× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d8eece3e1453de635e140def1f677107416e2abf3175ba0c85735f96acdd10e4
File name: Dots
Detection ratio: 37 / 62
Analysis date: 2017-04-20 07:57:49 UTC ( 6 days, 15 hours ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.4855189 20170420
AegisLab Troj.W32.Sennoma!c 20170420
ALYac Trojan.GenericKD.4855189 20170420
Antiy-AVL Trojan/Win32.Sennoma 20170420
Arcabit Trojan.Generic.D4A1595 20170420
Avast Win32:Malware-gen 20170420
AVG SCGeneric_c.ANXW 20170420
Avira (no cloud) TR/Crypt.ZPACK.isclp 20170420
AVware Trojan.Win32.Generic!BT 20170420
BitDefender Trojan.GenericKD.4855189 20170420
Bkav W32.eHeur.Malware08 20170419
CAT-QuickHeal Trojan.Sennoma 20170420
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170130
Cyren W32/Trojan.CNBO-4356 20170420
Emsisoft Trojan.GenericKD.4855189 (B) 20170420
Endgame malicious (high confidence) 20170419
ESET-NOD32 Win32/TrojanDownloader.Agent.DGM 20170420
F-Secure Trojan.GenericKD.4855189 20170420
Fortinet W32/GenKryptik.ABVV!tr 20170420
GData Trojan.GenericKD.4855189 20170420
Ikarus Trojan.Win32.Krypt 20170420
Invincea virus.win32.sality.at 20170413
K7AntiVirus Trojan ( 0050b63b1 ) 20170420
K7GW Trojan ( 0050b63b1 ) 20170420
Kaspersky Trojan.Win32.Sennoma.xd 20170420
McAfee Artemis!74BE528FDA18 20170420
McAfee-GW-Edition BehavesLike.Win32.BadFile.fc 20170419
Microsoft VirTool:Win32/Injector.GE 20170420
eScan Trojan.GenericKD.4855189 20170420
Palo Alto Networks (Known Signatures) generic.ml 20170420
Panda Trj/CI.A 20170419
Rising Trojan.GenKryptik!8.AA55 (cloud:AQZaIA1Fd3) 20170420
Sophos Mal/Generic-S 20170420
Symantec Trojan.Gen.2 20170419
TrendMicro-HouseCall Suspicious_GEN.F47V0415 20170420
VIPRE Trojan.Win32.Generic!BT 20170420
ZoneAlarm by Check Point Trojan.Win32.Sennoma.xd 20170420
AhnLab-V3 20170420
Baidu 20170420
ClamAV 20170420
CMC 20170420
Comodo 20170420
DrWeb 20170420
F-Prot 20170420
Jiangmin 20170420
Kingsoft 20170420
Malwarebytes 20170420
NANO-Antivirus 20170420
nProtect 20170420
Qihoo-360 20170420
SentinelOne (Static ML) 20170330
SUPERAntiSpyware 20170420
Symantec Mobile Insight 20170414
Tencent 20170420
TheHacker 20170419
TotalDefense 20170420
TrendMicro 20170420
Trustlook 20170420
VBA32 20170419
ViRobot 20170420
Webroot 20170420
WhiteArmor 20170409
Yandex 20170419
Zillya 20170418
Zoner 20170420
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Weiying (C) 2007-2015

Product Dots
Original name Dots.exe
Internal name Dots
File version 7.7.1.2
Description Nsa Exreskit Dutainment Ab
Comments Nsa Exreskit Dutainment Ab
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-10-10 03:14:02
Entry Point 0x0000B3E6
Number of sections 4
PE sections
PE imports
SetEntriesInAclA
AllocateAndInitializeSid
GetNamedSecurityInfoA
GetEnhMetaFileA
SetGraphicsMode
DeleteEnhMetaFile
CreateHalftonePalette
SaveDC
CreateFontIndirectA
CreateRectRgnIndirect
EndPath
CombineRgn
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetEnhMetaFileHeader
SetDCPenColor
SetBkMode
SetWorldTransform
BitBlt
CreateDIBSection
RealizePalette
SetTextColor
CreatePatternBrush
GetObjectA
SetDCBrushColor
MoveToEx
PlayEnhMetaFile
SelectPalette
StrokePath
AngleArc
CreateCompatibleDC
CreateRectRgn
CloseFigure
SelectObject
Ellipse
RestoreDC
CreateSolidBrush
BeginPath
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
HeapDestroy
SystemTimeToTzSpecificLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
FindResourceExA
GetCPInfo
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
InitializeCriticalSection
LoadResource
TlsGetValue
SetLastError
GetUserDefaultLangID
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetFilePointer
SetUnhandledExceptionFilter
TerminateProcess
WriteConsoleA
GlobalAlloc
GetCurrentThreadId
LeaveCriticalSection
SleepEx
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
GetProcAddress
GetProcessHeap
lstrcmpA
GlobalLock
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetProcessTimes
GetEnvironmentStringsW
VirtualQuery
GetEnvironmentStrings
GetCurrentProcessId
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
GetModuleHandleA
CloseHandle
GetACP
HeapCreate
VirtualFree
Sleep
VirtualAlloc
NetWkstaGetInfo
VariantChangeType
VariantClear
VariantInit
glEnable
glClearColor
glViewport
glPushMatrix
glMatrixMode
glMaterialfv
glRotatef
glLoadIdentity
glBlendFunc
GetProcessMemoryInfo
SetupDiGetDeviceInstallParamsA
SetupDiGetDeviceRegistryPropertyA
SetupCloseInfFile
SetupOpenFileQueue
SetupDefaultQueueCallbackA
SetupOpenInfFileA
SetupDiCreateDeviceInfoList
SetupInitDefaultQueueCallbackEx
SetupDiDestroyDriverInfoList
SetupDiDestroyDeviceInfoList
Shell_NotifyIconA
DragQueryFileA
PathFileExistsA
MapWindowPoints
GetAsyncKeyState
GetForegroundWindow
EndPaint
GetCursorInfo
SetPropA
EndDialog
BeginPaint
OffsetRect
DefWindowProcW
CopyIcon
GetMonitorInfoA
PostQuitMessage
DefWindowProcA
ShowWindow
IsWindowEnabled
GetPropA
LoadBitmapA
SetClipboardViewer
GetWindowThreadProcessId
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
InflateRect
EnableWindow
SetMenu
SetCapture
MessageBoxA
OpenDesktopA
RegisterWindowMessageA
WindowFromPoint
EmptyClipboard
AppendMenuW
GetWindowDC
SetProcessWindowStation
TrackPopupMenu
SetThreadDesktop
GetMenuItemID
InsertMenuItemA
GetCursorPos
DrawTextA
UpdateLayeredWindow
GetDlgCtrlID
GetIconInfo
CheckMenuItem
GetWindowLongA
SetClipboardData
SendMessageA
CloseClipboard
GetClientRect
CreateMenu
GetDlgItem
GetDCEx
MessageBoxW
EnableMenuItem
SetRect
DeleteMenu
GetPriorityClipboardFormat
IsClipboardFormatAvailable
CreateWindowExA
LoadCursorA
LoadIconA
CountClipboardFormats
GetActiveWindow
CreatePopupMenu
GetMenuItemCount
MonitorFromPoint
CreateIconFromResourceEx
LoadImageA
GetDC
ReleaseDC
FillRect
GetWindowTextA
OpenClipboard
DialogBoxIndirectParamA
DestroyWindow
OpenThemeData
CloseThemeData
DrawThemeBackground
GetThemeSysColor
GetFileVersionInfoW
GetFileVersionInfoA
mmioFlush
mmioCreateChunk
mmioGetInfo
mmioDescend
mmioRenameW
mmioRead
GdipLoadImageFromFileICM
GdipFree
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipLoadImageFromFile
CoInitializeEx
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoLockObjectExternal
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
RevokeDragDrop
CreateFileMoniker
StgCreateDocfile
CoGetClassObject
PdhBrowseCountersA
SnmpUtilMemReAlloc
Number of PE resources by type
RT_GROUP_CURSOR 9
RT_STRING 9
RT_CURSOR 8
RT_ICON 5
Struct(800) 5
Struct(241) 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 42
PE resources
ExifTool file metadata
CodeSize
106496

SubsystemVersion
4.0

Comments
Nsa Exreskit Dutainment Ab

Languages
English

InitializedDataSize
221184

ImageVersion
0.0

ProductName
Dots

FileVersionNumber
7.7.1.2

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
8.0

PrivateBuild
7.7.1.2

FileTypeExtension
exe

OriginalFileName
Dots.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
7.7.1.2

TimeStamp
2016:10:10 04:14:02+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Dots

ProductVersion
7.7.1.2

FileDescription
Nsa Exreskit Dutainment Ab

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
Weiying (C) 2007-2015

MachineType
Intel 386 or later, and compatibles

CompanyName
Weiying

LegalTrademarks
Weiying (C) 2007-2015

FileSubtype
0

ProductVersionNumber
7.7.1.2

EntryPoint
0xb3e6

ObjectFileType
Executable application

File identification
MD5 74be528fda1823c547f7aa6af6ebd433
SHA1 9c45fca5872329cef99439ae95100bbc19a95d83
SHA256 d8eece3e1453de635e140def1f677107416e2abf3175ba0c85735f96acdd10e4
ssdeep
6144:oeZGMRhpTA+7KAyPsZyupZNemN8QCMVzP4AG1:oeZGIhiGWsZZIxh/

authentihash d6132b6b49c8c900df27aadfb89983d9db34c724c1615443a3d25f7a46262405
imphash cf0a1fbfbb8432e16995bef5b2dbe2c6
File size 324.0 KB ( 331776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2017-04-14 20:27:09 UTC ( 1 week, 5 days ago )
Last submission 2017-04-20 04:40:20 UTC ( 6 days, 18 hours ago )
File names Dots
font_install.exe
10e4.exe
Dots.exe
9c45fca5872329cef99439ae95100bbc19a95d83
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
UDP communications