× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07
File name: a3d125a2d1fa16bc24adfbe0ef44d4a023b7
Detection ratio: 30 / 57
Analysis date: 2015-03-03 05:18:47 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
ALYac Gen:Variant.Strictor.34908 20150303
AVG Citem_c.KLR 20150302
AVware Trojan.Win32.Generic!BT 20150228
Ad-Aware Gen:Variant.Strictor.34908 20150303
AhnLab-V3 Win-Trojan/Zbot.84144 20150302
Avast Win32:Spyware-gen [Spy] 20150303
Avira TR/Click.EU 20150303
Baidu-International Trojan.Win32.Injector.BJZJ 20150302
BitDefender Gen:Variant.Strictor.34908 20150303
Comodo UnclassifiedMalware 20150303
DrWeb Trojan.Click2.42725 20150303
ESET-NOD32 a variant of Win32/Injector.BJZJ 20150303
Emsisoft Gen:Variant.Strictor.34908 (B) 20150303
F-Secure Gen:Variant.Strictor.34908 20150303
GData Gen:Variant.Strictor.34908 20150303
Ikarus Win32.Spyware 20150303
Kaspersky UDS:DangerousObject.Multi.Generic 20150303
Malwarebytes Trojan.Agent.PHISH 20150303
McAfee Artemis!1AD6AFEEC913 20150303
McAfee-GW-Edition BehavesLike.Win32.Eggnog.mc 20150303
MicroWorld-eScan Gen:Variant.Strictor.34908 20150303
NANO-Antivirus Trojan.Win32.Click2.bfvkck 20150303
Norman Suspicious_Gen4.CHHXW 20150302
Sophos Mal/Generic-S 20150303
Symantec Trojan.ADH 20150303
TrendMicro TROJ_SPNR.15DA13 20150303
TrendMicro-HouseCall TROJ_SPNR.15DA13 20150303
VBA32 SScope.Trojan.Zbot.gen 20150302
VIPRE Trojan.Win32.Generic!BT 20150303
Zillya Trojan.Poison.Win32.3353 20150303
AegisLab 20150303
Agnitum 20150228
Alibaba 20150303
Antiy-AVL 20150303
Bkav 20150302
ByteHero 20150303
CAT-QuickHeal 20150302
CMC 20150301
ClamAV 20150302
Cyren 20150303
F-Prot 20150303
Fortinet 20150303
Jiangmin 20150302
K7AntiVirus 20150302
K7GW 20150303
Kingsoft 20150303
Microsoft 20150303
Panda 20150302
Qihoo-360 20150303
Rising 20150302
SUPERAntiSpyware 20150303
Tencent 20150303
TheHacker 20150303
TotalDefense 20150303
ViRobot 20150303
Zoner 20150302
nProtect 20150302
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-17 02:39:03
Link date 3:39 AM 12/17/2012
Entry Point 0x000050F0
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetStdHandle
FreeLibrary
ExitProcess
LoadLibraryA
RtlUnwind
ExitThread
GetStartupInfoA
SizeofResource
LocalAlloc
UnhandledExceptionFilter
GetCommandLineA
GetProcAddress
RaiseException
CreateThread
GetModuleHandleA
WriteFile
CloseHandle
GetACP
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
TlsSetValue
GetCurrentThreadId
FindResourceA
VirtualAlloc
EndDialog
MoveWindow
SendMessageA
MessageBoxA
SetWindowLongA
DialogBoxParamA
GetKeyboardType
DestroyWindow
Number of PE resources by type
RT_RCDATA 3
RT_ICON 1
RT_GROUP_ICON 1
RT_DIALOG 1
Number of PE resources by language
NEUTRAL 3
ENGLISH US 3
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:12:17 03:39:03+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
13312

LinkerVersion
2.25

EntryPoint
0x50f0

InitializedDataSize
63488

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 1ad6afeec913f4c3a0ffce0093cddf21
SHA1 64a5a3d125a2d1fa16bc24adfbe0ef44d4a023b7
SHA256 a9500f44ef6e7c70b41b3fe42da26861d8efd7dad15fb8234b26e163076dfe07
ssdeep
1536:94VZiq+tFwSOOJ+RLv1vsBXR4eP9FzT1dwwyG:eVZL+XPU68CPXb5

authentihash f1d14ee03b2c39293e6a34232324092b8cd219a1a93e7d4a64c2be456dca9047
imphash 17b7799ef3a3cf1703aefae2ec44dacd
File size 82.2 KB ( 84144 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.3%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-01-25 11:58:16 UTC ( 2 years, 4 months ago )
Last submission 2013-02-06 04:56:53 UTC ( 2 years, 3 months ago )
File names a3d125a2d1fa16bc24adfbe0ef44d4a023b7
file-5087009_EXE
Cry-XOR-file001.hex
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Created processes
Opened mutexes
Runtime DLLs