× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e762e90ab57025da2d9255df9e83457037f9fc80e0cce98c9e1f372804b103eb
File name: litecoin-qt.exe
Detection ratio: 4 / 54
Analysis date: 2014-09-03 21:33:32 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
AVware Trojan.Win32.Generic!BT 20140903
Baidu-International Hacktool.Win32.BitCoinMiner.bBJ 20140903
ESET-NOD32 a variant of Win32/BitCoinMiner.BJ 20140903
VIPRE Trojan.Win32.Generic!BT 20140903
Ad-Aware 20140903
AegisLab 20140903
Yandex 20140903
AhnLab-V3 20140903
Avast 20140903
AVG 20140903
Avira (no cloud) 20140903
BitDefender 20140903
Bkav 20140903
ByteHero 20140903
CAT-QuickHeal 20140903
ClamAV 20140903
CMC 20140901
Comodo 20140903
Cyren 20140903
DrWeb 20140903
Emsisoft 20140903
F-Prot 20140903
F-Secure 20140903
Fortinet 20140903
GData 20140903
Ikarus 20140903
Jiangmin 20140903
K7AntiVirus 20140903
K7GW 20140903
Kaspersky 20140903
Kingsoft 20140903
Malwarebytes 20140903
McAfee 20140903
McAfee-GW-Edition 20140903
Microsoft 20140903
eScan 20140903
NANO-Antivirus 20140903
Norman 20140903
nProtect 20140903
Panda 20140903
Qihoo-360 20140903
Rising 20140903
Sophos AV 20140903
SUPERAntiSpyware 20140903
Symantec 20140903
Tencent 20140903
TheHacker 20140903
TotalDefense 20140903
TrendMicro 20140903
TrendMicro-HouseCall 20140903
VBA32 20140903
ViRobot 20140903
Zillya 20140903
Zoner 20140901
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2009-2013 The Bitcoin developers 2011-2013 The Litecoin developers

Publisher Litecoin
Product Litecoin-Qt
Original name litecoin-qt.exe
Internal name litecoin-qt
File version 0.8.6.2
Description Litecoin-Qt (OSS GUI client for Litecoin)
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1974-12-18 20:58:32
Entry Point 0x000014C0
Number of sections 9
PE sections
PE imports
RegCreateKeyExW
RegCloseKey
CopySid
RegQueryValueExA
RegDeleteKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
RegFlushKey
OpenProcessToken
DeregisterEventSource
RegOpenKeyExW
RegisterEventSourceA
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
GetLengthSid
RegDeleteValueW
RegSetValueExW
FreeSid
RegEnumValueW
InitializeSecurityDescriptor
ReportEventA
GetSaveFileNameW
GetOpenFileNameW
SetGraphicsMode
GetCharABCWidthsW
GetCharABCWidthsFloatW
CreateFontIndirectW
SetBkMode
GetGlyphOutlineW
CreatePen
GetBkMode
SaveDC
SetTextAlign
GetPaletteEntries
EndPath
CombineRgn
GetTextMetricsW
GetBitmapBits
StretchBlt
GetDeviceCaps
CreateDCA
LineTo
OffsetRgn
DeleteDC
SetWorldTransform
RestoreDC
PolyBezierTo
SetPolyFillMode
EndDoc
PtInRegion
StartPage
GetRegionData
FillPath
CreateDCW
CreateDIBSection
RealizePalette
SetTextColor
GetObjectA
MoveToEx
ExtTextOutW
GetObjectW
CreateEllipticRgn
CreateBitmap
BitBlt
CreatePalette
EnumFontFamiliesExW
GetStockObject
SelectPalette
GetOutlineTextMetricsW
GetDIBits
GdiFlush
SelectClipRgn
CreateCompatibleDC
GetTextExtentPoint32W
StartDocW
StrokePath
EndPage
CreateRectRgn
CloseFigure
AbortDoc
GetNearestPaletteIndex
CreateSolidBrush
GetTextFaceW
ExtCreatePen
SelectObject
GetFontData
ResetDCW
BeginPath
DeleteObject
CreateCompatibleBitmap
SelectClipPath
ImmSetCompositionFontW
ImmSetCompositionWindow
ImmGetDefaultIMEWnd
ImmNotifyIME
ImmGetContext
ImmSetCandidateWindow
ImmReleaseContext
ImmGetCompositionStringW
ImmAssociateContext
GetIpAddrTable
GetBestRoute
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
CreateWaitableTimerA
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
GetHandleInformation
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
MoveFileW
UnhandledExceptionFilter
IsValidLanguageGroup
OpenFileMappingA
SetErrorMode
GetLogicalDrives
GetFileInformationByHandle
GetThreadContext
GetLocaleInfoW
GetFileTime
IsDBCSLeadByteEx
GetTempPathA
WideCharToMultiByte
GetOverlappedResult
GetTempPathW
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetThreadPriority
SetEvent
LocalFree
FormatMessageW
ConnectNamedPipe
SetWaitableTimer
GetEnvironmentVariableA
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
QueueUserWorkItem
OutputDebugStringA
VirtualQuery
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
GetModuleFileNameW
TryEnterCriticalSection
ExitProcess
GetVersionExA
GetModuleFileNameA
FlushViewOfFile
QueueUserAPC
SetThreadPriority
CreateDirectoryExW
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
SetProcessAffinityMask
FindNextChangeNotification
SetFilePointer
SetFileAttributesW
LockFileEx
CreateSemaphoreA
CreateThread
VirtualLock
MoveFileExW
GetSystemDirectoryW
DisconnectNamedPipe
CreateSemaphoreW
CreateMutexW
MoveFileExA
SetThreadContext
MoveFileA
GlobalMemoryStatus
FindCloseChangeNotification
SetUnhandledExceptionFilter
GetVersion
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
SleepEx
CloseHandle
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
GlobalSize
GetStartupInfoA
UnlockFile
OpenProcess
CreateDirectoryA
DeleteFileA
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GetProcAddress
GetSystemInfo
GetProcessHeap
CreateWaitableTimerW
GetProfileStringW
CompareStringW
SetCriticalSectionSpinCount
GetFileSizeEx
RemoveDirectoryW
ExpandEnvironmentStringsW
FindNextFileW
ResetEvent
CreateFileMappingA
FindNextFileA
IsValidLocale
DuplicateHandle
FindFirstFileExW
GetUserDefaultLCID
GetProcessAffinityMask
CreateEventW
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
GetCurrencyFormatW
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
CreateFileMappingW
VirtualAllocEx
CreateNamedPipeW
lstrlenA
GlobalFree
ResumeThread
GetTimeFormatW
GlobalUnlock
LockFile
FindFirstChangeNotificationW
GetQueuedCompletionStatus
WaitForSingleObjectEx
SwitchToThread
GetCurrentDirectoryW
VirtualFreeEx
GetCurrentProcessId
WaitNamedPipeW
CreateIoCompletionPort
SetFileTime
GetCommandLineW
GetCurrentThread
SuspendThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
VirtualUnlock
ReadFile
PulseEvent
FindFirstFileA
GlobalLock
GetModuleHandleW
GetFileAttributesExW
GetLongPathNameW
UnmapViewOfFile
WriteFile
PostQueuedCompletionStatus
CreateProcessW
WaitForMultipleObjects
Sleep
TerminateProcess
OpenEventA
GetAcceptExSockaddrs
AcceptEx
VariantInit
SysAllocStringLen
Shell_NotifyIconW
ShellExecuteW
SHGetSpecialFolderPathA
SHGetFileInfoW
PathFileExistsW
PathRemoveFileSpecW
SetFocus
SetWindowRgn
SetWindowPos
EndPaint
ScrollWindowEx
WindowFromPoint
SetCaretBlinkTime
SetMenuItemInfoW
GetDC
DestroyCursor
GetCursorPos
ReleaseDC
GetMenu
TranslateMessage
UnregisterClassW
GetClassInfoW
ToAscii
SetCaretPos
CallNextHookEx
GetSysColor
LoadImageW
ClientToScreen
GetActiveWindow
InvalidateRgn
DestroyWindow
GetUserObjectInformationW
GetParent
UpdateWindow
CreateCaret
GetMessageW
ShowWindow
FlashWindowEx
ValidateRgn
PeekMessageW
SetWindowPlacement
GetClipboardFormatNameW
GetSystemMenu
SetParent
DestroyCaret
CreateCursor
CharNextExA
GetIconInfo
GetQueueStatus
RegisterClassW
IsZoomed
GetWindowPlacement
SetWindowLongW
GetKeyboardLayoutList
IsIconic
TrackPopupMenuEx
SetTimer
GetKeyboardLayout
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetUpdateRect
IsChild
MapWindowPoints
RegisterWindowMessageW
BeginPaint
DefWindowProcW
KillTimer
MapVirtualKeyW
ClipCursor
SetClipboardViewer
GetSystemMetrics
EnableMenuItem
GetWindowRect
SetCapture
ReleaseCapture
GetProcessWindowStation
DrawIconEx
SetWindowTextW
CreateIconIndirect
ScreenToClient
PostMessageW
GetKeyboardState
GetDesktopWindow
SetWindowsHookExW
LoadIconW
FindWindowExW
DispatchMessageW
SetForegroundWindow
GetAsyncKeyState
GetCaretBlinkTime
HideCaret
FindWindowW
MessageBeep
GetWindowThreadProcessId
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
MessageBoxA
ChangeClipboardChain
AdjustWindowRectEx
MsgWaitForMultipleObjectsEx
RegisterClipboardFormatW
GetKeyState
GetWindowRgn
GetDoubleClickTime
DestroyIcon
IsWindowVisible
SetDoubleClickTime
SetCursorPos
SystemParametersInfoW
InvalidateRect
GetClientRect
ToUnicode
GetFocus
SetCursor
PlaySoundW
DeviceCapabilitiesW
GetPrinterW
EnumFormsW
EnumPrintersW
ClosePrinter
OpenPrinterW
getaddrinfo
htonl
shutdown
WSARecv
accept
ioctlsocket
WSAStartup
freeaddrinfo
WSASocketW
getsockname
WSAAddressToStringA
htons
getnameinfo
WSAGetLastError
gethostname
getsockopt
recv
send
ntohl
inet_addr
WSASend
ntohs
select
listen
__WSAFDIsSet
WSACleanup
WSASetLastError
WSAAsyncSelect
closesocket
setsockopt
socket
bind
sendto
connect
__lconv_init
wcsftime
fseek
fclose
_snwprintf
strtoul
fflush
isxdigit
_fmode
strtol
fputc
system
_wgetenv
fwrite
frexp
fputs
_fstat64
ungetwc
isspace
_close
puts
iswctype
wcscoll
_exit
__dllonexit
_wfopen
strstr
_write
_clearfp
memcpy
perror
ctime
memmove
localtime
signal
freopen
_initterm
strcmp
memchr
strncmp
fgetc
memset
strcat
_stricmp
_setmode
fgets
__pioinfo
strchr
asin
fopen
_beginthread
fgetpos
fsetpos
strftime
ftell
__initenv
exit
sprintf
strrchr
_acmdln
ferror
gmtime
free
ungetc
_getdrive
__getmainargs
strlen
_stat
_lseeki64
_vsnprintf
putchar
_flushall
_read
wcsxfrm
strcpy
__mb_cur_max
islower
acos
isupper
_ftime
_iob
rand
_putenv
setlocale
realloc
_getcwd
strxfrm
__doserrno
_open_osfhandle
fwprintf
isprint
_setjmp3
toupper
printf
_commit
_memicmp
strncpy
_cexit
raise
isalnum
mktime
qsort
_tzset
_open
_onexit
wcslen
isalpha
_snprintf
putc
memcmp
__setusermatherr
log10
srand
vprintf
_fdopen
getenv
atoi
vfprintf
atol
atof
strcoll
localeconv
strerror
wcscpy
_beginthreadex
strspn
_strnicmp
putwc
_tzname
malloc
sscanf
fread
_waccess
abort
fprintf
getwc
tan
ispunct
feof
_endthreadex
_amsg_exit
_control87
_chsize
_lock
_get_osfhandle
_strdup
towlower
_fileno
wcsrchr
longjmp
tolower
atan
_unlock
calloc
setbuf
_getch
towupper
iswprint
_errno
atan2
_filelengthi64
setvbuf
time
wcsstr
_wgetdcwd
getc
_wchmod
__set_app_type
OleUninitialize
CoUninitialize
CoInitialize
OleFlushClipboard
CoLockObjectExternal
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
CoCreateInstance
DoDragDrop
RevokeDragDrop
OleSetClipboard
CoGetMalloc
OleGetClipboard
OleIsCurrentClipboard
CoTaskMemFree
StringFromGUID2
OleInitialize
Number of PE resources by type
RT_ICON 2
RT_GROUP_ICON 2
RT_VERSION 1
Number of PE resources by language
ENGLISH US 5
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
2.24

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
0.8.6.2

UninitializedDataSize
33792

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
19773952

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
2009-2013 The Bitcoin developers 2011-2013 The Litecoin developers

FileVersion
0.8.6.2

LegalTrademarks1
Distributed under the MIT/X11 software license, see the accompanying file COPYING or http://www.opensource.org/licenses/mit-license.php.

TimeStamp
1974:12:18 21:58:32+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
litecoin-qt

ProductVersion
0.8.6.2

FileDescription
Litecoin-Qt (OSS GUI client for Litecoin)

OSVersion
4.0

OriginalFilename
litecoin-qt.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Litecoin

CodeSize
13342208

ProductName
Litecoin-Qt

ProductVersionNumber
0.8.6.2

EntryPoint
0x14c0

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 a8dc7a4a5c08f2172eff2f3f47b61b07
SHA1 051b2678fbf64c5f3ff09542090ba88f1d5f435e
SHA256 e762e90ab57025da2d9255df9e83457037f9fc80e0cce98c9e1f372804b103eb
ssdeep
393216:BjVqqRSvkcMLfdLzGyaeKPZcNe4A9AjmBmtHYWQ+zx7wlCivMyBJsv6tWKFdu9CR:51blKHevCnh

authentihash 4c568bf827ff58d7874bd534764119233e4449d02971f406b4ea7aadd91293bf
imphash 53446d7144ee84f0457a5f5f4aff4da0
File size 18.9 MB ( 19774976 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (46.2%)
Win32 EXE PECompact compressed (generic) (44.6%)
Win32 Executable (generic) (4.8%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Tags
peexe

VirusTotal metadata
First submission 2014-08-30 05:04:20 UTC ( 3 years, 1 month ago )
Last submission 2014-09-03 21:33:32 UTC ( 3 years, 1 month ago )
File names litecoin-qt
4d5a9bc7f7ac09513fbac4f71ae5e9e1881dbc26bb213c3889be2fa0e32cf10c
litecoin-qt.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
HTTP requests
TCP connections