× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8710ba76461b3627deb85aac0b0c1729c0ce58af1d77806fa1bfa3eae3de7268
File name: ADP_cx5oMi.exe
Detection ratio: 3 / 46
Analysis date: 2013-03-22 11:34:16 UTC ( 1 year ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Win32/Kryptik.AXGL 20130322
Malwarebytes Malware.Packer.SGX5 20130322
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.B 20130322
AVG 20130321
Agnitum 20130321
AhnLab-V3 20130321
AntiVir 20130322
Antiy-AVL 20130322
Avast 20130322
BitDefender 20130322
ByteHero 20130320
CAT-QuickHeal 20130322
ClamAV 20130322
Commtouch 20130322
Comodo 20130322
DrWeb 20130322
Emsisoft 20130322
F-Prot 20130321
F-Secure 20130322
Fortinet 20130322
GData 20130322
Ikarus 20130322
Jiangmin 20130321
K7AntiVirus 20130321
Kaspersky 20130322
Kingsoft 20130318
McAfee 20130322
MicroWorld-eScan 20130322
Microsoft 20130322
NANO-Antivirus 20130322
Norman 20130321
PCTools 20130321
Panda 20130322
Rising 20130322
SUPERAntiSpyware 20130322
Sophos 20130322
Symantec 20130322
TheHacker 20130322
TotalDefense 20130321
TrendMicro 20130322
TrendMicro-HouseCall 20130322
VBA32 20130321
VIPRE 20130322
ViRobot 20130322
eSafe 20130319
nProtect 20130322
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-01-23 18:06:24
Entry Point 0x000010FB
Number of sections 4
PE sections
PE imports
IsValidSid
DllGetClassObject
DirectXFileCreate
DllCanUnloadNow
GetConsoleAliasA
GetFileAttributesA
GetDriveTypeA
HeapDestroy
VirtualProtect
GetModuleFileNameA
GetLocalTime
GetConsoleMode
CreateDirectoryA
DeleteFileA
GetStartupInfoW
GlobalLock
CancelIo
GetProcessHeap
GetFileTime
GetModuleHandleA
InterlockedExchange
LocalFree
FindClose
ReadConsoleW
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
GetWindowLongA
LoadCursorA
wsprintfA
DispatchMessageA
IsZoomed
GetWindowTextA
MessageBoxA
PeekMessageA
GetWindowDC
IsWindowEnabled
GetSysColor
GetKeyState
Number of PE resources by type
RT_ICON 2
Number of PE resources by language
ENGLISH US 2
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:01:23 18:06:24+00:00

FileType
Win32 EXE

PEType
PE32

CodeSize
5120

LinkerVersion
7.0

EntryPoint
0x10fb

InitializedDataSize
310784

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 13eeca375585322c676812cf9e2e9789
SHA1 df68da0a7893e2520028e8ddaafa2a2305534afa
SHA256 8710ba76461b3627deb85aac0b0c1729c0ce58af1d77806fa1bfa3eae3de7268
ssdeep
6144:TdOKU2I3k2fxQbSyqeiLfR73M2GceOoQdY3sejmDADVjIBZSZ4NdG:BxIU2ZQbSydS5vGcT/ojmSVMj+X

File size 309.5 KB ( 316928 bytes )
File type Win32 EXE
Magic literal
MS-DOS executable PE for MS Windows (GUI) Intel 80386 32-bit

TrID Generic Win/DOS Executable (49.9%)
DOS Executable Generic (49.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-22 11:34:16 UTC ( 1 year ago )
Last submission 2013-03-22 11:35:34 UTC ( 1 year ago )
File names ADP_QabtyY.exe
ADP_cx5oMi.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications