× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cd7bff06aff8fc268d0bafdf60a4c8c02d0d84d95f10770552141df1aa048a0e
File name: vt-upload-es2rE
Detection ratio: 27 / 53
Analysis date: 2014-06-10 21:19:42 UTC ( 4 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Kazy.388867 20140610
Avast Win32:Zbot-TYO [Trj] 20140610
AVG Win32/Cryptor 20140610
Baidu-International Trojan.Win32.Kryptik.bCDIX 20140610
BitDefender Gen:Variant.Kazy.388867 20140610
CMC Packed.Win32.Katusha.3!O 20140610
Emsisoft Gen:Variant.Kazy.388867 (B) 20140610
ESET-NOD32 a variant of Win32/Kryptik.CDZM 20140610
F-Secure Gen:Variant.Kazy.388867 20140610
Fortinet W32/Simda.NEZ!tr 20140610
GData Gen:Variant.Kazy.388867 20140610
Ikarus Win32.Cryptor 20140610
Kaspersky HEUR:Trojan.Win32.Generic 20140610
Malwarebytes Malware.Packer.LOL 20140610
McAfee Generic-FAGW!A3242376E761 20140610
McAfee-GW-Edition Generic-FAGW!A3242376E761 20140610
Microsoft PWS:Win32/Zbot.gen!Y 20140610
eScan Gen:Variant.Kazy.388867 20140610
NANO-Antivirus Trojan.Win32.Kryptik.dalykt 20140610
Panda Generic Malware 20140610
Qihoo-360 Malware.QVM20.Gen 20140610
Sophos AV Mal/Generic-S 20140610
Symantec Trojan.Gen.SMH 20140610
TrendMicro TROJ_GEN.R0C1C0DF414 20140610
TrendMicro-HouseCall TROJ_GEN.R0C1C0DF414 20140610
VBA32 Heur.Trojan.Hlux 20140610
VIPRE Backdoor.Win32.Simda.bdao (v) 20140610
AegisLab 20140610
Yandex 20140610
AhnLab-V3 20140610
AntiVir 20140610
Antiy-AVL 20140610
Bkav 20140606
ByteHero 20140610
CAT-QuickHeal 20140610
ClamAV 20140610
Commtouch 20140610
Comodo 20140610
DrWeb 20140610
F-Prot 20140610
Jiangmin 20140610
K7AntiVirus 20140610
K7GW 20140610
Kingsoft 20140610
Norman 20140610
nProtect 20140610
Rising 20140610
SUPERAntiSpyware 20140610
Tencent 20140610
TheHacker 20140610
TotalDefense 20140610
ViRobot 20140610
Zoner 20140606
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-03-24 12:15:22
Entry Point 0x0000E0F7
Number of sections 4
PE sections
PE imports
AdmSaveData
IsAdmDirty
AdmClose
ResetAdmDirtyFlag
AuthzFreeResourceManager
AuthzFreeHandle
AuthzFreeAuditEvent
CertOpenStore
CertAddStoreToCollection
CertDuplicateStore
CertCloseStore
CertFindExtension
CertControlStore
CertFindAttribute
CertSaveStore
CryptFindOIDInfo
CertNameToStrA
CertCreateContext
CertCreateCRLContext
CertFindCRLInStore
CreateMutexA
GetEnvironmentVariableA
GetBinaryTypeA
CopyFileA
CreateSemaphoreA
GetSystemInfo
GetModuleHandleA
lstrcmpA
QueryDosDeviceA
VirtualQuery
TlsGetValue
GetProcessTimes
GetFileType
GetLogicalDrives
GetVersionExA
GetConsoleTitleA
GetTickCount
GetProcAddress
FindResourceA
CreateNamedPipeA
GetLocalTime
DllInitialize
GradientFill
UrlCanonicalizeA
UrlCreateFromPathA
UrlCombineA
UrlIsA
UrlGetPartA
UrlCompareA
PathCombineA
UrlIsNoHistoryA
UrlUnescapeA
PathCompactPathA
UrlEscapeA
UrlHashA
UrlGetLocationA
UrlIsOpaqueA
SetFocus
GetMessageA
CreateWindowExA
LoadCursorA
GetWindowLongA
DrawIcon
IsZoomed
LoadImageA
wsprintfA
DialogBoxParamA
GetCaretPos
IsDialogMessageA
CharToOemA
Number of PE resources by type
RT_MANIFEST 1
Struct(34) 1
Number of PE resources by language
NEUTRAL 1
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2014:03:24 13:15:22+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
54784

LinkerVersion
9.0

EntryPoint
0xe0f7

InitializedDataSize
0

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 a3242376e761767f6c7ba767df007eba
SHA1 639fbaeb0ad07d000e8535bf7aca9fb1324ae511
SHA256 cd7bff06aff8fc268d0bafdf60a4c8c02d0d84d95f10770552141df1aa048a0e
ssdeep
6144:a/Zp08MH0ag70eZEuevBUUXbqrzkBiGAvv:axLH70nvB60E

authentihash 7597ccdecf3e3d68c8f760518a653f0db2d38ee25986d67a79f7cd008e2b21c8
imphash a947c6d559042d5016d412b1b50674c6
File size 235.5 KB ( 241152 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Generic Win/DOS Executable (50.0%)
DOS Executable Generic (49.9%)
Tags
peexe

VirusTotal metadata
First submission 2014-06-10 21:19:42 UTC ( 4 years, 9 months ago )
Last submission 2014-06-10 21:19:42 UTC ( 4 years, 9 months ago )
File names vt-upload-es2rE
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications