× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07
File name: a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07.bin
Detection ratio: 32 / 55
Analysis date: 2016-04-24 10:29:42 UTC ( 5 days, 22 hours ago )
Antivirus Result Update
ALYac Gen:Variant.Strictor.34908 20160424
AVG Citem_c.KLR 20160424
AVware Trojan.Win32.Generic!BT 20160424
Ad-Aware Gen:Variant.Strictor.34908 20160424
AhnLab-V3 Win-Trojan/Zbot.84144 20160424
Arcabit Trojan.Strictor.D885C 20160424
Avira (no cloud) TR/Click.EU 20160423
Baidu-International Trojan.Win32.Injector.BJZJ 20160424
BitDefender Gen:Variant.Strictor.34908 20160424
ClamAV Win.Trojan.Agent-584689 20160423
Comodo UnclassifiedMalware 20160424
DrWeb Trojan.Click2.42725 20160424
ESET-NOD32 a variant of Win32/Poison.NNR 20160424
Emsisoft Gen:Variant.Strictor.34908 (B) 20160424
F-Secure Gen:Variant.Strictor.34908 20160424
GData Gen:Variant.Strictor.34908 20160424
Ikarus Trojan.SuspectCRC 20160424
Kaspersky UDS:DangerousObject.Multi.Generic 20160424
McAfee Artemis!1AD6AFEEC913 20160424
McAfee-GW-Edition BehavesLike.Win32.Nofear.mc 20160424
eScan Gen:Variant.Strictor.34908 20160424
NANO-Antivirus Trojan.Win32.Click2.bfvkck 20160424
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20160424
Sophos Mal/Generic-S 20160424
Symantec Trojan.ADH 20160424
Tencent Win32.Trojan.Spnr.Ebri 20160424
TheHacker Trojan/Injector.bjzj 20160422
TrendMicro TROJ_SPNR.15DA13 20160424
TrendMicro-HouseCall TROJ_SPNR.15DA13 20160424
VBA32 SScope.Trojan.Zbot.gen 20160423
VIPRE Trojan.Win32.Generic!BT 20160424
Zillya Trojan.Poison.Win32.3353 20160423
AegisLab 20160424
Alibaba 20160424
Antiy-AVL 20160424
Avast 20160424
Baidu 20160422
Bkav 20160423
CAT-QuickHeal 20160423
CMC 20160421
Cyren 20160424
F-Prot 20160424
Fortinet 20160424
K7AntiVirus 20160424
K7GW 20160423
Kingsoft 20160424
Malwarebytes 20160424
Microsoft 20160424
Panda 20160424
Qihoo-360 20160424
SUPERAntiSpyware 20160424
ViRobot 20160424
Yandex 20160423
Zoner 20160424
nProtect 20160422
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-17 02:39:03
Entry Point 0x000050F0
Number of sections 9
PE sections
Overlays
MD5 317242fba65db090c9a20009584c19fb
File type data
Offset 77824
Size 6320
Entropy 7.30
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetStdHandle
FreeLibrary
ExitProcess
LoadLibraryA
RtlUnwind
ExitThread
GetStartupInfoA
SizeofResource
LocalAlloc
UnhandledExceptionFilter
GetCommandLineA
GetProcAddress
RaiseException
CreateThread
GetModuleHandleA
WriteFile
CloseHandle
GetACP
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
TlsSetValue
GetCurrentThreadId
FindResourceA
VirtualAlloc
EndDialog
MoveWindow
SendMessageA
MessageBoxA
SetWindowLongA
DialogBoxParamA
GetKeyboardType
DestroyWindow
Number of PE resources by type
RT_RCDATA 3
RT_ICON 1
RT_GROUP_ICON 1
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 3
ENGLISH US 3
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:12:17 03:39:03+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
13312

LinkerVersion
2.25

EntryPoint
0x50f0

InitializedDataSize
63488

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 1ad6afeec913f4c3a0ffce0093cddf21
SHA1 64a5a3d125a2d1fa16bc24adfbe0ef44d4a023b7
SHA256 a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07
ssdeep
1536:94VZiq+tFwSOOJ+RLv1vsBXR4eP9FzT1dwwyG:eVZL+XPU68CPXb5

authentihash f1d14ee03b2c39293e6a34232324092b8cd219a1a93e7d4a64c2be456dca9047
imphash 17b7799ef3a3cf1703aefae2ec44dacd
File size 82.2 KB ( 84144 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.3%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2013-01-25 11:58:16 UTC ( 3 years, 3 months ago )
Last submission 2016-04-24 10:29:42 UTC ( 5 days, 22 hours ago )
File names a3d125a2d1fa16bc24adfbe0ef44d4a023b7
a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07.bin
file-5087009_EXE
Cry-XOR-file001.hex
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Created processes
Opened mutexes
Runtime DLLs