× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d8d14223267f5378f65bed1d5a0aa914a001c4d0aaebb7ff3b92a11e2ec3c7d5
File name: 86.exe
Detection ratio: 3 / 55
Analysis date: 2015-12-09 13:15:57 UTC ( 3 years, 5 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Win-Trojan/Teslacrypt.Gen 20151209
Bkav HW32.Packed.AF4C 20151209
Qihoo-360 HEUR/QVM20.1.Malware.Gen 20151209
Ad-Aware 20151209
AegisLab 20151209
Yandex 20151208
Alibaba 20151208
ALYac 20151209
Antiy-AVL 20151209
Arcabit 20151209
Avast 20151209
AVG 20151209
Avira (no cloud) 20151209
AVware 20151209
Baidu-International 20151209
BitDefender 20151209
ByteHero 20151209
CAT-QuickHeal 20151209
ClamAV 20151209
CMC 20151201
Comodo 20151209
Cyren 20151209
DrWeb 20151209
Emsisoft 20151209
ESET-NOD32 20151209
F-Prot 20151209
F-Secure 20151209
Fortinet 20151209
GData 20151209
Ikarus 20151209
Jiangmin 20151208
K7AntiVirus 20151209
K7GW 20151209
Kaspersky 20151209
Malwarebytes 20151209
McAfee 20151209
McAfee-GW-Edition 20151209
Microsoft 20151209
eScan 20151209
NANO-Antivirus 20151209
nProtect 20151209
Panda 20151208
Rising 20151208
Sophos AV 20151209
SUPERAntiSpyware 20151209
Symantec 20151208
Tencent 20151209
TheHacker 20151209
TrendMicro 20151209
TrendMicro-HouseCall 20151209
VBA32 20151208
VIPRE 20151209
ViRobot 20151209
Zillya 20151208
Zoner 20151209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-09-23 07:25:54
Entry Point 0x000095C0
Number of sections 5
PE sections
PE imports
DuplicateTokenEx
RegEnumValueW
GetSecurityDescriptorSacl
GetAuditedPermissionsFromAclW
GetSecurityDescriptorDacl
DuplicateToken
LsaSetTrustedDomainInfoByName
RegSetValueExA
RegEnumKeyW
LsaEnumerateTrustedDomains
SetSecurityDescriptorGroup
ImageList_GetIcon
ImageList_Draw
ImageList_GetImageInfo
ImageList_SetImageCount
SetMetaRgn
GetCharABCWidthsW
GetWindowOrgEx
GetNearestColor
PolyPolyline
GetTextMetricsA
CombineRgn
GetViewportOrgEx
GetObjectType
SetColorAdjustment
GdiGetBatchLimit
CopyEnhMetaFileW
StretchBlt
FixBrushOrgEx
IntersectClipRect
AngleArc
CopyEnhMetaFileA
OffsetWindowOrgEx
GetMiterLimit
SetColorSpace
CreatePalette
EqualRgn
GetPolyFillMode
CreateEllipticRgnIndirect
SetPixelFormat
GetDCOrgEx
GetRasterizerCaps
GetTextFaceA
SwapBuffers
EnumICMProfilesA
ArcTo
CloseFigure
Pie
CloseMetaFile
ExtCreatePen
SetBkColor
SetWinMetaFileBits
GetBkColor
SetRectRgn
GetEnhMetaFileA
GetDIBColorTable
DeleteEnhMetaFile
PathToRegion
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
CreateFontIndirectA
FillRgn
LPtoDP
GetEnhMetaFileW
UpdateColors
GetBitmapBits
PolyDraw
TranslateCharsetInfo
SetBkMode
GetCharacterPlacementW
CreateDiscardableBitmap
RectInRegion
FrameRgn
OffsetClipRgn
EnumFontFamiliesA
GetLogColorSpaceA
CreateEnhMetaFileW
GetOutlineTextMetricsA
SetAbortProc
GetArcDirection
ScaleWindowExtEx
GetAspectRatioFilterEx
GetMetaFileBitsEx
CreateEnhMetaFileA
SetROP2
ExtEscape
CreateScalableFontResourceW
PolyTextOutA
GetCharWidth32W
SetDIBColorTable
CancelDC
GetTextColor
PtVisible
UpdateICMRegKeyW
GetCharWidth32A
DeleteObject
CreatePenIndirect
CheckColorsInGamut
GetWindowExtEx
SetBitmapBits
CreatePen
Chord
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetEnhMetaFileDescriptionA
GetWorldTransform
EnumMetaFile
CreateDCW
GdiComment
GetEnhMetaFileDescriptionW
CreateHatchBrush
SetEnhMetaFileBits
SetPaletteEntries
DescribePixelFormat
SelectClipPath
RectVisible
DeleteColorSpace
GetPath
GetBkMode
PlayEnhMetaFileRecord
UnrealizeObject
GdiFlush
CreateBitmapIndirect
CreateColorSpaceA
GetTextExtentPoint32A
GetWinMetaFileBits
CreateColorSpaceW
GetPaletteEntries
GetViewportExtEx
GetTextExtentPoint32W
GetCharABCWidthsFloatW
PolylineTo
CreateHalftonePalette
GetRgnBox
GetTextCharset
GetEnhMetaFilePaletteEntries
ModifyWorldTransform
GetGlyphOutlineA
GetTextExtentExPointA
SetTextJustification
CreateDIBPatternBrush
GetCharWidthFloatW
CreateDIBSection
GdiSetBatchLimit
SetTextColor
GetBrushOrgEx
GetCurrentObject
CreateFontA
EnumFontFamiliesExW
SetViewportOrgEx
AbortPath
SetArcDirection
ExtTextOutW
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
PolyPolygon
SetBrushOrgEx
CreateRectRgn
RemoveFontResourceA
GetClipRgn
RemoveFontResourceW
CreateSolidBrush
Polyline
CombineTransform
CopyMetaFileA
StartDocW
GlobalFindAtomA
GetDateFormatA
GetProfileSectionW
BuildCommDCBW
_memccpy
LPSAFEARRAY_UserSize
RedrawWindow
GetForegroundWindow
RegisterWindowMessageW
DdeAccessData
LoadBitmapW
MoveWindow
EnumDesktopsW
EnumWindowStationsW
SetUserObjectInformationA
GetOpenClipboardWindow
DrawStateW
SetWindowPos
DdeImpersonateClient
DdeDisconnect
DdeCreateStringHandleA
IsWindow
GrayStringW
OpenIcon
VkKeyScanA
MessageBoxA
GrayStringA
DdeGetData
ChildWindowFromPoint
OpenWindowStationA
SendNotifyMessageA
GetInputState
GetMenuItemID
GetCursorPos
DrawTextA
DdeInitializeA
GetDlgCtrlID
GetClassInfoA
GetClipCursor
GetMenu
MessageBoxExW
GetWindowTextLengthA
SendMessageA
UnregisterClassW
GetClientRect
SetMenuDefaultItem
InSendMessage
CharPrevExA
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
BlockInput
GetTopWindow
UnhookWindowsHook
EnableScrollBar
ChangeDisplaySettingsExW
ExcludeUpdateRgn
LoadAcceleratorsW
LoadMenuIndirectW
DrawTextW
DdeQueryStringA
DrawEdge
RegisterHotKey
GetUserObjectInformationW
GetClassInfoExW
MapDialogRect
EnumWindows
GetDoubleClickTime
SetClassLongA
GetNextDlgGroupItem
IMPGetIMEW
InsertMenuItemW
ShowWindowAsync
GetClipboardFormatNameW
DialogBoxParamA
CharToOemBuffW
DdeQueryConvInfo
SetThreadDesktop
GetWindow
CharNextExA
DdeQueryNextServer
PaintDesktop
GetQueueStatus
ScrollWindow
IsCharLowerA
GetClipboardViewer
OemToCharBuffA
IsIconic
OpenDesktopA
GetSubMenu
GetDCEx
DlgDirListA
GetKeyboardLayout
WaitForInputIdle
GetSysColorBrush
CreateWindowExW
ReleaseDC
VkKeyScanExW
IsChild
IsDialogMessageA
SetFocus
CharPrevA
MapVirtualKeyA
OpenInputDesktop
PostMessageA
BeginPaint
DefWindowProcW
SetLastErrorEx
VkKeyScanExA
ToAsciiEx
SetClipboardViewer
GetParent
EnableMenuItem
InflateRect
SetCapture
DrawTextExW
CharLowerW
SetProcessWindowStation
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
SetWindowTextW
DdeGetLastError
GetMenuCheckMarkDimensions
CreateDialogParamA
CreateWindowStationW
BringWindowToTop
SetMenuItemInfoW
AttachThreadInput
CreateDesktopW
CreateIconFromResourceEx
SetWindowsHookExW
LoadCursorW
ReuseDDElParam
InsertMenuW
ExitWindowsEx
CharToOemA
GetCaretBlinkTime
DdeUnaccessData
GetScrollRange
EndDialog
HideCaret
CreateIconIndirect
ShowWindow
FindWindowA
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
AppendMenuA
RegisterClassExW
SetMenu
SetDlgItemTextA
DdeSetUserHandle
SetRectEmpty
LoadCursorFromFileA
DdePostAdvise
DestroyCursor
wvsprintfA
mouse_event
SetUserObjectInformationW
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
IsCharAlphaNumericA
GetWindowModuleFileNameA
DestroyIcon
OemKeyScan
IsWindowVisible
SubtractRect
UnpackDDElParam
SetCursorPos
IsCharAlphaNumericW
UnionRect
SetRect
IsCharUpperA
DragObject
DefDlgProcA
ModifyMenuW
CloseDesktop
GetClassNameA
EnableWindow
GetKeyboardType
ReplyMessage
GetFileTitleA
Number of PE resources by type
RT_CURSOR 8
RT_ICON 6
RT_GROUP_ICON 6
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ALBANIAN DEFAULT 22
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.5

ImageVersion
0.0

FileVersionNumber
0.143.154.13

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2236416

EntryPoint
0x95c0

OriginalFileName
Width.exe

MIMEType
application/octet-stream

Subsystem
Windows command line

TimeStamp
2004:09:23 08:25:54+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Sublimated

FileDescription
Artificiality

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
Starrier (C) 2016

MachineType
Intel 386 or later, and compatibles

CompanyName
BioNet Systems, LLC

CodeSize
294912

FileSubtype
0

ProductVersionNumber
0.187.122.256

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 ea2f68265c0973092e33309d46f0b731
SHA1 2f7d38d36b3b21a38eaf728d657eba5484de5789
SHA256 d8d14223267f5378f65bed1d5a0aa914a001c4d0aaebb7ff3b92a11e2ec3c7d5
ssdeep
6144:5bBIHAyE2REYCVcS8pWURJvHrXFyO53Zg0IIh0+QJC4zfuOUXBE:D8HEuXScp4wtL1yO7gIh0Rk4z2O

authentihash de943db02548611a4a115abf64bdbac806841cdeec8f858b1ba7f782ffde8d75
imphash 4aef6dc03deacef65c063a24560f9e14
File size 340.0 KB ( 348160 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2015-12-09 13:15:41 UTC ( 3 years, 5 months ago )
Last submission 2016-02-17 14:51:48 UTC ( 3 years, 3 months ago )
File names qqhllacroic.exe
d8d14223267f5378f65bed1d5a0aa914a001c4d0aaebb7ff3b92a11e2ec3c7d5(1).bin
wqbmvacroic.exe
86.exe
d8d14223267f5378f65bed1d5a0aa914a001c4d0aaebb7ff3b92a11e2ec3c7d5.bin
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!