× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8f6f16527053e1973645974039e11bc83ffd22a91c7bb223049c0993ea5c1c69
File name: 77590
Detection ratio: 1 / 58
Analysis date: 2016-03-28 03:40:03 UTC ( 2 years, 12 months ago ) View latest
Antivirus Result Update
Bkav HW32.Packed.C1AE 20160327
Ad-Aware 20160328
AegisLab 20160328
Yandex 20160316
AhnLab-V3 20160327
Alibaba 20160323
ALYac 20160328
Antiy-AVL 20160327
Arcabit 20160328
Avast 20160328
AVG 20160328
Avira (no cloud) 20160327
AVware 20160328
Baidu 20160325
Baidu-International 20160327
BitDefender 20160328
ByteHero 20160328
CAT-QuickHeal 20160326
ClamAV 20160326
CMC 20160322
Comodo 20160328
Cyren 20160328
DrWeb 20160328
Emsisoft 20160328
ESET-NOD32 20160327
F-Prot 20160328
F-Secure 20160328
Fortinet 20160328
GData 20160328
Ikarus 20160327
Jiangmin 20160328
K7AntiVirus 20160327
K7GW 20160323
Kaspersky 20160328
Kingsoft 20160328
Malwarebytes 20160328
McAfee 20160328
McAfee-GW-Edition 20160328
Microsoft 20160328
eScan 20160328
NANO-Antivirus 20160328
nProtect 20160325
Panda 20160327
Qihoo-360 20160328
Rising 20160328
Sophos AV 20160328
SUPERAntiSpyware 20160327
Symantec 20160328
Tencent 20160328
TheHacker 20160328
TotalDefense 20160328
TrendMicro 20160328
TrendMicro-HouseCall 20160328
VBA32 20160326
VIPRE 20160328
ViRobot 20160328
Zillya 20160326
Zoner 20160328
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT ZIP
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-07-23 17:30:02
Entry Point 0x00007EB8
Number of sections 5
PE sections
PE imports
GetDeviceCaps
CreateDCA
DeleteDC
SelectObject
GetTextExtentPoint32A
CreateFontIndirectA
ExtTextOutA
DeleteObject
SetTextAlign
SetBkColor
GetBkColor
SetTextColor
GetStdHandle
GetConsoleOutputCP
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
SetErrorMode
_llseek
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetStringTypeA
WriteFile
_lopen
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
LocalFree
GetEnvironmentVariableA
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetSystemTime
InitializeCriticalSection
IsDebuggerPresent
ExitProcess
FlushFileBuffers
RemoveDirectoryA
GetVolumeInformationA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
_lclose
SetUnhandledExceptionFilter
MoveFileExA
GlobalMemoryStatus
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GlobalLock
_lread
GetProcessHeap
_lcreat
FindFirstFileA
CreateFileMappingA
FindNextFileA
TerminateProcess
GetProcAddress
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
GetModuleFileNameA
WinExec
OpenFile
_lwrite
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
GetCPInfo
HeapSize
GetCommandLineA
MapViewOfFile
TlsFree
GetModuleHandleA
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
IsValidCodePage
UnmapViewOfFile
VirtualFree
Sleep
VirtualAlloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteExA
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
SetWindowWord
GetSystemMetrics
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
PostMessageA
CharUpperBuffA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
GetSysColor
SetActiveWindow
LoadStringA
SetWindowTextA
SendDlgItemMessageA
GetLastActivePopup
SendMessageA
GetClientRect
GetDlgItem
RegisterClassA
SetRect
InvalidateRect
GetWindowLongA
SetTimer
LoadCursorA
LoadIconA
GetTopWindow
CharNextA
GetWindowWord
EnableWindow
SetForegroundWindow
SetCursor
Number of PE resources by type
RT_STRING 7
RT_DIALOG 2
RT_ICON 1
RT_MANIFEST 1
WZ_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 13
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2007:07:23 18:30:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
61440

LinkerVersion
8.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x7eb8

InitializedDataSize
61440

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 bd90e6f1d4e596eec41e852407b40de8
SHA1 e7a08e23eba70396762fef5df9fd89b10abc53d5
SHA256 8f6f16527053e1973645974039e11bc83ffd22a91c7bb223049c0993ea5c1c69
ssdeep
49152:0dimuZFvt4ozaW2LZqmvaUKn3oXT2Fn4Cuf7pSg33BEiG+w3wAa0ca4zW:0LuZdtUvcmvhlXTG4Rj+uwtaFW

authentihash 50ba3e48e6793fdb51e5e5cbbea3e1f9fd36500a9d5e58c59d0dca259d637698
imphash 854c336ac5ca4c481669547aa2d2a66f
File size 2.9 MB ( 3067904 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (30.3%)
Win32 Executable MS Visual C++ (generic) (21.9%)
Win64 Executable (generic) (19.4%)
Winzip Win32 self-extracting archive (generic) (16.1%)
Win32 Dynamic Link Library (generic) (4.6%)
Tags
peexe

VirusTotal metadata
First submission 2009-09-03 10:32:22 UTC ( 9 years, 6 months ago )
Last submission 2018-05-16 00:28:15 UTC ( 10 months, 1 week ago )
File names output.17130607.txt
77590
1284299463-hnv3demo.exe
hnv3demo.exe
8F6F16527053E1973645974039E11BC83FFD22A91C7BB223049C0993EA5C1C69
hnv3demo.exe
hnv3demo.exe
17130607
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!