCreate
SHGetFileInfoA
SHGetMalloc
ColorRGBToHLS
PathRemoveFileSpecW
MapWindowPoints
RedrawWindow
GetSystemMenu
GetMessagePos
GetParent
DrawTextA
EndDialog
BeginPaint
SetClassLongW
EnumWindows
GetClassInfoExA
EnumWindowStationsW
GetGuiResources
DefWindowProcA
ShowWindow
SetWindowLongA
DrawFocusRect
SetWindowPos
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
BeginDeferWindowPos
IsWindow
DestroyIcon
GetWindowRect
EndPaint
UnhookWindowsHookEx
PostMessageA
LoadImageA
MessageBoxA
GetClassNameA
DestroyCursor
GetSysColorBrush
GetMessageTime
GetWindow
GetSysColor
GetDC
RegisterClassExA
GetCursorPos
SystemParametersInfoA
EqualRect
EndDeferWindowPos
CheckMenuItem
GetMenu
LoadStringA
DrawIconEx
GetSystemMetrics
SendMessageA
DialogBoxParamA
GetClientRect
GetDlgItem
MonitorFromWindow
ScreenToClient
InvalidateRect
GetWindowLongA
GetWindowTextLengthA
CreateWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemInfoA
IsDlgButtonChecked
CopyRect
GetMenuState
CallWindowProcA
LoadIconW
FillRect
GetWindowTextA
GetMonitorInfoA
DialogBoxIndirectParamA
mmioSeek
WSAStartup
WSAWaitForMultipleEvents
WSACreateEvent
SymSetContext
RevokeDragDrop
CreateClassMoniker
CoLockObjectExternal
PdhGetFormattedCounterValue
Number of PE resources by type
RT_CURSOR 11
RT_GROUP_CURSOR 9
Struct(998) 9
RT_ICON 7
Struct(3000) 2
BINARY 1
RT_DIALOG 1
RT_MANIFEST 1
AFX 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 44
PE resources
Debug information
ExifTool file metadata
CodeSize
357888

SubsystemVersion
5.1

Comments
Dissimilar Per Developer 2004 Tom

LinkerVersion
14.16

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.2.7.570

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Dissimilar Per Developer 2004 Tom

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
176128

PrivateBuild
4.2.7.570

EntryPoint
0x40228

OriginalFileName
Feed

MIMEType
application/octet-stream

LegalCopyright
Lavasoft Copyright 2000 - 2014 KG and its Licensors

FileVersion
4.2.7.570

TimeStamp
2019:01:23 20:34:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Feed

ProductVersion
4.2.7.570

UninitializedDataSize
0

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Lavasoft

LegalTrademarks
Lavasoft Copyright 2000 - 2014 KG and its Licensors

ProductName
Feed

ProductVersionNumber
4.2.7.570

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e75f454369bd8c48e5be30e5cb3aa8b7
SHA1 596a182f3870c4c04fd39c8509b2e32c30e59683
SHA256 72ceb758b3314012517a95e62bbb852cfa63d12cb891dcc3e52ffd17d02a4463
ssdeep
12288:2ahxHvXrA87dMJWMsJ2aomjjtmYIBdBKN6KI3/hDsbV:3xfkJtsJ2axTIBLKNdUDsb

authentihash c7c67c8aae555d9f3607fcc4d6015605c69c1c1e7179d8c267d3af4512d68ef0
imphash 3e56e4521144e35f0889ab7024819de6
File size 522.5 KB ( 535040 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-23 21:58:13 UTC ( 1 month, 3 weeks ago )
Last submission 2019-01-28 18:45:27 UTC ( 1 month, 2 weeks ago )
File names Feed
malware.exe
ComplainceId2550203.scr
Complaince.scr
Complaince.sct
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
DNS requests
TCP connections