× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c7e99d597188e56ec9d5801dadc33905e04817271d3040a4624b31aa3ec40b8d
File name: 7ab0f542c7948499699468427d487a89
Detection ratio: 19 / 56
Analysis date: 2016-10-07 12:06:50 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
Antiy-AVL RiskWare[WebToolbar:not-a-virus,HEUR]/Win32.AGeneric 20161007
Avira (no cloud) TR/Crypt.ZPACK.btoki 20161007
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
Fortinet Riskware/Generic 20161007
GData Win32.Malware.Sedox.ZFVZYL 20161007
Ikarus Trojan.Crypt 20161007
Sophos ML trojandownloader.win32.kuluoz.d 20160928
Kaspersky not-a-virus:HEUR:WebToolbar.Win32.Generic 20161007
Malwarebytes Trojan.Crypt 20161007
McAfee Artemis!7AB0F542C794 20161007
McAfee-GW-Edition BehavesLike.Win32.Dropper.dh 20161007
Microsoft Trojan:Win32/Dynamer!ac 20161007
Panda Trj/Agent.OOX 20161007
Qihoo-360 HEUR/QVM09.0.0000.Malware.Gen 20161007
Sophos AV Generic PUA KH (PUA) 20161007
Symantec Trojan Horse 20161007
TrendMicro TROJ_GEN.R00JC0EJ516 20161007
TrendMicro-HouseCall TROJ_GEN.R00JC0EJ516 20161007
Yandex PUA.Toolbar.Agent! 20161007
Ad-Aware 20161007
AegisLab 20161007
AhnLab-V3 20161007
Alibaba 20161003
ALYac 20161007
Arcabit 20161007
Avast 20161007
AVG 20161007
AVware 20161007
Baidu 20161001
BitDefender 20161007
Bkav 20161007
CAT-QuickHeal 20161007
ClamAV 20161007
CMC 20161003
Comodo 20161007
Cyren 20161007
DrWeb 20161007
Emsisoft 20161007
ESET-NOD32 20161007
F-Prot 20161007
F-Secure 20161007
Jiangmin 20161007
K7AntiVirus 20161007
K7GW 20161007
Kingsoft 20161007
eScan 20161007
NANO-Antivirus 20161007
nProtect 20161007
Rising 20161007
SUPERAntiSpyware 20161007
Tencent 20161007
TheHacker 20161007
VBA32 20161006
VIPRE 20161007
ViRobot 20161007
Zillya 20161007
Zoner 20161007
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-02-23 23:03:56
Entry Point 0x00028339
Number of sections 5
PE sections
PE imports
Ord(3)
Ord(6)
Ord(1)
GetStdHandle
GetConsoleOutputCP
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
InitializeCriticalSection
TlsGetValue
FormatMessageA
SetLastError
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
SetUnhandledExceptionFilter
WaitForMultipleObjectsEx
TerminateProcess
CreateSemaphoreW
WriteConsoleA
GetVersion
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetStartupInfoW
GetProcAddress
GetProcessHeap
GetModuleFileNameW
WaitNamedPipeA
ResetEvent
CreateWaitableTimerA
IsValidLocale
GetUserDefaultLCID
CreateEventW
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
WaitForSingleObjectEx
VirtualFree
GetEnvironmentStrings
GetCurrentProcessId
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
SetWaitableTimer
IsValidCodePage
HeapCreate
CreateProcessW
Sleep
OpenEventA
VirtualAlloc
setsockopt
gethostname
socket
WSACleanup
WSAStartup
gethostbyname
getsockname
sendto
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2005:02:24 00:03:56+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
225280

LinkerVersion
8.0

EntryPoint
0x28339

InitializedDataSize
94208

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 7ab0f542c7948499699468427d487a89
SHA1 a76a505e3c16206665413b6ef9b85637f760b2af
SHA256 c7e99d597188e56ec9d5801dadc33905e04817271d3040a4624b31aa3ec40b8d
ssdeep
3072:4h4CQRDZbgxiWaaKigrLTQHM6ExyntckL04tXpbNxVC2/aKbpKE7sbawOnq2r:c4dDY7afl62yntcetXpbBC6aoebav

authentihash 4979f2a7a6a5390a66540a130833e60d450215d0405bdfe712316652592fb2f4
imphash 3179ccee702b6ddb504d514163ee7c40
File size 284.0 KB ( 290816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-10-07 12:06:50 UTC ( 2 years, 4 months ago )
Last submission 2016-10-07 12:06:50 UTC ( 2 years, 4 months ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
DNS requests
UDP communications