× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cbca8127a9f4e0453b6c42fded5ead7e47f1e4b73e55428000e73ea6e30c8337
File name: starterguide.exe
Detection ratio: 8 / 54
Analysis date: 2016-02-10 09:40:07 UTC ( 3 years ago )
Antivirus Result Update
AhnLab-V3 Trojan/Win32.Downloader 20160209
Cyren W32/Trojan.PRNQ-2651 20160210
F-Prot W32/Trojan2.ODNW 20160210
nProtect Trojan/W32.Agent.670707 20160205
Rising PE:Trojan.Win32.Small.bmd!1347186 [F] 20160210
Tencent Win32.Trojan.Generic.Ecjz 20160210
TheHacker Aplicacion/WebMoner.ab 20160210
ViRobot Trojan.Win32.Downloader.242688.D[h] 20160210
Ad-Aware 20160210
AegisLab 20160210
Yandex 20160209
Alibaba 20160204
Antiy-AVL 20160210
Arcabit 20160210
Avast 20160210
AVG 20160210
Avira (no cloud) 20160210
Baidu-International 20160210
BitDefender 20160210
Bkav 20160204
ByteHero 20160210
CAT-QuickHeal 20160210
ClamAV 20160210
CMC 20160205
Comodo 20160210
DrWeb 20160210
Emsisoft 20160210
ESET-NOD32 20160210
F-Secure 20160210
Fortinet 20160210
GData 20160210
Ikarus 20160210
Jiangmin 20160210
K7AntiVirus 20160210
K7GW 20160210
Kaspersky 20160210
Malwarebytes 20160210
McAfee 20160210
McAfee-GW-Edition 20160210
Microsoft 20160210
eScan 20160210
NANO-Antivirus 20160210
Panda 20160208
Qihoo-360 20160210
Sophos AV 20160210
SUPERAntiSpyware 20160210
Symantec 20160209
TotalDefense 20160210
TrendMicro 20160210
TrendMicro-HouseCall 20160210
VBA32 20160209
VIPRE 20160210
Zillya 20160209
Zoner 20160210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
Command UPX
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x000A1470
Number of sections 3
PE sections
Overlays
MD5 148ab000128724302feae98d87570f88
File type data
Offset 242688
Size 428019
Entropy 8.00
PE imports
LoadLibraryA
ExitProcess
GetProcAddress
CoInternetGetSession
RegFlushKey
ImageList_Add
SaveDC
OleDraw
SHGetMalloc
InternetSetOptionA
Number of PE resources by type
RT_STRING 15
RT_BITMAP 11
RT_GROUP_CURSOR 7
RT_CURSOR 7
RT_RCDATA 5
RT_DIALOG 1
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 46
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
237568

LinkerVersion
2.25

FileTypeExtension
exe

InitializedDataSize
8192

SubsystemVersion
4.0

EntryPoint
0xa1470

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
421888

File identification
MD5 f92b92a6b9410df03809e062d229c638
SHA1 d000006c8c9ee31966ca6a0fcd1cf0b700683cb1
SHA256 cbca8127a9f4e0453b6c42fded5ead7e47f1e4b73e55428000e73ea6e30c8337
ssdeep
12288:Bg5+1Ms1Cki3+vpjl8JFpEe3NqxzISikLoaNTUrRZpc8Dl3AfD8/n:K+iB3+vpjl8JFpEed2v1hSZppDBn

authentihash 2c5f0e8314610b28d9246036f4b563857140e2d4f74c76bcad12ffa8911cec58
imphash 98fd744eb9c68b3a040b47df53e95653
File size 655.0 KB ( 670707 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (41.1%)
Win32 EXE Yoda's Crypter (35.7%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Win16/32 Executable Delphi generic (2.7%)
Tags
peexe upx overlay

VirusTotal metadata
First submission 2011-12-29 17:54:38 UTC ( 7 years, 1 month ago )
Last submission 2014-07-11 08:59:58 UTC ( 4 years, 7 months ago )
File names aa
qFWyWvfS.xltm
cbca8127a9f4e0453b6c42fded5ead7e47f1e4b73e55428000e73ea6e30c8337
f92b92a6b9410df03809e062d229c638
jWjkeShCo.ocx
starterguide.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications