× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 813a7c9f76ab3c1f4ae88d5d774a61e442d241eb4dcbafffc39a4fe65d821ea6
File name: c9b67a9763fed1a92b7e20ddf50185523afb11a9
Detection ratio: 34 / 56
Analysis date: 2015-04-04 04:34:34 UTC ( 4 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.2262037 20150404
Yandex Trojan.Inject!KWY6qxsIFTg 20150403
AhnLab-V3 Trojan/Win32.Emotet 20150403
ALYac Trojan.GenericKD.2262037 20150404
Antiy-AVL Trojan/Win32.Inject 20150404
Avast Win32:VBCrypt-DAI [Trj] 20150404
AVG Atros.IRR 20150404
AVware Trojan.Win32.Generic.pak!cobra 20150404
Baidu-International Trojan.Win32.Inject.uqoe 20150403
BitDefender Trojan.GenericKD.2262037 20150404
Bkav HW32.Packed.9B84 20150403
ByteHero Virus.Win32.Heur.p 20150404
Emsisoft Trojan.GenericKD.2262037 (B) 20150404
ESET-NOD32 a variant of Win32/Injector.BXIO 20150403
F-Secure Trojan.GenericKD.2262037 20150404
Fortinet W32/VBKrpk.EMAE!tr 20150404
GData Trojan.GenericKD.2262037 20150404
Ikarus Trojan.Win32.Injector 20150404
K7AntiVirus Trojan ( 004b8c611 ) 20150403
K7GW Trojan ( 004b8c611 ) 20150403
Kaspersky Trojan.Win32.Inject.uqoe 20150404
Malwarebytes Trojan.Agent.HDLGen 20150404
McAfee Trojan-FGBR!D8CEDC44CB80 20150404
eScan Trojan.GenericKD.2262037 20150404
Norman Injector.IDGK 20150404
nProtect Trojan.GenericKD.2262037 20150403
Panda Trj/Genetic.gen 20150401
Qihoo-360 HEUR/QVM03.0.Malware.Gen 20150404
Sophos AV Mal/VBZbot-H 20150404
SUPERAntiSpyware Trojan.Agent/Gen-VB 20150403
Symantec WS.Reputation.1 20150404
Tencent Trojan.Win32.Qudamah.Gen.17 20150404
TrendMicro-HouseCall Suspicious_GEN.F47V0330 20150404
VIPRE Trojan.Win32.Generic.pak!cobra 20150404
AegisLab 20150404
Alibaba 20150404
Avira (no cloud) 20150404
CAT-QuickHeal 20150403
ClamAV 20150403
CMC 20150403
Comodo 20150403
Cyren 20150404
DrWeb 20150404
F-Prot 20150401
Jiangmin 20150403
Kingsoft 20150404
McAfee-GW-Edition 20150403
Microsoft 20150404
NANO-Antivirus 20150404
Rising 20150403
TheHacker 20150403
TotalDefense 20150403
TrendMicro 20150404
VBA32 20150403
ViRobot 20150404
Zillya 20150403
Zoner 20150403
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Goodreads
Original name CALLSTB.exe
Internal name CALLSTB
File version 1.00.1121
Description Note: In CSS3, the text-decoration property is a shorthand property for text-decoration-line, text-decoration-color, and text-decoration-style, but this is currently.
Comments Note: In CSS3, the text-decoration property is a shorthand property for text-decoration-line, text-decoration-color, and text-decoration-style, but this is currently.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-03-30 19:01:00
Entry Point 0x000014A0
Number of sections 3
PE sections
Overlays
MD5 7d4bba80e5bdadc99c80dfc208e10b88
File type data
Offset 36864
Size 130056
Entropy 7.99
PE imports
_adj_fdivr_m64
__vbaGenerateBoundsError
_allmul
__vbaGet3
_adj_fprem
__vbaR4Var
__vbaAryMove
__vbaObjVar
_adj_fdiv_r
__vbaObjSetAddref
Ord(100)
__vbaHresultCheckObj
__vbaI2Var
_CIlog
__vbaVarMul
__vbaVarLateMemCallLd
_adj_fptan
__vbaFileClose
__vbaAryCopy
__vbaFreeStr
Ord(631)
__vbaVarNot
Ord(588)
__vbaFreeStrList
__vbaI2I4
_adj_fdiv_m16i
EVENT_SINK_QueryInterface
Ord(516)
__vbaI4Str
__vbaLenBstr
Ord(525)
__vbaResume
_adj_fdiv_m32i
Ord(717)
__vbaExceptHandler
__vbaSetSystemError
DllFunctionCall
__vbaUbound
__vbaVarSetObjAddref
__vbaFreeVar
__vbaBoolVarNull
__vbaLbound
__vbaFileOpen
_CIsin
Ord(711)
__vbaAryLock
EVENT_SINK_Release
__vbaVarTstEq
__vbaOnError
_adj_fdivr_m32i
__vbaStrCat
__vbaVarDup
__vbaChkstk
__vbaStrCmp
Ord(570)
__vbaAryUnlock
__vbaVarLateMemSt
__vbaStrVarCopy
__vbaVar2Vec
__vbaVarForNext
__vbaFreeVarList
__vbaStrVarMove
__vbaExitProc
__vbaAryConstruct2
__vbaFreeObj
_adj_fdivr_m32
__vbaVarTstGt
_CIcos
__vbaVarMove
__vbaErrorOverflow
__vbaNew2
__vbaR8IntI4
__vbaAryDestruct
__vbaStrMove
_adj_fprem1
Ord(563)
_adj_fdiv_m32
Ord(685)
_adj_fpatan
EVENT_SINK_AddRef
__vbaVarForInit
__vbaVarVargNofree
__vbaStrCopy
__vbaFPException
__vbaAryVar
_adj_fdivr_m16i
__vbaVarAdd
_adj_fdiv_m64
__vbaUI1I4
__vbaVargVar
__vbaUI1I2
_CIsqrt
_CIatan
__vbaVarDiv
__vbaLateMemCall
__vbaR8Var
__vbaObjSet
_CIexp
_CItan
__vbaFpI4
__vbaFpI2
Number of PE resources by type
RT_ICON 1
ABOUT 1
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 2
TELUGU DEFAULT 1
SLOVENIAN DEFAULT 1
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
Note: In CSS3, the text-decoration property is a shorthand property for text-decoration-line, text-decoration-color, and text-decoration-style, but this is currently.

InitializedDataSize
12288

ImageVersion
1.0

ProductName
Goodreads

FileVersionNumber
1.0.0.1121

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
CALLSTB.exe

MIMEType
application/octet-stream

FileVersion
1.00.1121

TimeStamp
2015:03:30 20:01:00+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
CALLSTB

ProductVersion
1.00.1121

FileDescription
Note: In CSS3, the text-decoration property is a shorthand property for text-decoration-line, text-decoration-color, and text-decoration-style, but this is currently.

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
In CSS3

CodeSize
20480

FileSubtype
0

ProductVersionNumber
1.0.0.1121

EntryPoint
0x14a0

ObjectFileType
Executable application

File identification
MD5 d8cedc44cb80e02bffa7890a2a065d5d
SHA1 694deefe89f04c5a16f3818f98e960a10870bee1
SHA256 813a7c9f76ab3c1f4ae88d5d774a61e442d241eb4dcbafffc39a4fe65d821ea6
ssdeep
3072:bd1iTnKrHq8+Y7FXkDmLv0JBRVQTtq8Yuugfz6aMhn:OKrKLqkDm70JvVM3YuErJ

authentihash 2037032e85774af6e6da734b917310cc6429a5a8c4ecc9ae684e11999fa0b4f9
imphash be1e8fef063da50b6260878cd9f7eb65
File size 163.0 KB ( 166920 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (69.4%)
Win64 Executable (generic) (23.3%)
Win32 Executable (generic) (3.8%)
Generic Win/DOS Executable (1.6%)
DOS Executable Generic (1.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-03-30 23:32:22 UTC ( 4 years, 1 month ago )
Last submission 2015-06-11 06:57:52 UTC ( 3 years, 11 months ago )
File names CALLSTB.exe
c9b67a9763fed1a92b7e20ddf50185523afb11a9
CALLSTB
D8CEDC44CB80E02BFFA7890A2A065D5D.exe
35a.exe
D8CEDC44CB80E02BFFA7890A2A065D5D
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!