× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9bd981c46c781c98047ad4d5416d378fc5993dcee0dbd1bc1ae4b0b43f1bca70
File name: file-2233812_exe
Detection ratio: 2 / 42
Analysis date: 2011-05-13 05:06:54 UTC ( 6 years, 7 months ago ) View latest
Antivirus Result Update
Comodo Heur.Suspicious 20110513
DrWeb Trojan.Inject.39129 20110513
AhnLab-V3 20110512
AntiVir 20110513
Antiy-AVL 20110512
Avast 20110512
Avast5 20110512
AVG 20110513
BitDefender 20110513
CAT-QuickHeal 20110513
ClamAV 20110513
Commtouch 20110513
eSafe 20110512
eTrust-Vet 20110512
F-Prot 20110512
F-Secure 20110513
Fortinet 20110513
GData 20110513
Ikarus 20110513
Jiangmin 20110512
K7AntiVirus 20110512
Kaspersky 20110511
McAfee 20110513
McAfee-GW-Edition 20110512
Microsoft 20110512
NOD32 20110513
Norman 20110512
nProtect 20110513
Panda 20110512
PCTools 20110512
Prevx 20110513
Rising 20110512
Sophos AV 20110513
SUPERAntiSpyware 20110513
Symantec 20110513
TheHacker 20110511
TrendMicro 20110513
TrendMicro-HouseCall 20110513
VBA32 20110512
VIPRE 20110513
ViRobot 20110513
VirusBuster 20110512
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
FileVersionInfo properties
Product V
Original name vd.exe
Internal name Home
File version 1,0,0,0
Description Operating
PE header basic information
Number of sections 5
PE sections
PE imports
LoadLibraryA
GetModuleHandleA
CreateThread
WaitForSingleObject
GetCommandLineA
GetProcAddress
GetLastError
HeapFree
HeapAlloc
GetVersionExA
GetProcessHeap
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
Sleep
RtlUnwind
HeapSize
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
FlushFileBuffers
File identification
MD5 cbb9286cf634bbf2f3c386a17b03a1f8
SHA1 46d71c55d9361a43039f904371ee96bca4cbc104
SHA256 9bd981c46c781c98047ad4d5416d378fc5993dcee0dbd1bc1ae4b0b43f1bca70
ssdeep
12288:ua0MqmXHGcWf0S7dcS7eqO4R/h7/ojtScgydrI8zimM4r5oJD4ZM:ubMxXHwsti7lb7gBzJlM6rZM

File size 1.6 MB ( 1662976 bytes )
File type Win32 EXE
Magic literal

TrID Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%)
VirusTotal metadata
First submission 2011-05-12 20:13:31 UTC ( 6 years, 7 months ago )
Last submission 2011-06-06 15:15:59 UTC ( 6 years, 6 months ago )
File names xxxvideo2.avi.exe
xxxvideo3.avi.exe
cbb9286cf634bbf2f3c386a17b03a1f8
file-2233812_exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!