× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7cb91088002641b54684a582654d9bb1d34fbcaa6c1d379dfadd8f88e9297e19
File name: 559a1407f876dda7d97937dbdb73f15a
Detection ratio: 8 / 54
Analysis date: 2016-07-05 15:53:04 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Baidu MSIL.Trojan.Kryptik.l 20160705
ESET-NOD32 a variant of MSIL/Injector.PPB 20160705
Fortinet MSIL/Kryptik.GLE!tr 20160705
GData Win32.Trojan.Agent.JYSADE 20160705
K7GW Hacktool ( 655367771 ) 20160705
Kaspersky HEUR:Trojan.Win32.Generic 20160705
Microsoft Backdoor:Win32/Kirts 20160705
Qihoo-360 QVM03.0.Malware.Gen 20160705
Ad-Aware 20160705
AegisLab 20160705
AhnLab-V3 20160705
Alibaba 20160705
ALYac 20160705
Antiy-AVL 20160705
Arcabit 20160705
Avast 20160705
AVG 20160705
Avira (no cloud) 20160705
AVware 20160705
BitDefender 20160705
Bkav 20160705
CAT-QuickHeal 20160705
ClamAV 20160705
CMC 20160704
Comodo 20160705
Cyren 20160705
DrWeb 20160705
Emsisoft 20160704
F-Prot 20160705
F-Secure 20160705
Ikarus 20160705
Jiangmin 20160705
K7AntiVirus 20160705
Kingsoft 20160705
Malwarebytes 20160705
McAfee 20160705
McAfee-GW-Edition 20160705
eScan 20160705
NANO-Antivirus 20160705
nProtect 20160705
Panda 20160705
Sophos AV 20160705
SUPERAntiSpyware 20160705
Symantec 20160705
Tencent 20160705
TheHacker 20160705
TotalDefense 20160705
TrendMicro 20160705
TrendMicro-HouseCall 20160705
VBA32 20160705
VIPRE 20160705
ViRobot 20160705
Zillya 20160705
Zoner 20160705
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 8:35 AM 9/9/2018
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-20 17:11:52
Entry Point 0x000E3E7E
Number of sections 3
.NET details
Module Version ID 1a064a70-e179-41cd-ad4e-4179f81268cd
TypeLib ID 3c926610-d17c-44bd-9ac3-2fefcc76d3c1
PE sections
Overlays
MD5 f81e869e8316bd676d4af44e707777c7
File type data
Offset 927232
Size 5648
Entropy 7.13
PE imports
_CorExeMain
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:06:20 18:11:52+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
925696

LinkerVersion
8.0

ImageFileCharacteristics
Executable, 32-bit

FileTypeExtension
exe

InitializedDataSize
1024

SubsystemVersion
4.0

EntryPoint
0xe3e7e

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 559a1407f876dda7d97937dbdb73f15a
SHA1 79a98399ec8689ce2c0d4d6566d6c57f21e84c4d
SHA256 7cb91088002641b54684a582654d9bb1d34fbcaa6c1d379dfadd8f88e9297e19
ssdeep
12288:henweEbvv6gp/wzi8hauUgoLpB28twBHJFriBmxwtPaSgc6JTdRd75HHbwpG7hKj:nv5FwzPp3oLrHt4JF+4pz95nbo1p0s

authentihash 87fac08b2b30bf727d94e7b812034f9faea5f0fff40c0b202d365b4281e91385
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 911.0 KB ( 932880 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe assembly overlay

VirusTotal metadata
First submission 2016-07-05 15:53:04 UTC ( 2 years, 10 months ago )
Last submission 2017-08-28 18:06:43 UTC ( 1 year, 9 months ago )
File names 559a1407f876dda7d97937dbdb73f15a
AudioDriver.exe
AudioDriver.bin
559a1407f876dda7d97937dbdb73f15a
VirusShare_559a1407f876dda7d97937dbdb73f15a
559a1407f876dda7d97937dbdb73f15a.exe
559a1407f876dda7d97937dbdb73f15a
559a1407f876dda7d97937dbdb73f15a
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections
UDP communications