× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 924bf12e81e94996239118d168cf3154604cfb40986e77526d651a396da491e7
File name: tprepl.exe
Detection ratio: 51 / 54
Analysis date: 2016-07-08 04:18:51 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Generic.KD.914347 20160708
AegisLab Packer.W32.Krap.lJyH 20160708
AhnLab-V3 Trojan/Win32.HmBlocker.N955484785 20160707
ALYac Trojan.Generic.KD.914347 20160708
Antiy-AVL Worm[Net]/Win32.Kolab 20160708
Arcabit Trojan.Generic.KD.DDF3AB 20160708
Avast Win32:Malware-gen 20160708
AVG Dropper.Generic7.COFM 20160708
Avira (no cloud) TR/Dropper.Gen 20160708
AVware Trojan.Win32.Agent.aaxv (v) 20160708
Baidu Win32.Trojan.Injector.dt 20160706
BitDefender Trojan.Generic.KD.914347 20160708
Bkav W32.KeyloggerLTHVAP.Trojan 20160707
CAT-QuickHeal Trojan.Ircbrute.SU5 20160707
ClamAV Win.Trojan.Agent-1073066 20160708
Comodo TrojWare.Win32.Injector.BGJ 20160708
Cyren W32/Trojan.WLUI-7811 20160708
DrWeb BackDoor.Gurl.2 20160708
Emsisoft Trojan.Generic.KD.914347 (B) 20160708
ESET-NOD32 Win32/Injector.AEJX 20160707
F-Prot W32/Trojan2.NWBR 20160708
F-Secure Trojan.Generic.KD.914347 20160708
Fortinet W32/Injector.AEJX!tr 20160708
GData Trojan.Generic.KD.914347 20160708
Ikarus Trojan.Win32.Ircbrute 20160707
Jiangmin Backdoor/Azbreg.aoo 20160707
K7AntiVirus Trojan ( 0040f5791 ) 20160707
K7GW Trojan ( 0040f5791 ) 20160708
Kaspersky HEUR:Trojan.Win32.Generic 20160708
Malwarebytes Worm.AutoRun 20160708
McAfee Obfuscated-FQV!hb 20160708
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.pt 20160708
Microsoft Trojan:Win32/Lethic.B 20160708
eScan Trojan.Generic.KD.914347 20160708
NANO-Antivirus Trojan.Win32.Gurl.brorzr 20160708
nProtect Trojan.Generic.KD.914347 20160707
Panda Trj/Zbot.M 20160707
Qihoo-360 HEUR/Malware.QVM07.Gen 20160708
Sophos AV Troj/Agent-AAXV 20160708
SUPERAntiSpyware Trojan.Agent/Gen-Dropper 20160708
Symantec Packed.Generic.326 20160708
Tencent Win32.Trojan.Generic.Wrzx 20160708
TheHacker Trojan/Injector.aejx 20160707
TotalDefense Win32/Lethic.THCJaN 20160708
TrendMicro TROJ_LETHIC.OU 20160708
TrendMicro-HouseCall TROJ_LETHIC.OU 20160708
VBA32 BScope.Backdoor.IRCBot.2122 20160707
VIPRE Trojan.Win32.Agent.aaxv (v) 20160708
ViRobot Worm.Win32.Net-Kolab.68231[h] 20160707
Zillya Trojan.HmBlocker.Win32.3851 20160707
Zoner Trojan.Lethic.AA 20160708
Alibaba 20160708
CMC 20160704
Kingsoft 20160708
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-10-28 19:00:30
Entry Point 0x0000160F
Number of sections 5
PE sections
Overlays
MD5 7deac3fea3c4dcf6b0e75ec991d8ebbb
File type ASCII text
Offset 40960
Size 1285
Entropy 0.00
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
LCMapStringA
HeapDestroy
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetCurrentProcess
GetEnvironmentStrings
AddAtomA
GetCPInfo
UnhandledExceptionFilter
MultiByteToWideChar
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
WriteFile
GetStartupInfoA
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
TlsGetValue
GetFileType
GetTickCount
TlsSetValue
HeapAlloc
GetVersion
VirtualAlloc
SetLastError
LeaveCriticalSection
DrawAnimatedRects
FlashWindowEx
Number of PE resources by type
Struct(202) 1
Struct(211) 1
Number of PE resources by language
GERMAN NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2011:10:28 20:00:30+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
6.0

FileTypeExtension
exe

InitializedDataSize
16384

SubsystemVersion
4.0

EntryPoint
0x160f

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 d1e5ed0d66ee2019c24525e7d95b623f
SHA1 319a41a506a08836b26b287f034deb54550bbc9f
SHA256 924bf12e81e94996239118d168cf3154604cfb40986e77526d651a396da491e7
ssdeep
384:7pcTPJTRb47dEbmltqyA6FVvQQVU+oE3lshxe88L7NDnRPMSL:7CbJTWdEDgbvXF3ljNySL

authentihash 0dc99f7d5172e0f1f349d19892676b0612f47d4d51dc48d7e02de75f0315873d
imphash b41f22486d4aa79695588232cb2c7b00
File size 41.3 KB ( 42245 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 5.0 (56.7%)
Win32 Executable MS Visual C++ (generic) (29.1%)
Win32 Dynamic Link Library (generic) (6.1%)
Win32 Executable (generic) (4.2%)
Generic Win/DOS Executable (1.8%)
Tags
peexe armadillo usb-autorun overlay

VirusTotal metadata
First submission 2013-09-18 11:03:38 UTC ( 5 years, 6 months ago )
Last submission 2016-04-03 22:11:17 UTC ( 2 years, 11 months ago )
File names 8522.exe
tprepl.exe
file-5984974_
prepare.exe
tprepl.exe
5403.exe
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
UDP communications