× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8823fa4640397797196e6bdf9f9498be6d13f72852b19a74de0d5861211393ca
File name: 8823fa4640397797196e6bdf9f9498be6d13f72852b19a74de0d5861211393ca
Detection ratio: 10 / 57
Analysis date: 2016-06-01 22:30:13 UTC ( 2 years, 8 months ago )
Antivirus Result Update
Avast Win32:Malware-gen 20160601
Avira (no cloud) TR/Crypt.ZPACK.dsxd 20160601
Baidu Win32.Trojan.Kryptik.aec 20160601
ESET-NOD32 Win32/TrojanDownloader.Agent.CFH 20160601
Fortinet W32/Agent.CFH!tr.dldr 20160601
Kaspersky UDS:DangerousObject.Multi.Generic 20160601
McAfee Artemis!6540C87DB9DE 20160601
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.ch 20160601
Qihoo-360 QVM09.0.Malware.Gen 20160601
Sophos AV Mal/Generic-S 20160601
Ad-Aware 20160601
AegisLab 20160601
AhnLab-V3 20160601
Alibaba 20160601
ALYac 20160601
Antiy-AVL 20160601
Arcabit 20160601
AVG 20160601
AVware 20160601
Baidu-International 20160601
BitDefender 20160601
Bkav 20160601
CAT-QuickHeal 20160601
ClamAV 20160601
CMC 20160530
Comodo 20160601
Cyren 20160601
DrWeb 20160601
Emsisoft 20160601
F-Prot 20160601
F-Secure 20160601
GData 20160601
Ikarus 20160601
Jiangmin 20160601
K7AntiVirus 20160601
K7GW 20160601
Kingsoft 20160601
Malwarebytes 20160601
Microsoft 20160601
eScan 20160601
NANO-Antivirus 20160601
nProtect 20160601
Panda 20160601
Rising 20160601
SUPERAntiSpyware 20160601
Symantec 20160601
Tencent 20160601
TheHacker 20160601
TotalDefense 20160601
TrendMicro 20160601
TrendMicro-HouseCall 20160601
VBA32 20160601
VIPRE 20160601
ViRobot 20160601
Yandex 20160601
Zillya 20160601
Zoner 20160601
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-05-29 06:47:16
Entry Point 0x00022342
Number of sections 4
PE sections
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
GetConsoleOutputCP
SetHandleCount
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
SetProcessShutdownParameters
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetEnvironmentStrings
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
LCMapStringW
WriteConsoleW
WideCharToMultiByte
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetProcessHeap
ExitProcess
GetFileTime
GetModuleHandleA
GetCPInfo
TlsFree
SetFilePointer
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
HeapDestroy
TerminateProcess
LCMapStringA
WriteConsoleA
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
SetLastError
InterlockedIncrement
DdeImpersonateClient
GetWindowTextLengthA
GetParent
PrintWindow
DrawFocusRect
GetInputState
DefFrameProcW
UpdateLayeredWindow
CopyIcon
GetMessageExtraInfo
GetDlgItem
ReleaseDC
CloseClipboard
GetProcessWindowStation
GetThreadDesktop
Number of PE resources by type
RT_DIALOG 2
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 2
ENGLISH CARIBBEAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:05:29 07:47:16+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
169472

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
14848

SubsystemVersion
5.0

EntryPoint
0x22342

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 6540c87db9de97e7f3d23a74cb9a2199
SHA1 b4b9373b5c98c08c7f8eb741b5f24f5db1ed8ab8
SHA256 8823fa4640397797196e6bdf9f9498be6d13f72852b19a74de0d5861211393ca
ssdeep
3072:BjMtRkSuqVV36R2kNSXq+aO/kAw0fCNZexcgOgcy+Q:StRiqWR0FaO/5XfCNgvn

authentihash c6046201c01c3e92c75869c2d2d097d8e23cee927fdc22f51bd6a36efbe140c5
imphash ac7f06bac1d1c18e76c4430a6dcd7f15
File size 181.0 KB ( 185344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-06-01 22:30:13 UTC ( 2 years, 8 months ago )
Last submission 2016-06-01 22:30:13 UTC ( 2 years, 8 months ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications