× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a8165334d873a3ca11aedf7071e26affeb85e3191d2f56046f46bd2734dfbece
File name: Shortcut_byexe.exe
Detection ratio: 10 / 48
Analysis date: 2014-03-07 20:06:15 UTC ( 3 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Trojan.Heur.FU.amW@aO0fsg 20140307
AhnLab-V3 Trojan/Win32.HDC 20140307
Antiy-AVL Trojan/Win32.Tgenic 20140307
BitDefender Gen:Trojan.Heur.FU.amW@aO0fsg 20140307
Emsisoft Gen:Trojan.Heur.FU.amW@aO0fsg (B) 20140307
F-Secure Gen:Trojan.Heur.FU.amW@aO0fsg 20140307
GData Gen:Trojan.Heur.FU.amW@aO0fsg 20140307
Kingsoft Win32.Troj.Undef.(kcloud) 20140307
eScan Gen:Trojan.Heur.FU.amW@aO0fsg 20140307
Qihoo-360 Malware.QVM20.Gen 20140307
Yandex 20140307
AntiVir 20140307
Avast 20140307
AVG 20140307
Baidu-International 20140307
Bkav 20140306
ByteHero 20140307
CAT-QuickHeal 20140307
ClamAV 20140307
CMC 20140307
Commtouch 20140307
Comodo 20140307
DrWeb 20140307
ESET-NOD32 20140307
F-Prot 20140307
Fortinet 20140307
Ikarus 20140307
Jiangmin 20140307
K7AntiVirus 20140307
K7GW 20140307
Kaspersky 20140307
Malwarebytes 20140307
McAfee 20140307
McAfee-GW-Edition 20140307
Microsoft 20140307
NANO-Antivirus 20140307
Norman 20140307
nProtect 20140307
Panda 20140307
Rising 20140307
Sophos AV 20140307
SUPERAntiSpyware 20140307
Symantec 20140307
TheHacker 20140305
TotalDefense 20140306
TrendMicro 20140307
TrendMicro-HouseCall 20140307
VBA32 20140307
VIPRE 20140307
ViRobot 20140307
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-05-05 20:38:53
Entry Point 0x00001000
Number of sections 3
PE sections
PE imports
ExitProcess
ShellExecuteA
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2006:05:05 21:38:53+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
512

LinkerVersion
8.0

FileAccessDate
2014:05:14 02:30:54+01:00

EntryPoint
0x1000

InitializedDataSize
8192

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

FileCreateDate
2014:05:14 02:30:54+01:00

UninitializedDataSize
0

File identification
MD5 27564c24cbaa24e55c5969a349bc7b60
SHA1 e8b23baece5a6f92483865a673acf352d7fd0674
SHA256 a8165334d873a3ca11aedf7071e26affeb85e3191d2f56046f46bd2734dfbece
ssdeep
192:Veq9tfmmmmmmmmmmmmkZWzlc859bEMdP8lN:wq9tzKU9V8

imphash 12a766f495eacd0ff1e35840507cb038
File size 9.5 KB ( 9728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2014-03-07 20:06:15 UTC ( 3 years, 9 months ago )
Last submission 2014-05-14 01:32:34 UTC ( 3 years, 7 months ago )
File names Shortcut_byexe.exe
27564c24cbaa24e55c5969a349bc7b60
7japmYJ.vsd
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Shell commands
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications