× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e5bc63e0c3025b5dd39748fef61a57963f7f22d7c5ea91f8ff032230abe25fb2
File name: 4172363f9ef187f0b26e04f9e331501e.virus
Detection ratio: 34 / 56
Analysis date: 2016-09-28 17:02:29 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3526401 20160928
AhnLab-V3 Trojan/Win32.Tepfer.N2103484600 20160928
ALYac Trojan.GenericKD.3526401 20160928
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20160928
Arcabit Trojan.Generic.D35CF01 20160928
Avast Win32:Malware-gen 20160928
AVG PSW.Generic13.NUB 20160928
Avira (no cloud) TR/Crypt.Xpack.nydo 20160928
AVware Trojan.Win32.Generic!BT 20160928
Baidu Win32.Trojan.WisdomEyes.151026.9950.9998 20160928
BitDefender Trojan.GenericKD.3526401 20160928
CrowdStrike Falcon (ML) malicious_confidence_98% (D) 20160725
DrWeb Trojan.PWS.Papras.2271 20160928
Emsisoft Trojan.GenericKD.3526401 (B) 20160928
ESET-NOD32 Win32/PSW.Papras.EJ 20160928
F-Secure Trojan.GenericKD.3526401 20160928
Fortinet W32/Papras.EJ!tr.pws 20160928
GData Trojan.GenericKD.3526401 20160928
Sophos ML trojan.win32.lethic.i 20160917
Jiangmin Backdoor.Vawtrak.d 20160928
Kaspersky Backdoor.Win32.Androm.kpfg 20160928
McAfee Artemis!4172363F9EF1 20160928
McAfee-GW-Edition BehavesLike.Win32.BadFile.dh 20160927
Microsoft Backdoor:Win32/Vawtrak.E 20160928
eScan Trojan.GenericKD.3526401 20160928
NANO-Antivirus Trojan.Win32.Androm.egevkx 20160927
Panda Trj/GdSda.A 20160928
Qihoo-360 HEUR/QVM09.0.0000.Malware.Gen 20160928
Rising Malware.Heuristic!ET (rdm+) 20160928
Sophos AV Mal/Generic-S 20160928
Symantec Backdoor.Trojan 20160928
Tencent Win32.Backdoor.Androm.Pavi 20160928
TrendMicro TROJ_GEN.R011C0DIE16 20160928
VIPRE Trojan.Win32.Generic!BT 20160928
AegisLab 20160928
Alibaba 20160928
Bkav 20160928
CAT-QuickHeal 20160928
ClamAV 20160928
CMC 20160928
Comodo 20160928
Cyren 20160928
F-Prot 20160926
Ikarus 20160928
K7AntiVirus 20160928
K7GW 20160928
Kingsoft 20160928
Malwarebytes 20160928
nProtect 20160928
SUPERAntiSpyware 20160928
TheHacker 20160927
VBA32 20160928
ViRobot 20160928
Yandex 20160927
Zillya 20160928
Zoner 20160928
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-09-02 04:45:44
Entry Point 0x00002B17
Number of sections 4
PE sections
PE imports
GetStdHandle
FileTimeToDosDateTime
GetConsoleOutputCP
GetFileAttributesA
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
InitializeCriticalSection
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
EnumCalendarInfoA
EnumSystemLocalesA
GetPrivateProfileStringA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateMutexA
SetFilePointer
GetExitCodeThread
SetUnhandledExceptionFilter
GetSystemDirectoryA
TerminateProcess
WriteConsoleA
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetFileSize
CreateDirectoryA
DeleteFileA
GetCPInfo
GetProcAddress
GetProcessHeap
FindFirstFileA
GetDiskFreeSpaceA
CompareStringA
GetTempFileNameA
FindNextFileA
ExpandEnvironmentStringsA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
GetCurrentDirectoryA
HeapSize
GetCommandLineA
TlsFree
GetModuleHandleA
GlobalFlags
CloseHandle
GetACP
CreateProcessA
HeapCreate
VirtualFree
Sleep
FindResourceA
VirtualAlloc
GetOEMCP
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:09:02 05:45:44+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
52736

LinkerVersion
9.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0x2b17

InitializedDataSize
277504

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 4172363f9ef187f0b26e04f9e331501e
SHA1 becc33ac76ac7e1fee86e494b28e6992ad6a2b92
SHA256 e5bc63e0c3025b5dd39748fef61a57963f7f22d7c5ea91f8ff032230abe25fb2
ssdeep
3072:JCj9KMw247JXyQ/qXHA/FZ7GnVPC4lWHKjTcAh/YUT386PQXV3Gbsb0aj+:JCjwMw7JVqCZ26KjfwUTDYXVWYY

authentihash d0770c62635823261e716c895790e24465df2b15f3d2313f5f890d5a1125bed4
imphash 591b972e1251d5ae364d695dd0ef6e9d
File size 244.5 KB ( 250368 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-09-28 17:02:29 UTC ( 2 years, 4 months ago )
Last submission 2016-09-28 17:02:29 UTC ( 2 years, 4 months ago )
File names 4172363f9ef187f0b26e04f9e331501e.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Code injections in the following processes
Created mutexes
Runtime DLLs
UDP communications