× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bc55a78b008cce2102f3679adc4694211cf61710e2bcf49391365928a0e96519
File name: c77ca2486d1517b511973ad1c923bb7d.exe
Detection ratio: 47 / 57
Analysis date: 2015-01-28 17:33:13 UTC ( 2 months ago )
Antivirus Result Update
ALYac Gen:Variant.Kazy.315228 20150128
AVG Luhe.Fiha.A 20150128
AVware Trojan.Win32.Reveton.aj (v) 20150128
Ad-Aware Gen:Variant.Kazy.315228 20150128
Agnitum Trojan.Graftor!3AM7EDjwDIw 20150127
AhnLab-V3 Trojan/Win32.Fakeavlock 20150128
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20150128
Avast Win32:Malware-gen 20150128
Avira TR/Kuwrypt.AD 20150128
Baidu-International Trojan.Win32.Kryptik.BBRXG 20150128
BitDefender Gen:Variant.Kazy.315228 20150128
CAT-QuickHeal TrojanPWS.Zbot.Gen 20150128
Comodo Backdoor.Win32.Androm.BMUN 20150128
Cyren W32/Trojan.KUME-8159 20150128
DrWeb BackDoor.Kuluoz.4 20150128
ESET-NOD32 a variant of Win32/Kryptik.BRXG 20150128
Emsisoft Gen:Variant.Kazy.315228 (B) 20150128
F-Prot W32/Trojan3.GYP 20150128
F-Secure Gen:Variant.Kazy.315228 20150128
Fortinet W32/Zbot.FG!tr 20150128
GData Gen:Variant.Kazy.315228 20150128
Ikarus Backdoor.Win32.Androm 20150128
K7AntiVirus Riskware ( 0040eff71 ) 20150128
K7GW Riskware ( 0040eff71 ) 20150128
Kaspersky HEUR:Trojan.Win32.Generic 20150128
Kingsoft Win32.Troj.Generic.a.(kcloud) 20150128
Malwarebytes Trojan.Dofoil 20150128
McAfee Backdoor-FBPF 20150128
McAfee-GW-Edition BehavesLike.Win32.Dropper.ch 20150128
MicroWorld-eScan Gen:Variant.Kazy.315228 20150128
Microsoft TrojanDownloader:Win32/Kuluoz.D 20150128
NANO-Antivirus Trojan.Win32.Androm.csaimg 20150128
Norman Kryptik.CDHR 20150128
Panda Trj/Crilock.C 20150128
Qihoo-360 HEUR/Malware.QVM20.Gen 20150128
Rising PE:Trojan.Win32.Generic.1643EEC5!373550789 20150127
Sophos Troj/Agent-AFIG 20150128
Symantec Trojan.Fakeavlock 20150128
Tencent Win32.Trojan.Generic.Syrs 20150128
TheHacker Trojan/Kryptik.brxg 20150126
TotalDefense Win32/Zbot.KSdKMQ 20150128
TrendMicro BKDR_KULUOZ.OD 20150128
TrendMicro-HouseCall BKDR_KULUOZ.OD 20150128
VBA32 Backdoor.Androm 20150128
VIPRE Trojan.Win32.Reveton.aj (v) 20150128
ViRobot Backdoor.Win32.A.Androm.163328.A[h] 20150128
Zillya Trojan.Kryptik.Win32.621725 20150128
AegisLab 20150128
Alibaba 20150128
Bkav 20150128
ByteHero 20150128
CMC 20150127
ClamAV 20150128
Jiangmin 20150127
SUPERAntiSpyware 20150128
Zoner 20150127
nProtect 20150128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© Copyright 2013 CoolPDF Software, Inc.

Publisher CoolPDF Software, Inc.
Product PDF Watermark Creator
File version 1.6.0.166
Description Setup PDF Watermark Creator
Comments This installation was built with Inno Setup.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-12-26 15:33:30
Link date 4:33 PM 12/26/2013
Entry Point 0x00002610
Number of sections 4
PE sections
PE imports
RegOpenKeyA
LPtoDP
SetWindowExtEx
LineTo
SetMapMode
DeleteDC
RestoreDC
MoveToEx
GetDeviceCaps
SaveDC
SetViewportOrgEx
CloseMetaFile
SetWindowOrgEx
CreateRectRgnIndirect
DeleteMetaFile
GetStockObject
CreateDCW
Rectangle
CreateMetaFileW
MoveFileA
GetTempPathA
SizeofResource
GetModuleHandleA
LoadResource
LockResource
CreateFileW
GlobalFree
GetCurrentProcess
GetStartupInfoA
GetTempFileNameA
EnumResourceLanguagesA
FindResourceExA
GlobalAlloc
VirtualAlloc
FreeResource
GetCurrentThread
Shell_NotifyIconA
MapWindowPoints
SetFocus
GetForegroundWindow
GetClassInfoExW
SystemParametersInfoA
EndPaint
EqualRect
OffsetRect
DefWindowProcW
FindWindowW
KillTimer
DestroyMenu
DestroyAcceleratorTable
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetParent
wvsprintfW
GetSystemMetrics
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
DispatchMessageA
RegisterClassExW
UpdateWindow
IntersectRect
PeekMessageA
AdjustWindowRectEx
CharNextW
BeginPaint
GetWindow
RemoveMenu
GetDC
GetKeyState
GetCursorPos
ReleaseDC
LoadMenuA
DestroyIcon
LoadStringA
RegisterClassExA
TranslateMessage
wsprintfW
CallWindowProcW
LoadStringW
GetClientRect
CreateWindowExA
SystemParametersInfoW
SetCursor
MessageBoxW
UnionRect
EnableMenuItem
RegisterClassA
InvalidateRect
GetSubMenu
SetTimer
LoadImageW
LoadIconA
GetMessageA
LoadCursorA
CharNextA
TrackPopupMenuEx
ExitWindowsEx
GetDesktopWindow
LoadCursorW
wsprintfA
GetFocus
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
PtInRect
SetWindowRgn
IsChild
DestroyWindow
_purecall
__p__fmode
malloc
_acmdln
realloc
wcschr
__dllonexit
_cexit
strtol
_c_exit
_onexit
wcscmp
exit
_XcptFilter
_ftol
__setusermatherr
_controlfp
_adjust_fdiv
_except_handler3
_wcsnicmp
__p__commode
free
__getmainargs
memcpy
_exit
wcsstr
_initterm
__set_app_type
_wtoi
CoUninitialize
OleRegGetUserType
CoTaskMemAlloc
WriteClassStm
CoCreateInstance
OleSaveToStream
CoTaskMemRealloc
OleLoadFromStream
OleRegEnumVerbs
CoRevokeClassObject
CoRegisterClassObject
OleRegGetMiscStatus
CreateDataAdviseHolder
CoTaskMemFree
CoInitialize
CreateOleAdviseHolder
CoGetClassObject
Number of PE resources by type
RT_STRING 6
RT_ICON 1
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 4
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.6.0.166

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
153600

MIMEType
application/octet-stream

LegalCopyright
Copyright 2013 CoolPDF Software, Inc.

FileVersion
1.6.0.166

TimeStamp
2013:12:26 16:33:30+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

FileAccessDate
2015:01:28 18:33:18+01:00

ProductVersion
1.6

FileDescription
Setup PDF Watermark Creator

OSVersion
5.0

FileCreateDate
2015:01:28 18:33:18+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
CoolPDF Software, Inc.

CodeSize
8704

ProductName
PDF Watermark Creator

ProductVersionNumber
1.6.0.166

EntryPoint
0x2610

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 c77ca2486d1517b511973ad1c923bb7d
SHA1 b03a96390c2c2d7db7b3a8b844b4b8599cf3422c
SHA256 bc55a78b008cce2102f3679adc4694211cf61710e2bcf49391365928a0e96519
ssdeep
1536:JKTJdpG0TF6RCrop5//irdRGPlf6Kohz7u+PhaKpel7jPR:JSTG0TF6Rcop5iZREf6Kuz7rQ9vR

authentihash fb42150e6bb7f1d9f780fecea6a1d447b0dde49f4fc5eb21641e6d084eabbbc6
imphash 89736635c02987bb5480001bce963f85
File size 159.5 KB ( 163328 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (52.5%)
Windows Screen Saver (22.0%)
Win32 Dynamic Link Library (generic) (11.0%)
Win32 Executable (generic) (7.5%)
Generic Win/DOS Executable (3.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-12-26 18:04:26 UTC ( 1 year, 3 months ago )
Last submission 2015-01-28 17:33:13 UTC ( 2 months ago )
File names Court_Notice_Chicago_McDermott_Will_and_Emery.exe
court_notice_chicago_mcdermott_will_and_emery.exe
c77ca2486d1517b511973ad1c923bb7d.malware
c-78452-1171-1388082902
file-6399998_exe
court_notice_chicago_mcdermott_will_and_emery.exe
c77ca2486d1517b511973ad1c923bb7d.exe
08073657344c5ca87b4d2d00660d171bd44dc652
c77ca2486d1517b511973ad1c923bb7d
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!