× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ba386050f30bec5f046ea235950eed2805487a119e227757e74a7e34d0826370
File name: ab82ed524deb46fcbc0fc8285c1f07e5
Detection ratio: 19 / 55
Analysis date: 2016-08-01 19:51:17 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Razy.84508 20160801
AhnLab-V3 Malware/Win32.Generic.C1511820 20160801
ALYac Gen:Variant.Razy.84508 20160801
Arcabit Trojan.Razy.D14A1C 20160801
AVG Crypt5.CCSZ 20160801
Avira (no cloud) TR/Crypt.ZPACK.wdol 20160801
Baidu Win32.Trojan.WisdomEyes.151026.9950.9995 20160801
BitDefender Gen:Variant.Razy.84508 20160801
Emsisoft Gen:Variant.Razy.84508 (B) 20160801
ESET-NOD32 a variant of Win32/Kryptik.FDHP 20160801
F-Secure Gen:Variant.Razy.84508 20160801
GData Gen:Variant.Razy.84508 20160801
Malwarebytes Trojan.Tinba 20160801
McAfee Artemis!AB82ED524DEB 20160801
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.cc 20160801
eScan Gen:Variant.Razy.84508 20160801
Panda Trj/Genetic.gen 20160801
Qihoo-360 QVM20.1.Malware.Gen 20160801
Tencent Win32.Trojan.Kryptik.Lori 20160801
AegisLab 20160801
Alibaba 20160801
Antiy-AVL 20160801
Avast 20160801
AVware 20160801
Bkav 20160801
CAT-QuickHeal 20160801
ClamAV 20160801
CMC 20160801
Comodo 20160801
Cyren 20160801
DrWeb 20160801
F-Prot 20160801
Fortinet 20160801
Ikarus 20160801
Jiangmin 20160801
K7AntiVirus 20160801
K7GW 20160801
Kaspersky 20160801
Kingsoft 20160801
Microsoft 20160801
NANO-Antivirus 20160801
nProtect 20160729
Sophos AV 20160801
SUPERAntiSpyware 20160801
Symantec 20160801
TheHacker 20160729
TotalDefense 20160801
TrendMicro 20160801
TrendMicro-HouseCall 20160801
VBA32 20160801
VIPRE 20160801
ViRobot 20160801
Yandex 20160731
Zillya 20160731
Zoner 20160801
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-07-14 10:54:05
Entry Point 0x000182E8
Number of sections 4
PE sections
PE imports
CloseClusterGroup
ClusterControl
CloseClusterNode
ClusterEnum
CloseCluster
ErrMsgParam
CheckADsError
CrackName
GetFileAttributesA
GetOEMCP
RemoveDirectoryA
WaitForSingleObjectEx
lstrlenW
HeapReAlloc
GetDateFormatA
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateWaitableTimerW
CompareStringW
lstrcpyW
MoveFileExW
GetModuleHandleA
ReadFile
WriteFile
GetStartupInfoA
GetVolumeNameForVolumeMountPointW
OpenMutexW
lstrcpynA
FindNextFileA
GetDiskFreeSpaceA
GetBinaryTypeA
GetLogicalDriveStringsW
CreateFileA
WriteConsoleW
SHGetFileInfoA
ShellAboutA
StrChrW
SHFree
DragQueryFileW
SHChangeNotify
DuplicateIcon
SHGetDiskFreeSpaceA
SHGetMalloc
SHUpdateImageA
FindExecutableW
SHGetDesktopFolder
SHGetNewLinkInfoW
SHFileOperationA
DragFinish
SE_InstallAfterInit
SE_IsShimDll
SE_DllLoaded
SE_ProcessDying
SE_InstallBeforeInit
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2012:07:14 11:54:05+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
99840

LinkerVersion
6.0

Warning
Possibly corrupt Version resource

EntryPoint
0x182e8

InitializedDataSize
7680

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 ab82ed524deb46fcbc0fc8285c1f07e5
SHA1 bc069abf607d3016a3aa65ddd3047ca2a690622e
SHA256 ba386050f30bec5f046ea235950eed2805487a119e227757e74a7e34d0826370
ssdeep
3072:2diqAEDgD/2BAQmg1GD2r7ZJ1lmTJd6a:wiaDo/Vy1GojL+

authentihash 62924f74b5609ac11b51b642866428c3fd37e6de8d067db9afae28731fbf99b4
imphash e9b21559f465e41a290f721f6f460800
File size 106.0 KB ( 108544 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe

VirusTotal metadata
First submission 2016-08-01 19:51:17 UTC ( 2 years, 6 months ago )
Last submission 2016-08-01 19:51:17 UTC ( 2 years, 6 months ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications