× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8ec5f8c77bfd50534df03a2fa961104033c88829e013a34db65edcc1d01ede0b
File name: Roaming.Exe
Detection ratio: 9 / 59
Analysis date: 2017-02-17 14:58:39 UTC ( 1 year, 12 months ago )
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20170217
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20170130
Endgame malicious (high confidence) 20170217
Sophos ML generic.a 20170203
Malwarebytes Ransom.Cerber 20170217
Panda Trj/Genetic.gen 20170217
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20170217
Rising Malware.Generic.2!tfe (thunder:2:gS1Xy3A2yHI) 20170217
Symantec Packed.Generic.493 20170217
Ad-Aware 20170217
AegisLab 20170217
AhnLab-V3 20170217
Alibaba 20170217
ALYac 20170217
Antiy-AVL 20170217
Arcabit 20170217
Avast 20170217
AVG 20170217
Avira (no cloud) 20170217
AVware 20170217
BitDefender 20170217
Bkav 20170217
CAT-QuickHeal 20170217
ClamAV 20170217
CMC 20170217
Comodo 20170217
Cyren 20170217
DrWeb 20170217
Emsisoft 20170217
ESET-NOD32 20170217
F-Prot 20170217
F-Secure 20170217
Fortinet 20170217
GData 20170217
Ikarus 20170217
Jiangmin 20170217
K7AntiVirus 20170217
K7GW 20170217
Kaspersky 20170217
Kingsoft 20170217
McAfee 20170217
McAfee-GW-Edition 20170216
Microsoft 20170217
eScan 20170217
NANO-Antivirus 20170217
nProtect 20170217
Sophos AV 20170217
SUPERAntiSpyware 20170217
Tencent 20170217
TheHacker 20170217
TotalDefense 20170217
TrendMicro 20170217
TrendMicro-HouseCall 20170217
Trustlook 20170217
VBA32 20170217
VIPRE 20170217
ViRobot 20170217
Webroot 20170217
WhiteArmor 20170215
Yandex 20170217
Zillya 20170216
Zoner 20170217
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-02 10:01:36
Entry Point 0x00003534
Number of sections 4
PE sections
Overlays
MD5 a03480935902726aacdbddaeaac8834b
File type data
Offset 258048
Size 809
Entropy 7.07
PE imports
CoCreateActivity
CoLoadServices
OpenThread
ReplaceFileA
CreateJobObjectA
UpdateResourceW
WaitForSingleObject
lstrcmp
GetTickCount
GetVolumeInformationA
GetCurrentProcessId
GetPrivateProfileIntA
CreateDirectoryA
OpenFileMappingA
GetDateFormatW
InterlockedDecrement
GetCommandLineA
GetProcAddress
OpenMutexA
CreateMutexA
MoveFileExW
GetModuleHandleA
CloseHandle
SetLocalTime
GetGeoInfoW
SetEnvironmentVariableA
ReadConsoleA
SetCurrentDirectoryA
GetLogicalDriveStringsW
FindAtomA
TlsGetValue
GetFullPathNameW
CreateFileA
GetCurrentThreadId
GetNumberFormatW
OpenJobObjectA
CPEncrypt
CPDeriveKey
CPCreateHash
DragQueryFileW
FindExecutableA
SHChangeNotify
ShellExecuteW
ExtractIconW
SHBrowseForFolderA
StrChrA
SHGetDataFromIDListA
StrStrW
ShellMessageBoxA
SHFileOperationA
SHEmptyRecycleBinA
FormatEx
Extend
Number of PE resources by type
FEDC 2
Number of PE resources by language
ENGLISH US 2
PE resources
File identification
MD5 82f731f438f85b4171c77b24adcaf72c
SHA1 56f2fb007f2fb35ec8eb2a06b45f1e28cdb7e329
SHA256 8ec5f8c77bfd50534df03a2fa961104033c88829e013a34db65edcc1d01ede0b
ssdeep
3072:/m8XtDut2RQntsNX6z+ct7jr5+zj0MEWyPXU+1ynbA3akvSTmVsQjrGKAJf7kELq:/mL7tAUtl+zA1nP4nFTAPg7kOJU

authentihash dceb2deeed06d02903c1b693f3c23094093539c80b6f6d9bdcc1351ea2749e4b
imphash 298da78626759c32264fba0c10e5162c
File size 252.8 KB ( 258857 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe overlay suspicious-udp

VirusTotal metadata
First submission 2017-02-17 14:58:39 UTC ( 1 year, 12 months ago )
Last submission 2017-02-17 14:58:39 UTC ( 1 year, 12 months ago )
File names Roaming.Exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
UDP communications