× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ea63c2b9ece1a953371712343b453a68b846a4c2a5e3f1bc8633e038bd4f1e85
File name: tesla-66.exe
Detection ratio: 8 / 56
Analysis date: 2016-04-05 21:13:48 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Avira (no cloud) TR/Crypt.Xpack.pzug 20160405
Bkav HW32.Packed.2945 20160405
K7GW Hacktool ( 655367771 ) 20160404
McAfee Trojan-FIEW!90E5DA555C84 20160405
Qihoo-360 QVM20.1.Malware.Gen 20160405
Rising PE:Malware.XPACK-HIE/Heur!1.9C48 [F] 20160405
Symantec Suspicious.Cloud.5 20160331
VBA32 BScope.Trojan-Spy.Zbot 20160405
Ad-Aware 20160405
AegisLab 20160405
AhnLab-V3 20160405
Alibaba 20160405
ALYac 20160405
Antiy-AVL 20160405
Arcabit 20160405
Avast 20160405
AVG 20160405
AVware 20160405
Baidu 20160405
Baidu-International 20160405
BitDefender 20160405
CAT-QuickHeal 20160405
ClamAV 20160405
CMC 20160404
Comodo 20160404
Cyren 20160405
DrWeb 20160405
Emsisoft 20160405
ESET-NOD32 20160405
F-Prot 20160405
F-Secure 20160405
Fortinet 20160404
GData 20160405
Ikarus 20160405
Jiangmin 20160405
K7AntiVirus 20160405
Kaspersky 20160405
Kingsoft 20160405
Malwarebytes 20160405
McAfee-GW-Edition 20160405
Microsoft 20160405
eScan 20160405
NANO-Antivirus 20160405
nProtect 20160405
Panda 20160405
Sophos AV 20160405
SUPERAntiSpyware 20160405
Tencent 20160405
TheHacker 20160405
TrendMicro 20160405
TrendMicro-HouseCall 20160405
VIPRE 20160405
ViRobot 20160405
Yandex 20160405
Zillya 20160405
Zoner 20160405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2010 Fabio Martin

Product 7 Sticky Notes
Original name daqoammnhf.exe
Internal name 7StickyNotes
File version 1.09
Description 7 Sticky Notes
Comments 7 Sticky Notes
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-05 14:30:06
Entry Point 0x000187B5
Number of sections 5
PE sections
Overlays
MD5 b2df5ef2bf040eef092ae1ddd9e9d53e
File type data
Offset 714240
Size 774
Entropy 7.70
PE imports
RegDeleteKeyA
RegFlushKey
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_GetImageInfo
ImageList_SetDragCursorImage
ImageList_Read
ImageList_DragMove
ImageList_Remove
ImageList_GetDragImage
Ord(17)
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Replace
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_LoadImageA
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_Create
ImageList_Copy
ImageList_EndDrag
ChooseColorA
SetDIBits
PolyPolyline
GetTextMetricsW
SetMapMode
GetWindowOrgEx
CreateMetaFileA
GetNearestColor
GetEnhMetaFileBits
GetTextMetricsA
PathToRegion
GetROP2
GetViewportOrgEx
GetObjectType
GetTextExtentPointA
SetPixel
EndDoc
IntersectClipRect
CloseMetaFile
CopyEnhMetaFileA
CreateEllipticRgn
CreatePalette
EqualRgn
CreateDIBitmap
GetDIBits
ExtCreateRegion
SetTextAlign
GetDCOrgEx
StretchBlt
StretchDIBits
Pie
SetWindowExtEx
WidenPath
ExtCreatePen
SetBkColor
SetWinMetaFileBits
SetRectRgn
GetDIBColorTable
DeleteEnhMetaFile
CombineRgn
TextOutW
GetSystemPaletteEntries
EnumFontFamiliesExA
OffsetRgn
GetCurrentPositionEx
TextOutA
CreateFontIndirectA
FillRgn
CreateRectRgnIndirect
EndPath
GetPixel
GetBrushOrgEx
ExcludeClipRect
SetBkMode
RectInRegion
PtInRegion
BitBlt
CreateFontIndirectW
GetDeviceCaps
GetClipRgn
SetAbortProc
FrameRgn
CreateBrushIndirect
SelectPalette
CreateEnhMetaFileA
CloseEnhMetaFile
SetROP2
EndPage
SetDIBColorTable
GetTextColor
BeginPath
DeleteObject
CreatePenIndirect
PatBlt
CreatePen
SetStretchBltMode
Rectangle
GetObjectA
CreateDCA
LineTo
DeleteDC
GetMapMode
GetEnhMetaFileDescriptionA
StartPage
RealizePalette
CreatePatternBrush
SetEnhMetaFileBits
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
SelectClipRgn
RoundRect
MaskBlt
GetTextExtentPoint32A
GetWinMetaFileBits
GetEnhMetaFileHeader
GetPaletteEntries
SetWindowOrgEx
SelectObject
GetTextExtentPoint32W
LPtoDP
CreatePolygonRgn
CreateICA
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
GetTextCharset
GetEnhMetaFilePaletteEntries
ExtTextOutW
GetTextExtentExPointA
RestoreDC
GetBitmapBits
GetTextExtentExPointW
FillPath
CreateDIBSection
SetTextColor
ExtFloodFill
GetCurrentObject
GetClipBox
MoveToEx
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
SetBrushOrgEx
CreateRectRgn
SetViewportExtEx
StartDocA
CreateCompatibleBitmap
SetTextJustification
CreateSolidBrush
Polyline
DPtoLP
AbortDoc
Ellipse
DeleteMetaFile
ImmReleaseContext
ImmGetCompositionStringW
ImmGetContext
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
GetComputerNameA
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
DebugBreak
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
GetSystemDefaultLCID
SetErrorMode
GetFileTime
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
SetEvent
LocalFree
ResumeThread
GetLogicalDriveStringsA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
GetStringTypeExA
OutputDebugStringA
SetLastError
GetSystemTime
DeviceIoControl
GetUserDefaultLangID
GlobalFindAtomA
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
RaiseException
EnumCalendarInfoA
LoadLibraryExA
SetConsoleCtrlHandler
GetUserDefaultLCID
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
GetModuleHandleA
CreateThread
GetExitCodeThread
GlobalAddAtomA
MulDiv
GetDiskFreeSpaceExA
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
HeapFree
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GlobalSize
GetDateFormatA
GetFileSize
GlobalDeleteAtom
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetProcAddress
GetProcessHeap
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
ResetEvent
CreateFileMappingA
FindNextFileA
ExpandEnvironmentStringsA
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
InterlockedIncrement
GetLastError
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GetThreadLocale
GlobalUnlock
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
LockResource
GetCPInfo
GetCommandLineA
QueryPerformanceFrequency
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetVersion
FreeResource
SizeofResource
UnmapViewOfFile
Sleep
IsBadReadPtr
FindResourceA
GetOEMCP
WNetAddConnection2A
WNetCancelConnection2A
SysAllocString
SafeArrayCreate
VariantCopy
VariantInit
CreateErrorInfo
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayUnaccessData
VariantCopyInd
GetActiveObject
SafeArrayGetUBound
SysFreeString
OleLoadPicture
VariantChangeType
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayRedim
DispGetIDsOfNames
SetErrorInfo
SysAllocStringLen
VariantClear
SysReAllocStringLen
GetErrorInfo
SafeArrayPutElement
CM_Get_Child
CM_Reenumerate_DevNode
CM_Get_DevNode_Registry_PropertyA
CM_Get_Next_Res_Des
CM_Get_Res_Des_Data
CM_Get_First_Log_Conf
CM_Free_Log_Conf_Handle
SetupDiGetClassImageList
CM_Get_DevNode_Registry_Property_ExA
CM_Get_Parent
CM_Disconnect_Machine
CM_Get_Sibling
SetupDiGetClassImageIndex
CM_Locate_DevNodeA
CM_Get_DevNode_Status_Ex
CM_Get_Device_ID_ExA
CM_Free_Res_Des_Handle
CM_Get_Child_Ex
CM_Connect_MachineA
CM_Get_Sibling_Ex
CM_Locate_DevNode_ExA
SetupDiDestroyClassImageList
SHGetFileInfoA
ShellExecuteA
ShellExecuteExA
SHGetSpecialFolderPathA
Shell_NotifyIconA
RedrawWindow
GetForegroundWindow
SetWindowRgn
CharPrevA
CharLowerBuffA
EnableScrollBar
GetScrollPos
DestroyMenu
PostQuitMessage
GetMessagePos
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
SendMessageW
UnregisterClassA
DefFrameProcA
GetClassInfoW
GetMenuItemInfoA
DrawTextW
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
GetSysColor
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
GetSubMenu
GetWindowTextW
EnumClipboardFormats
LockWindowUpdate
wsprintfA
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetActiveWindow
GetWindowTextA
InvalidateRgn
GetKeyState
DestroyWindow
GetMessageA
GetParent
GetWindowRgn
SetPropA
EqualRect
EnumWindows
DefWindowProcA
ShowWindow
SetClassLongA
GetPropA
GetMenuState
TranslateMDISysAccel
EnableWindow
LoadImageA
PeekMessageA
ChildWindowFromPoint
IsCharAlphaA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
ActivateKeyboardLayout
InsertMenuItemA
GetIconInfo
LoadStringA
SetParent
RegisterClassW
CharLowerA
IsZoomed
GetWindowPlacement
SetWindowLongW
GetKeyboardLayoutList
DrawMenuBar
EnableMenuItem
RegisterClassA
GetMenuItemCount
TabbedTextOutA
GetWindowLongA
EnumPropsA
SetTimer
OemToCharA
GetKeyboardLayout
FillRect
EnumThreadWindows
CharNextA
GetSysColorBrush
IsWindowUnicode
CreateWindowExW
TabbedTextOutW
CreateMenu
GetUpdateRect
CharToOemA
IsChild
IsDialogMessageA
MapWindowPoints
SendNotifyMessageA
MapVirtualKeyA
DrawEdge
PostMessageA
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
ShowCaret
KillTimer
GetComboBoxInfo
RegisterWindowMessageA
DefMDIChildProcA
GetSystemMetrics
GetClipboardData
IsCharAlphaNumericA
IsIconic
SetScrollRange
GetWindowRect
InflateRect
UpdateWindow
SetCapture
ReleaseCapture
IntersectRect
CreateWindowExA
SetWindowLongA
IsRectEmpty
SetKeyboardState
DrawTextExW
RemovePropA
CreatePopupMenu
CheckMenuItem
ChildWindowFromPointEx
DrawFocusRect
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
GetDCEx
BringWindowToTop
ScreenToClient
GetClassLongA
InsertMenuA
FindWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
BeginDeferWindowPos
ValidateRect
ShowOwnedPopups
GetSystemMenu
GetMenuItemID
SetForegroundWindow
OpenClipboard
GetAsyncKeyState
ReleaseDC
GetScrollRange
GetScrollInfo
HideCaret
GetCapture
WaitMessage
FindWindowA
MessageBeep
GetCaretPos
DrawTextExA
SetFocus
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
AppendMenuA
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
GetCursor
GetWindowDC
DestroyCursor
AdjustWindowRectEx
mouse_event
LoadKeyboardLayoutA
RemoveMenu
SetScrollInfo
CopyImage
EndDeferWindowPos
SystemParametersInfoA
GetDoubleClickTime
DestroyIcon
GetKeyNameTextA
GetWindowLongW
IsWindowVisible
EmptyClipboard
GetDesktopWindow
WinHelpA
UnionRect
FrameRect
SetRect
DeleteMenu
InvalidateRect
SendMessageA
CallWindowProcW
SetWindowTextA
GetKeyboardType
GetClientRect
CallWindowProcA
GetClassNameA
GetFocus
wsprintfW
CloseClipboard
GetMenu
SetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
FtpFindFirstFileA
HttpOpenRequestA
InternetOpenA
HttpEndRequestA
HttpSendRequestExA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetConnectA
InternetQueryOptionA
FtpDeleteFileA
FtpGetFileSize
InternetWriteFile
FtpSetCurrentDirectoryA
InternetReadFile
InternetOpenUrlA
InternetFindNextFileA
HttpQueryInfoA
HttpSendRequestA
FtpCreateDirectoryA
FtpGetCurrentDirectoryA
InternetSetOptionA
FtpOpenFileA
Ord(137)
GdipSetPenDashCap197819
GdipAddPathCurve2I
GdipCreateFromHWNDICM
GdipEnumerateMetafileSrcRectDestPointI
GdipGetImageAttributesAdjustedPalette
GdipGetHatchBackgroundColor
GdipGetGenericFontFamilySansSerif
GdipTransformPointsI
GdipEnumerateMetafileSrcRectDestPoint
GdipDrawImageRectRectI
GdipDrawClosedCurveI
GdipDrawEllipseI
GdipAddPathPieI
GdipEnumerateMetafileSrcRectDestPoints
GdipCreateRegion
GdipDrawImagePointsRect
GdipSaveAddImage
GdipDrawLinesI
GdipGetMetafileDownLevelRasterizationLimit
GdipCreateBitmapFromFileICM
GdipResetImageAttributes
GdipAddPathEllipseI
GdipDeleteCachedBitmap
GdipClonePath
GdipFillPolygon2
GdipIsStyleAvailable
GdipAddPathEllipse
GdipDrawClosedCurve2I
GdipGetLogFontW
GdipCreatePathGradient
GdipIsMatrixEqual
GdipSaveImageToFile
GdipSetPenLineCap197819
GdipSetImageAttributesToIdentity
GdipSetPenCustomEndCap
GdipCreateTexture
GdipAddPathCurveI
GdipSetLineLinearBlend
GdipTransformPoints
GdipCreateMetafileFromWmfFile
GdipSetPenMiterLimit
GdipCreateTexture2
GdipCloneMatrix
GdipGetPointCount
GdipCloneRegion
GdipCreateBitmapFromHICON
GdipCreateTextureIAI
GdipCreateBitmapFromGdiDib
GdipSetPenDashOffset
GdipCreateMetafileFromFile
GdipClosePathFigures
GdipSetPathGradientCenterPoint
GdipIsInfiniteRegion
GdipDrawImagePointRect
GdipCreateMatrix3I
GdipGetCellDescent
GdipGetPropertyIdList
GdipGetMetafileHeaderFromStream
GdipDeleteFontFamily
GdipAddPathLine2I
GdipGetImageDimension
GdipDeleteFont
GdipSetImageAttributesThreshold
GdipGetPropertySize
GdipCreateTexture2I
GdipAddPathBezierI
GdipGetPathFillMode
GdipIsMatrixIdentity
GdipGetImageDecodersSize
GdipGetPathPoints
GdipAddPathRectangle
GdipRotateWorldTransform
GdipFillClosedCurveI
GdipAddPathArcI
GdipBeginContainer
GdipSetImageAttributesWrapMode
GdipAddPathPolygonI
GdipCreateBitmapFromFile
GdipGetRegionHRgn
GdipCreateSolidFill
GdipCreatePathGradientFromPath
GdipCreateCustomLineCap
GdipGetRegionBounds
GdipDrawCurve2
GdipGetRegionScansCount
GdipPathIterIsValid
GdipGetPathData
GdipIsMatrixInvertible
GdipGetGenericFontFamilySerif
GdipDeleteGraphics
GdipPathIterGetSubpathCount
GdipAddPathLineI
GdipCreateFromHDC
GdipCreatePen1
GdipFillPolygon
GdipSetPenColor
GdipCreateFromHWND
GdipGetAdjustableArrowCapFillState
GdipSetPathGradientCenterPointI
GdipSetAdjustableArrowCapFillState
GdipGetMatrixElements
GdipGetStringFormatTabStops
GdipCreateBitmapFromResource
_except_handler3
isalnum
_CIsin
exit
isspace
__set_app_type
OleUninitialize
CoUninitialize
DoDragDrop
IsEqualGUID
CreateStreamOnHGlobal
RevokeDragDrop
IsAccelerator
RegisterDragDrop
StringFromCLSID
CreateOleAdviseHolder
CoGetClassObject
ProgIDFromCLSID
OleDraw
OleRegGetUserType
OleInitialize
CoLockObjectExternal
CoCreateInstance
OleRegEnumVerbs
CoInitialize
CreateDataAdviseHolder
CoTaskMemAlloc
CoRevokeClassObject
CLSIDFromProgID
CoDisconnectObject
OleSetMenuDescriptor
CoTaskMemFree
Number of PE resources by type
RT_ICON 6
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
7 Sticky Notes

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
1.9.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
7 Sticky Notes

CharacterSet
Unicode

InitializedDataSize
531456

EntryPoint
0x187b5

OriginalFileName
daqoammnhf.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2010 Fabio Martin

FileVersion
1.09

TimeStamp
2016:04:05 15:30:06+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
7StickyNotes

ProductVersion
1.09

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Pabio Martin

CodeSize
214528

ProductName
7 Sticky Notes

ProductVersionNumber
1.9.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 90e5da555c840825b565061a43dad5c5
SHA1 dd37e3bec4969225ea61d7ed7334bceb723c7281
SHA256 ea63c2b9ece1a953371712343b453a68b846a4c2a5e3f1bc8633e038bd4f1e85
ssdeep
12288:M3bsrMz1okmyjflOUjH1AfX66w6QTzkL1fabXoKUmKTfaGbEznlt:sboJ+NfiX54K9+Yult

authentihash 6056d2b9f73b90c313e994597ff100a74a1ca91e2c6250a04b824811bc17b01d
imphash 00f7315226405b379a9c02a027c45040
File size 698.3 KB ( 715014 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2016-04-05 21:13:48 UTC ( 3 years, 1 month ago )
Last submission 2016-04-14 04:29:34 UTC ( 3 years, 1 month ago )
File names tesla-66.exe
7StickyNotes
daqoammnhf.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Code injections in the following processes
Terminated processes
Created mutexes
Opened mutexes
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications