× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c8dff6a8f3dd8dd912e4c866d5607ec70e6808b60ed2ca9dee628dbd5e069ef4
File name: c8dff6a8f3dd8dd912e4c866d5607ec70e6808b60ed2ca9dee628dbd5e069ef4
Detection ratio: 8 / 68
Analysis date: 2018-06-26 00:28:30 UTC ( 7 months, 3 weeks ago )
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9591 20180625
Cyren W32/GenBl.8723E619!Olympus 20180626
DrWeb Trojan.Click3.8961 20180626
Kingsoft Win32.Troj.Generic.(kcloud) 20180626
Sophos AV Mal/Generic-S 20180625
Symantec Trojan.Gen.2 20180625
TrendMicro PAK_Generic.005 20180625
TrendMicro-HouseCall PAK_Generic.005 20180625
Ad-Aware 20180625
AegisLab 20180625
AhnLab-V3 20180625
Alibaba 20180625
ALYac 20180625
Antiy-AVL 20180626
Arcabit 20180626
Avast 20180626
Avast-Mobile 20180625
AVG 20180626
Avira (no cloud) 20180625
AVware 20180626
Babable 20180406
BitDefender 20180626
Bkav 20180625
CAT-QuickHeal 20180625
ClamAV 20180625
CMC 20180625
Comodo 20180625
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180626
eGambit 20180626
Emsisoft 20180626
Endgame 20180612
ESET-NOD32 20180625
F-Prot 20180626
F-Secure 20180626
Fortinet 20180626
GData 20180626
Ikarus 20180625
Sophos ML 20180601
Jiangmin 20180625
K7AntiVirus 20180625
K7GW 20180625
Kaspersky 20180625
Malwarebytes 20180626
MAX 20180626
McAfee 20180625
McAfee-GW-Edition 20180625
Microsoft 20180625
eScan 20180625
NANO-Antivirus 20180625
Palo Alto Networks (Known Signatures) 20180626
Panda 20180625
Qihoo-360 20180626
Rising 20180626
SentinelOne (Static ML) 20180618
SUPERAntiSpyware 20180625
Symantec Mobile Insight 20180625
TACHYON 20180625
Tencent 20180626
TheHacker 20180624
TotalDefense 20180625
Trustlook 20180626
VBA32 20180625
VIPRE 20180625
ViRobot 20180625
Webroot 20180626
Yandex 20180625
Zillya 20180625
ZoneAlarm by Check Point 20180625
Zoner 20180626
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2011 - OyunCeviri.com

Product Hitman - Blood Money
File version 1.00
Description Türkçe Yama v1.00
Comments Oyunlar artýk Türkçe :)
Packers identified
F-PROT NSIS, appended, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-05 22:50:46
Entry Point 0x0000323C
Number of sections 5
PE sections
Overlays
MD5 772addac1c85b9f27595af09199de90a
File type data
Offset 36352
Size 4269978
Entropy 8.00
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
EnableMenuItem
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
ShowWindow
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 4
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
NEUTRAL 1
PE resources
ExifTool file metadata
CodeSize
23552

SubsystemVersion
4.0

Comments
Oyunlar art k T rk e :)

InitializedDataSize
119808

ImageVersion
6.0

CompanyWebsite
http://www.oyunceviri.com

ProductName
Hitman - Blood Money

FileVersionNumber
1.0.0.0

UninitializedDataSize
1024

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

LinkerVersion
6.0

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0

TimeStamp
2009:12:05 23:50:46+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0

FileDescription
T rk e Yama v1.00

OSVersion
4.0

FileOS
Win32

LegalCopyright
2011 - OyunCeviri.com

MachineType
Intel 386 or later, and compatibles

CompanyName
www.OyunCeviri.com

LegalTrademarks
Hitman - Blood Money Eidos Interactive

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x323c

ObjectFileType
Executable application

File identification
MD5 8723e619ce397184b75621114f25ad43
SHA1 56d45f5758c21716dfdc9ec034ece9abe014f3ef
SHA256 c8dff6a8f3dd8dd912e4c866d5607ec70e6808b60ed2ca9dee628dbd5e069ef4
ssdeep
98304:J4BeE/S/p9c4r4yRssWYt0uaJfHPtJqNutw2fVnYOcqVj/W:J4BeE/V4kWssku+fvtyutwUntcqLW

authentihash 7103c58762cf3f3007db60f67ff797b8b9d965b139d2f236d9a6fe3f28b1ac57
imphash 099c0646ea7282d232219f8807883be0
File size 4.1 MB ( 4306330 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.6%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
OS/2 Executable (generic) (0.2%)
Tags
nsis peexe upx overlay

VirusTotal metadata
First submission 2012-01-17 07:31:19 UTC ( 7 years, 1 month ago )
Last submission 2017-04-11 19:44:09 UTC ( 1 year, 10 months ago )
File names Hitman_Blood_Money_Turkce_Yama_v1.00.exe
hitman_blood_money_turkce_yama_v1.00.exe
Hitman Blood Money Türkçe Yama v1.00.exe
Hitman_Blood_Money_Turkce_Yama.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Behaviour characterization
Zemana
keylogger

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.