× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f427599678b7217483f15e1a1549d321833489256732d417761aece13c6a3cc8
File name: CHEXXiNC Payment Advise_ID00589884.scr
Detection ratio: 8 / 55
Analysis date: 2016-02-19 16:26:53 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
AegisLab Luhe.Fiha.Gen!c 20160219
AVG Luhe.Fiha.A 20160219
AVware Trojan.Win32.Generic.pak!cobra 20160219
McAfee-GW-Edition BehavesLike.Win32.Virut.dm 20160219
Qihoo-360 QVM20.1.Malware.Gen 20160219
Rising PE:Malware.Generic(Thunder)!1.A1C4 [F] 20160219
SUPERAntiSpyware Trojan.Agent/Gen-Multi 20160219
VIPRE Trojan.Win32.Generic.pak!cobra 20160219
Ad-Aware 20160219
Yandex 20160217
AhnLab-V3 20160219
Alibaba 20160219
ALYac 20160219
Antiy-AVL 20160219
Arcabit 20160219
Avast 20160219
Avira (no cloud) 20160219
Baidu-International 20160219
BitDefender 20160219
Bkav 20160219
ByteHero 20160219
CAT-QuickHeal 20160219
ClamAV 20160219
CMC 20160219
Comodo 20160219
Cyren 20160219
DrWeb 20160219
Emsisoft 20160219
ESET-NOD32 20160219
F-Prot 20160219
F-Secure 20160219
Fortinet 20160218
GData 20160219
Ikarus 20160219
Jiangmin 20160219
K7AntiVirus 20160219
K7GW 20160219
Kaspersky 20160219
Malwarebytes 20160219
McAfee 20160219
Microsoft 20160219
eScan 20160219
NANO-Antivirus 20160219
nProtect 20160219
Panda 20160219
Sophos AV 20160219
Symantec 20160219
Tencent 20160219
TheHacker 20160217
TrendMicro 20160219
TrendMicro-HouseCall 20160219
VBA32 20160219
ViRobot 20160219
Zillya 20160218
Zoner 20160219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name RunLegacyCPLElevated.EXE
Internal name RunLegacyCPLElevated
File version 6.3.7683.16385 (win7_rtm.090713-1255)
Description Run a legacy CPL elevated
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-02-19 11:00:33
Entry Point 0x0000105A
Number of sections 8
PE sections
PE imports
ClusterRegCloseKey
SetEnhMetaFileBits
CreateWaitableTimerA
HeapFree
FindNextVolumeA
WriteConsoleInputA
GetModuleFileNameW
CreateMailslotW
SetFileApisToANSI
GlobalUnlock
FlushFileBuffers
FoldStringA
GetStartupInfoA
GetVolumeInformationA
HeapSize
VirtualLock
SetVolumeMountPointW
GetCompressedFileSizeA
WriteProfileStringW
WritePrivateProfileStringW
GetProfileStringW
LockFileEx
GetFileAttributesA
FindNextFileW
lstrcpynA
FreeConsole
QueryInformationJobObject
AddAtomW
FindActCtxSectionStringW
ResumeThread
CreateNamedPipeW
SetFileApisToOEM
EnumSystemGeoID
VarR8FromBool
Shell_NotifyIconW
Ord(179)
SendMessageW
wcsftime
abort
isdigit
_chkstk
sin
memcmp
Number of PE resources by type
RT_ICON 5
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.7683.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
198144

EntryPoint
0x105a

OriginalFileName
RunLegacyCPLElevated.EXE

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.3.7683.16385 (win7_rtm.090713-1255)

TimeStamp
2016:02:19 12:00:33+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RunLegacyCPLElevated

ProductVersion
6.3.7563.16385

FileDescription
Run a legacy CPL elevated

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
52224

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.3.7683.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 1934a6640841bc2b41bc59ba03699b17
SHA1 0d664c93725f6d1312b91d0b1f3f09e4e703078c
SHA256 f427599678b7217483f15e1a1549d321833489256732d417761aece13c6a3cc8
ssdeep
3072:kCwbpcJW5I9p3HJrFBMpHoiMO8hMrnHVly7IOAXEoGl1M+lmsolAIrRuw+mqv9jC:KRw3Hm3dWW1w7IOAl3+lDAA

authentihash eca70d3d633180179aa96e65e66c18ae80cd0a85c0d8b122db0ad21315aa1135
imphash 3a42a154104b3d707cd2d36e6e7b9e1f
File size 240.0 KB ( 245760 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-19 15:32:26 UTC ( 2 years, 10 months ago )
Last submission 2016-02-22 15:50:33 UTC ( 2 years, 10 months ago )
File names 1934a6640841bc2b41bc59ba03699b17
RunLegacyCPLElevated.EXE
RunLegacyCPLElevated
CHEXXiNC%20Payment%20Advise_ID00589884.scr
CHEXXiNC Payment Advise_ID00589884.scr
a.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications