× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f292ae344f5392875f3016297551b905253fab604b530516e65b118292f48832
File name: home.php.exe_
Detection ratio: 3 / 56
Analysis date: 2016-03-22 11:51:49 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
Bkav HW32.Packed.5530 20160321
Qihoo-360 HEUR/QVM07.1.Malware.Gen 20160322
Rising PE:Malware.XPACK-HIE/Heur!1.9C48 [F] 20160322
Ad-Aware 20160322
AegisLab 20160322
Yandex 20160316
AhnLab-V3 20160322
Alibaba 20160322
ALYac 20160322
Antiy-AVL 20160322
Arcabit 20160322
Avast 20160322
AVG 20160321
Avira (no cloud) 20160322
AVware 20160322
Baidu 20160322
Baidu-International 20160322
BitDefender 20160322
ByteHero 20160322
CAT-QuickHeal 20160322
ClamAV 20160319
CMC 20160322
Comodo 20160322
Cyren 20160322
DrWeb 20160322
Emsisoft 20160322
ESET-NOD32 20160322
F-Prot 20160322
F-Secure 20160322
Fortinet 20160322
GData 20160322
Ikarus 20160322
Jiangmin 20160322
K7AntiVirus 20160322
K7GW 20160322
Kaspersky 20160322
Malwarebytes 20160322
McAfee 20160322
McAfee-GW-Edition 20160322
Microsoft 20160322
eScan 20160322
NANO-Antivirus 20160322
nProtect 20160322
Panda 20160321
Sophos AV 20160322
SUPERAntiSpyware 20160322
Symantec 20160322
Tencent 20160322
TheHacker 20160321
TrendMicro 20160322
TrendMicro-HouseCall 20160322
VBA32 20160321
VIPRE 20160322
ViRobot 20160322
Zillya 20160322
Zoner 20160322
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-08-16 08:18:11
Entry Point 0x000270C6
Number of sections 4
PE sections
PE imports
ImageList_Draw
InitCommonControlsEx
LocalAlloc
GetModuleHandleA
EnumSystemLocalesA
Number of PE resources by type
RT_ICON 8
RT_GROUP_ICON 8
RT_DIALOG 7
RT_MENU 5
RT_ACCELERATOR 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
TATAR DEFAULT 31
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileVersionNumber
0.210.97.34

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
200704

EntryPoint
0x270c6

OriginalFileName
Vibrator.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2012

FileVersion
37, 24, 174, 69

TimeStamp
2008:08:16 09:18:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Charts

ProductVersion
12, 221, 187, 0

FileDescription
Canopener

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Fanix Software

CodeSize
159744

FileSubtype
0

ProductVersionNumber
0.124.167.207

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 46a4834e2b3f4c4db2418ab431a23ce3
SHA1 0c5c8b31bddb6b9d1e5754b115d6ea48ed629aca
SHA256 f292ae344f5392875f3016297551b905253fab604b530516e65b118292f48832
ssdeep
3072:SJvAyOc6Go6sS3SlTooptAuLXzLdXN+a7L7Kc6SiY8jlWHbS9MnXHuLPHjsbxnpz:UJyGo6sSCRoALFB7fZ695M6ARp7g4

authentihash dd15e361f0401c1a8c963502f845a16a601387992f97163020af0dcfd62bdf40
imphash d67893530873678cf3d990d14fd7f605
File size 240.0 KB ( 245760 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2016-03-22 10:34:25 UTC ( 2 years, 3 months ago )
Last submission 2016-12-17 00:19:20 UTC ( 1 year, 7 months ago )
File names exe_1.home.php.exe
scan_file
46a4834e2b3f4c4db2418ab431a23ce3.jpg
cdsadd.exe
hpe.jpg_
home.php.exe_
hpe_jpg
home.php
connect.act-sat-bootcamp.exe
vibrador.exe
hpe.jpg
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Runtime DLLs
UDP communications