× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f3e2afcbc91780a02bc584ff7cbc7816a7e1913c91be103d4028f8ae798891c8
File name: 5eba25d75358d5c307b5bb8d13b07209
Detection ratio: 51 / 54
Analysis date: 2016-07-06 19:11:54 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Worm.Generic.371623 20160706
AegisLab W32.W.Ngrbot.kpb!c 20160706
AhnLab-V3 Worm/Win32.Ngrbot.N531679829 20160706
ALYac Backdoor.Poebot.BT 20160706
Antiy-AVL Worm/Win32.Ngrbot 20160706
Arcabit Worm.Generic.D5ABA7 20160706
Avast Win32:Crypt-LUS [Trj] 20160706
AVG Generic27.AOKZ 20160706
Avira (no cloud) TR/Crypt.XPACK.Gen 20160706
AVware Trojan.Win32.Autorun.as (v) 20160706
Baidu Win32.Trojan.WisdomEyes.151026.9950.9985 20160706
BitDefender Worm.Generic.371623 20160706
Bkav W32.VadesionF.Trojan 20160706
CAT-QuickHeal Trojan.Lethic.B 20160705
ClamAV Win.Worm.371623-2 20160706
CMC Trojan.Win32.Jorik.Lethic!O 20160704
Comodo Worm.Win32.Agent.NFR 20160705
Cyren W32/AutoRun.AJ.gen!Eldorado 20160706
DrWeb Win32.HLLW.Autoruner.37980 20160706
Emsisoft Worm.Generic.371623 (B) 20160706
ESET-NOD32 Win32/Lethic.AA 20160706
F-Prot W32/AutoRun.AJ.gen!Eldorado 20160706
F-Secure Worm.Generic.371623 20160706
Fortinet W32/Zbot.CGZF!tr 20160706
GData Worm.Generic.371623 20160706
Ikarus Worm.Win32.Ngrbot 20160706
Jiangmin Trojan/Jorik.awmk 20160706
K7AntiVirus EmailWorm ( 00373b9c1 ) 20160706
K7GW EmailWorm ( 00373b9c1 ) 20160706
Kaspersky Worm.Win32.Ngrbot.kpb 20160706
Malwarebytes Trojan.Agent 20160706
McAfee Bot-FAU!5EBA25D75358 20160706
McAfee-GW-Edition BehavesLike.Win32.Downloader.nh 20160706
Microsoft Trojan:Win32/Lethic.F 20160706
eScan Worm.Generic.371623 20160706
NANO-Antivirus Trojan.Win32.Ngrbot.bdlgys 20160706
nProtect Worm/W32.Ngrbot.40448.D 20160706
Panda Trj/Pacrypt.F 20160706
Qihoo-360 QVM20.1.Malware.Gen 20160706
Sophos AV W32/Ngrbot-F 20160706
SUPERAntiSpyware Trojan.Agent/Gen-FraudPE 20160706
Symantec Trojan.Gen 20160706
Tencent Win32.Trojan.Inject.Auto 20160706
TheHacker Trojan/Jorik.Lethic.vb 20160705
TotalDefense Win32/Dorkbot.K!generic 20160706
TrendMicro WORM_NGRBOT.TU 20160706
TrendMicro-HouseCall WORM_NGRBOT.TU 20160706
VBA32 Trojan.LE.01164 20160706
VIPRE Trojan.Win32.Autorun.as (v) 20160706
ViRobot Backdoor.Win32.A.Inject.20440.A[h] 20160706
Zillya Worm.Ngrbot.Win32.2306 20160706
Alibaba 20160706
Kingsoft 20160706
Zoner 20160706
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product hitachi
Original name DIALER.EXE
Internal name DIALER.EXE
Description hitachi Phone Dialer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-03-05 21:55:00
Entry Point 0x00001046
Number of sections 5
PE sections
PE imports
FreeADsMem
DllGetClassObject
RegCreateKeyExW
RegDeleteValueW
GetFileSecurityW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegEnumKeyW
RegCreateKeyW
RegOpenKeyW
RegDeleteKeyW
RegSetValueW
SetFileSecurityW
RegQueryValueExW
RegQueryValueW
AutoDialFunc
CmCustomHangUp
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetNearestColor
GetPaletteEntries
CombineRgn
PlayMetaFile
GetROP2
GetViewportOrgEx
GetObjectType
CreateMetaFileW
SetColorAdjustment
EndDoc
IntersectClipRect
OffsetWindowOrgEx
GetTextFaceW
CreatePalette
GetPolyFillMode
SetTextAlign
StretchDIBits
ScaleViewportExtEx
ArcTo
AbortDoc
CloseMetaFile
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
TextOutW
CreateFontIndirectW
OffsetRgn
GetCurrentPositionEx
CreateRectRgnIndirect
LPtoDP
GetPixel
PolyDraw
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
OffsetClipRgn
BitBlt
GetClipRgn
SetAbortProc
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
EndPage
GetTextColor
Escape
SetWindowExtEx
DeleteObject
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
GetCharWidthW
SetStretchBltMode
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
EnumMetaFile
StartPage
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SelectClipPath
RectVisible
GetStockObject
UnrealizeObject
SelectClipRgn
GetTextAlign
GetTextExtentPoint32A
SetWindowOrgEx
SelectObject
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
PolylineTo
GetBkMode
SaveDC
RestoreDC
SetMapperFlags
CreateSolidBrush
CreateBitmap
SetTextColor
GetClipBox
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetBrushOrgEx
CreateRectRgn
SetViewportExtEx
SetPolyFillMode
CopyMetaFileW
SetTextJustification
GetStretchBltMode
DPtoLP
StartDocW
CreateCompatibleBitmap
DeleteMetaFile
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetFileAttributesW
lstrcmpW
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
UnhandledExceptionFilter
SetErrorMode
lstrcatW
GetFileTime
WideCharToMultiByte
LoadLibraryW
GetDiskFreeSpaceW
WriteFile
GetProfileIntW
GetSystemTimeAsFileTime
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
MoveFileW
GetFullPathNameW
GetCurrentThread
SetLastError
LocalLock
lstrcpynW
OutputDebugStringW
GetModuleFileNameW
GetVersionExA
GetStringTypeExW
GlobalFindAtomW
LoadLibraryA
LoadLibraryExA
SetThreadPriority
DelayLoadFailureHook
GetVolumeInformationW
TlsGetValue
MultiByteToWideChar
GetPrivateProfileStringW
GetModuleHandleA
SetFileAttributesW
GlobalAddAtomW
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
GetSystemDirectoryA
TerminateProcess
CreateSemaphoreW
GetVersion
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
lstrcmpiA
GetLastError
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
CopyFileW
GlobalSize
UnlockFile
GetFileSize
DeleteFileW
GetProcAddress
GetPrivateProfileIntW
GetTempFileNameW
lstrcpyW
GlobalReAlloc
lstrcmpA
FindNextFileW
lstrcpyA
FreeConsole
FindFirstFileW
DuplicateHandle
WaitForMultipleObjects
GetUserDefaultLCID
CreateEventW
SearchPathW
CreateFileW
TlsSetValue
LocalUnlock
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
GlobalDeleteAtom
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
GetThreadLocale
GlobalUnlock
IsDBCSLeadByte
GlobalAlloc
lstrlenW
LockFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
InterlockedCompareExchange
WritePrivateProfileStringW
SuspendThread
ReleaseSemaphore
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GlobalLock
GetModuleHandleW
FreeResource
FindResourceExW
FindResourceW
Sleep
GetProcessVersion
VirtualAlloc
RedrawWindow
GetMessagePos
SetMenuItemBitmaps
DrawTextW
MoveWindow
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
ScrollWindowEx
WindowFromPoint
GetMessageTime
SetActiveWindow
DispatchMessageW
GetCursorPos
MapDialogRect
GetDlgCtrlID
SendMessageW
UnregisterClassW
GetClassInfoW
SetWindowContextHelpId
DefMDIChildProcW
GetWindow
SetScrollPos
InSendMessage
CallNextHookEx
IsClipboardFormatAvailable
GetClientRect
CountClipboardFormats
ClientToScreen
GetTopWindow
GetWindowTextW
RegisterClipboardFormatW
CopyAcceleratorTableW
GetWindowTextLengthW
LoadAcceleratorsW
GetActiveWindow
InvalidateRgn
GetMenuItemID
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
EqualRect
CheckRadioButton
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
SetDlgItemInt
PeekMessageW
TranslateMDISysAccel
GetTabbedTextExtentA
EnableWindow
SetWindowPlacement
CharUpperW
RemovePropW
LoadIconW
TranslateMessage
IsWindowEnabled
GetDlgItemTextW
GetDlgItemInt
GetTabbedTextExtentW
MsgWaitForMultipleObjects
SetParent
RegisterClassW
ScrollWindow
IsZoomed
GetWindowPlacement
LoadStringW
SetWindowLongW
DrawMenuBar
IsIconic
InvertRect
DrawFocusRect
GetDCEx
IsDialogMessageW
FillRect
CopyRect
DeferWindowPos
GetDialogBaseUnits
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetMenuStringW
IsChild
MapWindowPoints
RegisterWindowMessageW
LockWindowUpdate
GetWindowThreadProcessId
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
ClipCursor
LoadBitmapW
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
IntersectRect
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
CheckDlgButton
WaitMessage
CheckMenuItem
GetSubMenu
GetLastActivePopup
SetWindowTextW
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ScreenToClient
GetScrollInfo
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
IsDlgButtonChecked
BeginDeferWindowPos
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetDC
InsertMenuW
SetForegroundWindow
SetFocus
WindowFromDC
GetAsyncKeyState
CreateDialogIndirectParamW
ReleaseDC
GetScrollRange
EndDialog
FindWindowW
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
wvsprintfW
GetSysColorBrush
ShowScrollBar
MessageBoxW
DefFrameProcW
SetMenu
SetRectEmpty
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
SetDlgItemTextW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
IsWindowVisible
WinHelpW
GetDesktopWindow
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
FrameRect
SetRect
DeleteMenu
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
DestroyWindow
ModifyMenuW
ValidateRect
IsRectEmpty
GetFocus
CreateMenu
wsprintfW
SetCursor
GetMenu
UnhookWindowsHookEx
TranslateAcceleratorW
InternetCanonicalizeUrlW
InternetSetStatusCallbackW
FtpRemoveDirectoryW
HttpEndRequestW
HttpSendRequestExW
InternetSetCookieW
FtpFindFirstFileW
InternetErrorDlg
InternetOpenUrlW
HttpOpenRequestW
InternetSetOptionExW
InternetGetCookieW
InternetQueryOptionW
InternetConnectW
GopherFindFirstFileW
InternetCloseHandle
FtpDeleteFileW
GopherOpenFileW
InternetGetLastResponseInfoW
FtpRenameFileW
HttpQueryInfoW
GopherCreateLocatorW
InternetFindNextFileW
InternetQueryDataAvailable
InternetWriteFile
FtpGetFileW
InternetReadFile
InternetSetFilePointer
HttpAddRequestHeadersW
FtpSetCurrentDirectoryW
InternetOpenW
InternetCrackUrlW
GopherGetAttributeW
FtpPutFileW
FtpGetCurrentDirectoryW
HttpSendRequestW
FtpCreateDirectoryW
FtpOpenFileW
_purecall
malloc
_wcsupr
realloc
wcstoul
fread
fclose
_msize
__dllonexit
_open_osfhandle
_snwprintf
abort
wcstol
_expand
fflush
wcstod
_endthreadex
wcslen
_except_handler3
_get_osfhandle
_ultow
clearerr
wcscmp
floor
fwrite
fseek
_onexit
_wcsdup
mktime
ftell
__argc
_itow
wcschr
_wfullpath
wcsrchr
localtime
_adjust_fdiv
__CxxFrameHandler
wcsftime
_CxxThrowException
wcspbrk
_fdopen
_wcsnicmp
wcsncpy
time
_wcsrev
gmtime
free
swprintf
wcscspn
wcsncmp
__doserrno
__wargv
calloc
ceil
_wtol
vswprintf
_wcslwr
fputws
memmove
wcsspn
wcscpy
iswdigit
_beginthreadex
modf
iswspace
wcsstr
_wsplitpath
_initterm
_ltow
fgetws
_wtoi
OleLockRunning
CLSIDFromProgID
OleCreateFromData
StgCreateDocfileOnILockBytes
OleTranslateAccelerator
OleRun
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
StgCreateDocfile
OleRegGetUserType
CoTaskMemAlloc
RegisterDragDrop
CoTreatAsClass
StringFromGUID2
ReadClassStg
CreateStreamOnHGlobal
CreateItemMoniker
OleFlushClipboard
ReleaseStgMedium
OleRegGetMiscStatus
SetConvertStg
OleCreateLinkFromData
GetHGlobalFromILockBytes
OleCreateFromFile
RevokeDragDrop
OleSave
CoRegisterMessageFilter
ReadFmtUserTypeStg
OleGetClipboard
OleDuplicateData
CLSIDFromString
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
CoGetClassObject
CoRegisterClassObject
CoInitialize
OleInitialize
OleLoadFromStream
CoLockObjectExternal
OleCreateStaticFromData
GetClassFile
CoCreateInstance
OleRegEnumVerbs
StgOpenStorage
CreateGenericComposite
OleGetIconOfClass
OleLoad
OleSetContainedObject
OleQueryCreateFromData
CreateDataCache
OleCreateMenuDescriptor
StgIsStorageFile
OleQueryLinkFromData
CoTaskMemFree
CreateDataAdviseHolder
CoRevokeClassObject
WriteClassStm
CoUninitialize
StringFromCLSID
OleCreateLinkToFile
OleCreate
WriteClassStg
CoFreeUnusedLibraries
GetRunningObjectTable
OleIsRunning
IsAccelerator
CoDisconnectObject
OleSetMenuDescriptor
CoGetMalloc
OleSaveToStream
OleIsCurrentClipboard
CreateFileMoniker
OleSetClipboard
ReadClassStm
WriteFmtUserTypeStg
CreateBindCtx
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL DEFAULT 2
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2009:03:05 22:55:00+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
512

LinkerVersion
7.1

Warning
Error processing PE data dictionary

FileTypeExtension
exe

InitializedDataSize
120832

SubsystemVersion
5.0

EntryPoint
0x1046

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
81920

Compressed bundles
File identification
MD5 5eba25d75358d5c307b5bb8d13b07209
SHA1 59ffb463312a8fc7e494ec63287418a229505957
SHA256 f3e2afcbc91780a02bc584ff7cbc7816a7e1913c91be103d4028f8ae798891c8
ssdeep
768:vIZyi0+JZavZ19XB/r4oDKIQ9+aUVgGpe5B2Fda4m4QZeHrLNQO1:vIQkJZUtXB/rTDVQ9FUVho5QdcZwrxQg

authentihash 256d72d230f6a5b64813f5637f3a5e589ffb1bce4f3f78e6b28e6c06d1a3605e
imphash cdd007143519287603cd327e0b6b495b
File size 39.5 KB ( 40448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Generic Win/DOS Executable (50.0%)
DOS Executable Generic (49.9%)
Tags
peexe usb-autorun

VirusTotal metadata
First submission 2012-03-10 07:21:23 UTC ( 7 years ago )
Last submission 2016-07-06 19:11:54 UTC ( 2 years, 8 months ago )
File names 1002-59ffb463312a8fc7e494ec63287418a229505957
aa
1C3FEB1A00CB42599EC70046BEB4E6005F14E638.tmp
w_WHAE2.dot
5EBA25D75358D5C307B5BB8D13B07209
XsXoImW.png
2012031
file-3779898_ex_
DIALER.EXE
mixhdg.exe
MIXHDG.EXE
mixhdg.exe
MN35w9l9y.rar
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!