× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 95ef2944f6d82fea3cc9b9b4d7c844febed9c285bfcbdfaee5f609b26fbf5437
File name: PO & NEW ORDERS.exe
Detection ratio: 8 / 41
Analysis date: 2013-01-31 09:01:56 UTC ( 5 years, 5 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Spyware/Win32.Zbot 20130131
Commtouch W32/Zbot.GH.gen!Eldorado 20130131
Ikarus Trojan.Win32.Bublik 20130131
K7AntiVirus Spyware 20130130
Kingsoft VIRUS_UNKNOWN 20130131
Malwarebytes Trojan.Zbot 20130131
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious-PKR.K 20130131
Sophos AV Mal/ResInj-A 20130131
Yandex 20130130
AntiVir 20130131
Antiy-AVL 20130130
Avast 20130131
AVG 20130131
BitDefender 20130131
ByteHero 20130131
CAT-QuickHeal 20130131
Comodo 20130131
Emsisoft 20130131
eSafe 20130131
ESET-NOD32 20130130
F-Secure 20130131
Fortinet 20130131
GData 20130131
Jiangmin 20121221
McAfee 20130131
Microsoft 20130131
eScan 20130131
NANO-Antivirus 20130131
Norman 20130130
nProtect 20130130
Panda 20130130
PCTools 20130131
Rising 20130131
SUPERAntiSpyware 20130131
TheHacker 20130129
TotalDefense 20130130
TrendMicro 20130131
TrendMicro-HouseCall 20130131
VBA32 20130130
VIPRE 20130131
ViRobot 20130131
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
Command NSIS
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-03-31 15:09:55
Entry Point 0x0000315D
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
GetTickCount
CreateDirectoryA
GlobalUnlock
LoadLibraryA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
SetFileTime
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
ExitProcess
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
DestroyWindow
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
LoadImageA
GetDlgItemTextA
DialogBoxParamA
MessageBoxA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
BeginPaint
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
CharNextA
CallWindowProcA
EnableWindow
CloseClipboard
SetCursor
ExitWindowsEx
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_ICON 6
RT_DIALOG 3
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 10
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2007:03:31 16:09:55+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
23552

LinkerVersion
6.0

FileAccessDate
2014:04:08 02:20:18+01:00

EntryPoint
0x315d

InitializedDataSize
165376

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

FileCreateDate
2014:04:08 02:20:18+01:00

UninitializedDataSize
1024

Compressed bundles
File identification
MD5 383194a666bb7792b57ce9c8e733ae97
SHA1 bab1e9f3741fa7036d552115731badc23eb32ce3
SHA256 95ef2944f6d82fea3cc9b9b4d7c844febed9c285bfcbdfaee5f609b26fbf5437
ssdeep
6144:6R3/Cmf7EFD8eP5D915grDUmJiHwEik+UpmimLCd:nmf4x9/grDmwEmUvz

imphash 4d17be67c8d0394c5c1b8e725359ed89
File size 539.9 KB ( 552883 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe

VirusTotal metadata
First submission 2013-01-31 09:01:56 UTC ( 5 years, 5 months ago )
Last submission 2013-02-02 22:17:42 UTC ( 5 years, 5 months ago )
File names 383194a666bb7792b57ce9c8e733ae97
PO & NEW ORDERS.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Created processes
Shell commands
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.