× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9048d9b2748bb6218112d47546d73a184603fce417e70364462fd527de65fb25
File name: elementclient.exe
Detection ratio: 2 / 41
Analysis date: 2012-06-23 19:43:37 UTC ( 6 years, 7 months ago )
Antivirus Result Update
eSafe SuspiciousR-Mytob3 20120621
McAfee-GW-Edition Heuristic.LooksLike.Win32.SuspiciousPE.N 20120623
AhnLab-V3 20120623
AntiVir 20120623
Antiy-AVL 20120623
Avast 20120623
AVG 20120623
BitDefender 20120623
ByteHero 20120618
CAT-QuickHeal 20120623
ClamAV 20120623
Commtouch 20120623
DrWeb 20120623
Emsisoft 20120623
F-Prot 20120623
F-Secure 20120623
Fortinet 20120623
GData 20120623
Ikarus 20120623
Jiangmin 20120623
K7AntiVirus 20120622
Kaspersky 20120623
McAfee 20120623
Microsoft 20120623
NOD32 20120622
Norman 20120622
nProtect 20120623
Panda 20120623
PCTools 20120623
Rising 20120621
Sophos AV 20120623
SUPERAntiSpyware 20120623
Symantec 20120623
TheHacker 20120621
TotalDefense 20120622
TrendMicro 20120623
TrendMicro-HouseCall 20120623
VBA32 20120622
VIPRE 20120623
ViRobot 20120623
VirusBuster 20120623
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT Molebox
PEiD MoleBox V2.3X -> MoleStudio.com
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-09-14 03:45:26
Entry Point 0x00762B33
Number of sections 10
PE sections
PE imports
InitializeCriticalSection, GetProcAddress, LocalFree, RaiseException, LocalAlloc, GetModuleHandleA, LeaveCriticalSection, EnterCriticalSection, GetShortPathNameA, ResumeThread, WriteProcessMemory, GetPrivateProfileSectionA, GetStringTypeA, LCMapStringW, LCMapStringA, RtlUnwind, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW
DefWindowProcA, AdjustWindowRectEx
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:09:14 05:45:26+02:00

FileType
Win32 EXE

PEType
PE32

CodeSize
0

LinkerVersion
6.0

EntryPoint
0x762b33

InitializedDataSize
3837952

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 988719234f588b0f08e596d90cfc8dc9
SHA1 11b20281d4d6648536cb569954fb9b8e619801d3
SHA256 9048d9b2748bb6218112d47546d73a184603fce417e70364462fd527de65fb25
ssdeep
98304:VfYknVWLzQHKCaJgQSnhBOXH+zy61stPDMP/gplGlAabl3OjCwvRcmDMyo:LnKQFgdSnhoXejstA/gplXaqSmDMyo

File size 6.2 MB ( 6497950 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Generic (68.0%)
Generic Win/DOS Executable (15.9%)
DOS Executable Generic (15.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
molebox

VirusTotal metadata
First submission 2012-06-23 19:43:37 UTC ( 6 years, 7 months ago )
Last submission 2012-06-23 19:43:37 UTC ( 6 years, 7 months ago )
File names elementclient.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!