× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 745614f97750e72a0972c8dfd2b5d738ae4e657214a2f5cc57dda4a595b5ca53
File name: wincckcvc.exe
Detection ratio: 57 / 68
Analysis date: 2018-10-28 01:07:56 UTC ( 6 months, 3 weeks ago )
Antivirus Result Update
AhnLab-V3 Trojan/Win32.CSon.R2002 20181027
ALYac Trojan.AgentWDCR.JUU 20181028
Antiy-AVL Trojan[Backdoor]/Win32.AGeneric 20181028
Arcabit Trojan.AgentWDCR.JUU 20181027
Avast Win32:Malware-gen 20181027
AVG Win32:Malware-gen 20181027
Avira (no cloud) BDS/Agent.bik 20181027
Baidu Win32.Virus.Agent.x 20181026
BitDefender Trojan.AgentWDCR.JUU 20181028
Bkav W32.FakjusteLTAAAS.Trojan 20181025
CAT-QuickHeal TrojanProxy.Pramro.MUE.A3 20181027
ClamAV Win.Trojan.Agent-1134195 20181026
CMC Trojan.Win32.GenM!O 20181027
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.b47b07 20180225
Cylance Unsafe 20181028
Cyren W32/Heuristic-170!Eldorado 20181028
DrWeb Trojan.DownLoader18.32795 20181027
Endgame malicious (moderate confidence) 20180730
ESET-NOD32 Win32/Agent.HLU 20181027
F-Prot W32/Heuristic-170!Eldorado 20181027
F-Secure Trojan.AgentWDCR.JUU 20181027
Fortinet W32/Agent.HLU!tr 20181028
GData Win32.Trojan-Proxy.Pramro.A 20181027
Ikarus Backdoor.Win32.SuspectCRC 20181027
Sophos ML heuristic 20180717
Jiangmin Backdoor.Generic.zng 20181028
K7AntiVirus Trojan ( 0003d11f1 ) 20181027
K7GW Trojan ( 0003d11f1 ) 20181025
Kaspersky Backdoor.Win32.Small.ljs 20181028
Malwarebytes Trojan.Agent.UX 20181027
MAX malware (ai score=100) 20181028
McAfee Generic.dx!70BA56EB47B0 20181028
McAfee-GW-Edition BehavesLike.Win32.VTFlooder.lc 20181027
Microsoft TrojanProxy:Win32/Pramro.H 20181027
eScan Trojan.AgentWDCR.JUU 20181028
NANO-Antivirus Trojan.Win32.Dwn.cqoipu 20181028
Palo Alto Networks (Known Signatures) generic.ml 20181028
Panda Trj/Agent.MST 20181027
Qihoo-360 HEUR/Malware.QVM01.Gen 20181028
Rising Trojan.Pramro!1.A244 (CLOUD) 20181028
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Mal/TinyDL-T 20181027
SUPERAntiSpyware Trojan.Agent/Gen-Malagent 20181022
Symantec Trojan.Pramro 20181027
Tencent Backdoor.Win32.Agent.aag 20181028
TheHacker Posible_Worm32 20181025
TotalDefense Win32/Maazben!generic 20181027
TrendMicro TROJ_PRAMRO.B 20181028
TrendMicro-HouseCall TROJ_PRAMRO.B 20181027
VBA32 SScope.Backdoor.Saloty 20181026
VIPRE Trojan.Win32.Generic!BT 20181026
Webroot W32.Malware.gen 20181028
Yandex Trojan.Agent!G+hicn5bDqw 20181026
Zillya Trojan.Agent.Win32.451112 20181026
ZoneAlarm by Check Point Backdoor.Win32.Small.ljs 20181027
Zoner Trojan.Agent 20181027
Ad-Aware 20181028
AegisLab 20181027
Alibaba 20180921
Avast-Mobile 20181027
Babable 20180918
eGambit 20181028
Emsisoft 20181027
Kingsoft 20181028
Symantec Mobile Insight 20181026
TACHYON 20181028
Trustlook 20181028
ViRobot 20181027
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
Command UPX
F-PROT UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-11-13 23:43:21
Entry Point 0x0006D560
Number of sections 3
PE sections
Overlays
MD5 06fc27e1151ddf86a74bfce4438203a0
File type data
Offset 11776
Size 1194
Entropy 1.41
PE imports
RegOpenKeyA
VirtualProtect
LoadLibraryA
ExitProcess
GetProcAddress
wsprintfA
InternetOpenA
__WSAFDIsSet
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:11:14 00:43:21+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
12288

LinkerVersion
6.0

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

FileTypeExtension
exe

InitializedDataSize
4096

SubsystemVersion
4.0

EntryPoint
0x6d560

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
434176

Execution parents
Compressed bundles
File identification
MD5 70ba56eb47b072b6688148d0be1e2e26
SHA1 7b6ef356c7fbead074c8b4643a42b3b7a5d46c8a
SHA256 745614f97750e72a0972c8dfd2b5d738ae4e657214a2f5cc57dda4a595b5ca53
ssdeep
192:j27JnLfqkAXwRB3s3YMXzvTETyzfgoHSx1P+N6xUwbYgnl4w:jqSkPB4YMTTETSfgUk124hbY4h

authentihash 22c4ec4b3642653dfedefd96e7178d13d5ad9caddb34bc4f015948d620779550
imphash 8feb7c91cfd5a8bf6686eab7e4b9f6fe
File size 12.7 KB ( 12970 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe usb-autorun upx overlay

VirusTotal metadata
First submission 2013-11-14 02:17:38 UTC ( 5 years, 6 months ago )
Last submission 2018-05-08 00:11:24 UTC ( 1 year ago )
File names lfen.exe
ahvya.exe
winjejlo.exe
xyqsbq.exe
shxh.exe
winrodn.exe
xxgkkr.exe
winvekdy.exe
xfvhot.exe
winkdvb.exe
fjolet.exe
winjhtava.exe
winukira.exe
ppegjm.exe
ejkjn.exe
xwmy.exe
winlahp.exe
winhwiiki.exe
winuxarfo.exe
winjroo.exe
winfute.exe
winelek.exe
lwte.exe
wingwoxj.exe
wingcivj.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!