× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dd902d3823a9dea9a0b070ec237166a693e4e3b0c10c7261cdca7bfbba1c154e
File name: 126ab55e7ca00408282ec531b3e7a177
Detection ratio: 20 / 57
Analysis date: 2016-05-28 12:24:56 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Antiy-AVL Trojan/Win32.SGeneric 20160528
Avast Win32:Malware-gen 20160528
AVG Downloader.Generic14.AXUN 20160528
Avira (no cloud) TR/Crypt.Xpack.boid 20160528
AVware Trojan.Win32.Generic!BT 20160528
Baidu Win32.Trojan.Kryptik.aec 20160527
DrWeb Trojan.Siggen6.58358 20160528
ESET-NOD32 Win32/TrojanDownloader.Agent.CHT 20160528
Fortinet W32/Yakes.PSSM!tr 20160528
GData Win32.Trojan.Agent.KGBYNN 20160528
Kaspersky Trojan.Win32.Yakes.pssm 20160528
Malwarebytes Trojan.Crypt 20160528
McAfee Gamarue-FGH!126AB55E7CA0 20160528
McAfee-GW-Edition BehavesLike.Win32.BadFile.ch 20160527
Microsoft VirTool:Win32/CeeInject.GF 20160528
Panda Trj/Genetic.gen 20160528
Qihoo-360 HEUR/QVM09.0.0000.Malware.Gen 20160528
Sophos AV Mal/Generic-S 20160528
TrendMicro TROJ_GEN.R021C0DES16 20160528
VIPRE Trojan.Win32.Generic!BT 20160528
Ad-Aware 20160528
AegisLab 20160528
AhnLab-V3 20160528
Alibaba 20160527
ALYac 20160528
Arcabit 20160528
Baidu-International 20160528
BitDefender 20160528
Bkav 20160528
CAT-QuickHeal 20160528
ClamAV 20160528
CMC 20160523
Comodo 20160528
Cyren 20160528
Emsisoft 20160528
F-Prot 20160528
F-Secure 20160528
Ikarus 20160528
Jiangmin 20160528
K7AntiVirus 20160528
K7GW 20160528
Kingsoft 20160528
eScan 20160528
NANO-Antivirus 20160528
nProtect 20160527
Rising 20160528
SUPERAntiSpyware 20160528
Symantec 20160528
Tencent 20160528
TheHacker 20160527
TotalDefense 20160528
TrendMicro-HouseCall 20160528
VBA32 20160527
ViRobot 20160528
Yandex 20160526
Zillya 20160528
Zoner 20160528
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-05-23 16:23:08
Entry Point 0x00007BBB
Number of sections 7
PE sections
PE imports
RegDeleteKeyA
RegFlushKey
RegCloseKey
RegEnumValueA
RegQueryValueExA
SetThreadToken
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegCreateKeyA
RegOpenKeyExA
LookupPrivilegeValueW
RegEnumKeyExA
RegQueryInfoKeyA
ImageList_BeginDrag
ImageList_Destroy
ImageList_GetDragImage
ImageList_SetBkColor
ImageList_DragLeave
ImageList_SetDragCursorImage
ImageList_DragMove
ImageList_Create
Ord(17)
ImageList_DragShowNolock
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_EndDrag
GetOpenFileNameA
ChooseColorA
FindTextA
GetSaveFileNameA
ChooseFontA
SetBkColor
SelectClipRgn
Rectangle
CreateFontIndirectW
GetSystemTime
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
HeapDestroy
GetTickCount
TlsAlloc
GetVersionExA
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FileTimeToLocalFileTime
GetEnvironmentStrings
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
GetConsoleOutputCP
MoveFileW
WideCharToMultiByte
ExitProcess
InterlockedDecrement
MultiByteToWideChar
HeapSize
InterlockedIncrement
FreeEnvironmentStringsW
GetCommandLineA
GetUserDefaultLCID
LeaveCriticalSection
TlsFree
IsBadReadPtr
SetStdHandle
GetModuleHandleA
UnhandledExceptionFilter
GetCPInfo
GetStringTypeA
SetFilePointer
lstrcmpA
FindFirstFileA
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
GetThreadTimes
GetACP
HeapReAlloc
GetStringTypeW
GetProcAddress
IsDebuggerPresent
TerminateProcess
LCMapStringA
WriteConsoleA
InitializeCriticalSection
HeapCreate
SetLastError
CreateFileW
VirtualFree
ConvertThreadToFiber
TlsGetValue
Sleep
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
GetProcessHeap
VirtualAlloc
LocalAlloc
WriteConsoleW
GetTimeFormatA
SHGetFileInfoA
ShellExecuteExA
SHChangeNotify
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetDataFromIDListA
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
GetMessagePos
GetParent
UpdateWindow
FindWindowW
GetMouseMovePointsEx
CheckRadioButton
GetWindowContextHelpId
SetWindowPos
DdeImpersonateClient
GetClipboardFormatNameA
MoveWindow
MessageBoxA
PostMessageW
GetMenu
LoadStringA
GetClassLongW
IsWindowVisible
UnionRect
ScreenToClient
InvalidateRect
wsprintfA
CreateMenu
LoadCursorA
GetLayeredWindowAttributes
TrackPopupMenu
EnumThreadWindows
CharNextA
GetDialogBaseUnits
CreateWindowExW
MapVirtualKeyExA
GetKeyboardType
DestroyWindow
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Number of PE resources by type
RT_STRING 6
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 6
ENGLISH CARIBBEAN 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:05:23 17:23:08+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
60416

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
142848

SubsystemVersion
5.0

EntryPoint
0x7bbb

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 126ab55e7ca00408282ec531b3e7a177
SHA1 9a09587a20ebf0169c80fa8064b7006a46fa4331
SHA256 dd902d3823a9dea9a0b070ec237166a693e4e3b0c10c7261cdca7bfbba1c154e
ssdeep
3072:BeXnXL08ucjlCRxHE+sT4C3b5i6ZZ3uIPuy7zkFzACDgtG8lO94UwEivvll:onXtZQMMgDZjzXklAKgo8lOeUm1l

authentihash c9f77b990b17c9f9a0eb6f3cac084ba9f8447c28b59eb5b808fc55951562293b
imphash 11fd6bf33ff7e82d646c8b639e729256
File size 199.5 KB ( 204288 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-05-28 12:24:56 UTC ( 2 years, 10 months ago )
Last submission 2016-05-28 12:24:56 UTC ( 2 years, 10 months ago )
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R021C0DES16.

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications