× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9069aa4ce2bf01e51b58387a0d66661e1dce5e740f4c1810ffc13520b655011e
File name: filtre.exe
Detection ratio: 17 / 55
Analysis date: 2015-08-06 09:02:39 UTC ( 3 weeks, 4 days ago )
Antivirus Result Update
AVG SHeur3.BWOB 20150806
AVware Trojan.Win32.Generic!BT 20150806
Avast Win32:Dropper-gen [Drp] 20150806
Avira TR/Agent.apc.87 20150806
ClamAV Win.Trojan.Agent-714175 20150805
Comodo Heur.Suspicious 20150806
GData Win32.Trojan.Agent.LRHWFV 20150806
Ikarus Trojan.Win32.SuspectCRC 20150806
Jiangmin Trojan/Delf.tmb 20150804
Kingsoft Win32.Malware.Heur_Generic.B.(kcloud) 20150806
McAfee Artemis!E08FA5AC6CD5 20150806
McAfee-GW-Edition BehavesLike.Win32.BadFile.cc 20150805
Qihoo-360 Win32/Trojan.b32 20150806
Rising PE:Trojan.Win32.Generic.152E0E19!355339801 20150731
Symantec Trojan.Gen.2 20150806
TrendMicro TROJ_GEN.R0C1C0ECC15 20150806
VIPRE Trojan.Win32.Generic!BT 20150806
ALYac 20150806
Ad-Aware 20150806
AegisLab 20150806
Agnitum 20150805
AhnLab-V3 20150806
Alibaba 20150803
Antiy-AVL 20150806
Arcabit 20150806
Baidu-International 20150805
BitDefender 20150806
Bkav 20150805
ByteHero 20150806
CAT-QuickHeal 20150806
Cyren 20150806
DrWeb 20150806
ESET-NOD32 20150806
Emsisoft 20150806
F-Prot 20150806
F-Secure 20150806
Fortinet 20150804
K7AntiVirus 20150806
K7GW 20150806
Kaspersky 20150806
Malwarebytes 20150806
MicroWorld-eScan 20150806
Microsoft 20150806
NANO-Antivirus 20150806
Panda 20150805
SUPERAntiSpyware 20150805
Sophos 20150806
Tencent 20150806
TheHacker 20150805
TrendMicro-HouseCall 20150806
VBA32 20150806
ViRobot 20150806
Zillya 20150805
Zoner 20150806
nProtect 20150805
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
EaxSoft Yaz?l?m Teknolojileri

Publisher EaxSoft Yaz?l?m Teknolojileri
Product ?nter Filtre Koruma Arac?
Original name filtre.exe
Internal name ?nter Filtre Koruma Arac?
File version 4.5.0.0
Description Koruma Arac?
Packers identified
PEiD ASPack v2.12
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-03-28 01:46:15
Link date 2:46 AM 3/28/2011
Entry Point 0x00080001
Number of sections 11
PE sections
PE imports
RegQueryValueExA
StartServiceCtrlDispatcherA
ReportEventA
_TrackMouseEvent
UnrealizeObject
GetProcAddress
GetModuleHandleA
LoadLibraryA
CoTaskMemFree
GetErrorInfo
SysFreeString
SafeArrayPtrOfIndex
CreateWindowExA
GetKeyboardType
VerQueryValueA
Number of PE resources by type
RT_STRING 14
RT_GROUP_CURSOR 7
RT_CURSOR 7
RT_RCDATA 3
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 18
ENGLISH US 14
TURKISH DEFAULT 3
ExifTool file metadata
LegalTrademarks
EaxSoft Yaz l m Teknolojileri

SubsystemVersion
4.0

LinkerVersion
2.25

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.5.0.0

LanguageCode
Turkish

FileFlagsMask
0x003f

FileDescription
Koruma Arac

CharacterSet
Windows, Turkish

InitializedDataSize
68608

EntryPoint
0x80001

OriginalFileName
filtre.exe

MIMEType
application/octet-stream

LegalCopyright
EaxSoft Yaz l m Teknolojileri

FileVersion
4.5.0.0

TimeStamp
2011:03:28 02:46:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
nter Filtre Koruma Arac

ProductVersion
4.5.0.0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
EaxSoft Yaz l m Teknolojileri

CodeSize
416256

ProductName
nter Filtre Koruma Arac

ProductVersionNumber
4.5.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e08fa5ac6cd57141a5faa44ce43c6a0e
SHA1 e6381dd013c820a76ad7b84f8d3d6d60d31913d0
SHA256 9069aa4ce2bf01e51b58387a0d66661e1dce5e740f4c1810ffc13520b655011e
ssdeep
3072:pXJWFnGJAck0uy4S5smDgCjaAL+VB+KhUIL6Pv+y4CS9tVgstR58X9k:pXJc2k0DAmk2NpUF+3tWpj58

authentihash 0f8eaa91671e236061499646df23a32277bd6215cc4e84ca1e4b4db604b4d879
imphash b077047ee671fa8fb8cd990d7e68dcee
File size 196.0 KB ( 200704 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.3%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe aspack

VirusTotal metadata
First submission 2011-04-24 08:17:48 UTC ( 4 years, 4 months ago )
Last submission 2015-08-06 09:02:39 UTC ( 3 weeks, 4 days ago )
File names _nter Filtre Koruma Arac_
3AAA163C0077437C105C038BD2C9F600DB479D01.exe
filtre.exe
filtre.exe
vti-rescan
deneme.exe
?nter Filtre Koruma Arac?
e08fa5ac6cd57141a5faa44ce43c6a0e
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R0C1C0ECC15.

Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Copied files
Created processes
Searched windows
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications