× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f79fc7a3e52f89c459e28f892aaf615b894caa1bdd24cf21e7b4cca4934c93a1
File name: aee6f32fd236fd820535c4a4aef131c0.virus
Detection ratio: 18 / 54
Analysis date: 2016-07-20 01:46:15 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.3416935 20160720
Arcabit Trojan.Generic.D342367 20160719
Avast Win32:Malware-gen 20160720
AVG Downloader.Generic14.BBPP 20160720
AVware Trojan.Win32.Generic!BT 20160720
BitDefender Trojan.GenericKD.3416935 20160720
Emsisoft Trojan.GenericKD.3416935 (B) 20160720
ESET-NOD32 Win32/TrojanDownloader.Agent.CFH 20160720
F-Secure Trojan.GenericKD.3416935 20160720
Fortinet W32/Agent.CFH!tr.dldr 20160720
GData Trojan.GenericKD.3416935 20160720
K7AntiVirus Trojan-Downloader ( 004e141d1 ) 20160719
K7GW Trojan-Downloader ( 004e141d1 ) 20160720
eScan Trojan.GenericKD.3416935 20160720
Qihoo-360 QVM09.0.Malware.Gen 20160720
Sophos AV Mal/Generic-S 20160719
Tencent Win32.Trojan-downloader.Agent.Lscc 20160720
VIPRE Trojan.Win32.Generic!BT 20160720
AegisLab 20160720
AhnLab-V3 20160719
Alibaba 20160720
ALYac 20160720
Antiy-AVL 20160719
Baidu 20160719
Bkav 20160719
CAT-QuickHeal 20160719
ClamAV 20160719
CMC 20160715
Comodo 20160720
Cyren 20160720
DrWeb 20160720
F-Prot 20160720
Ikarus 20160719
Jiangmin 20160720
Kaspersky 20160720
Kingsoft 20160720
Malwarebytes 20160719
McAfee 20160720
McAfee-GW-Edition 20160719
Microsoft 20160720
NANO-Antivirus 20160720
nProtect 20160719
Panda 20160719
SUPERAntiSpyware 20160720
Symantec 20160720
TheHacker 20160720
TotalDefense 20160720
TrendMicro 20160720
TrendMicro-HouseCall 20160720
VBA32 20160719
ViRobot 20160719
Yandex 20160717
Zillya 20160719
Zoner 20160720
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-01-22 15:25:58
Entry Point 0x0000E149
Number of sections 6
PE sections
PE imports
GetStdHandle
GetConsoleOutputCP
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
SetWaitableTimer
InitializeCriticalSection
TlsGetValue
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
SetUnhandledExceptionFilter
WaitForMultipleObjectsEx
TerminateProcess
WriteConsoleA
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetStartupInfoW
GetUserDefaultLCID
GetProcessHeap
MapUserPhysicalPagesScatter
CreateWaitableTimerA
IsValidLocale
GetProcAddress
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
WaitForSingleObjectEx
GetEnvironmentStrings
GetCurrentProcessId
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
OpenMutexW
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
VirtualFree
Sleep
OpenEventA
VirtualAlloc
ResetEvent
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
4.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2004:01:22 16:25:58+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
139264

LinkerVersion
8.0

FileTypeExtension
exe

InitializedDataSize
196608

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0xe149

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 aee6f32fd236fd820535c4a4aef131c0
SHA1 ef9aa2bd134a101e1887838facdf4afa4763c94d
SHA256 f79fc7a3e52f89c459e28f892aaf615b894caa1bdd24cf21e7b4cca4934c93a1
ssdeep
3072:QNyKfWQdpHkWQbflJgT5kxj/L/mIEqOfX1Exkmmd0Sc4Yb2M00EPA0Fz19J3K2:EFNkWQbfjgJqOPnyqRnpFv

authentihash b5506dcd8c0be9894c63b0c1534013fb6d6b52d17792eceb51bfa8fd82442da4
imphash e6f9821e753d3ac43afab833a5b53338
File size 308.0 KB ( 315392 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-07-20 01:46:15 UTC ( 2 years, 7 months ago )
Last submission 2017-01-29 11:27:08 UTC ( 2 years ago )
File names f79fc7a3e52f89c459e28f892aaf615b894caa1bdd24cf21e7b4cca4934c93a1.exe
virussign.com_aee6f32fd236fd820535c4a4aef131c0.vir
aee6f32fd236fd820535c4a4aef131c0.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications