× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fd9dd021c6ae850ab5eb9915db9aaa0a88357a92865975d546b0bd755dd79596
File name: 1283495401-dbfdemo.exe
Detection ratio: 1 / 56
Analysis date: 2015-08-17 19:05:05 UTC ( 3 years, 2 months ago )
Antivirus Result Update
Bkav HW32.Packed.311C 20150817
Ad-Aware 20150817
AegisLab 20150817
Yandex 20150817
AhnLab-V3 20150817
Alibaba 20150817
ALYac 20150817
Antiy-AVL 20150817
Arcabit 20150817
Avast 20150817
AVG 20150817
Avira (no cloud) 20150817
AVware 20150817
Baidu-International 20150817
BitDefender 20150817
ByteHero 20150817
CAT-QuickHeal 20150817
ClamAV 20150817
CMC 20150814
Comodo 20150817
Cyren 20150817
DrWeb 20150817
Emsisoft 20150817
ESET-NOD32 20150817
F-Prot 20150817
Fortinet 20150813
GData 20150817
Ikarus 20150817
Jiangmin 20150815
K7AntiVirus 20150817
K7GW 20150817
Kaspersky 20150817
Kingsoft 20150817
Malwarebytes 20150817
McAfee 20150817
McAfee-GW-Edition 20150817
Microsoft 20150817
eScan 20150817
NANO-Antivirus 20150817
nProtect 20150817
Panda 20150817
Qihoo-360 20150817
Rising 20150817
Sophos AV 20150817
SUPERAntiSpyware 20150817
Symantec 20150817
Tencent 20150817
TheHacker 20150817
TotalDefense 20150817
TrendMicro 20150817
TrendMicro-HouseCall 20150817
VBA32 20150817
VIPRE 20150817
ViRobot 20150817
Zillya 20150817
Zoner 20150817
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Publisher Recoveronix Ltd.
Signature verification Signed file, verified signature
Signing date 3:29 PM 2/15/2010
Signers
[+] Recoveronix Ltd.
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 2/12/2008
Valid to 12:59 AM 2/12/2011
Valid usage Code Signing
Algorithm SHA1
Thumbprint C8AE9E55AE65550BCB37498612ADB35D68DE6854
Serial number 4D E7 B3 D3 D0 F6 50 2A D3 7A 86 67 3F 84 2A 23
[+] USERTrust
Status Valid
Issuer None
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] Comodo Time Stamping Signer
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 5/17/2005
Valid to 12:59 AM 5/17/2010
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 95B2B8E34EB2CB768144ED07433EF0A3AFCAEEC0
Serial number 4F 63 D0 30 F8 15 A3 A5 B3 44 69 40 06 3D 16 89
[+] USERTrust
Status Valid
Issuer None
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-07-23 17:30:02
Entry Point 0x00007EB8
Number of sections 5
PE sections
Overlays
MD5 724c8be6048779bd69c0b0bede1a34dc
File type data
Offset 987136
Size 3752
Entropy 7.38
PE imports
GetDeviceCaps
CreateDCA
DeleteDC
SelectObject
GetTextExtentPoint32A
CreateFontIndirectA
ExtTextOutA
DeleteObject
SetTextAlign
SetBkColor
GetBkColor
SetTextColor
GetStdHandle
GetConsoleOutputCP
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
SetErrorMode
_llseek
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetStringTypeA
WriteFile
_lopen
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
LocalFree
GetEnvironmentVariableA
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetSystemTime
InitializeCriticalSection
IsDebuggerPresent
ExitProcess
FlushFileBuffers
RemoveDirectoryA
GetVolumeInformationA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
_lclose
SetUnhandledExceptionFilter
MoveFileExA
GlobalMemoryStatus
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GlobalLock
_lread
GetProcessHeap
_lcreat
FindFirstFileA
CreateFileMappingA
FindNextFileA
TerminateProcess
GetProcAddress
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
GetModuleFileNameA
WinExec
OpenFile
_lwrite
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
GetCPInfo
HeapSize
GetCommandLineA
MapViewOfFile
TlsFree
GetModuleHandleA
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
IsValidCodePage
UnmapViewOfFile
VirtualFree
Sleep
VirtualAlloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
ShellExecuteExA
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
SetWindowWord
GetSystemMetrics
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
PostMessageA
CharUpperBuffA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
GetSysColor
SetActiveWindow
LoadStringA
SetWindowTextA
SendDlgItemMessageA
GetLastActivePopup
SendMessageA
GetClientRect
GetDlgItem
RegisterClassA
SetRect
InvalidateRect
GetWindowLongA
SetTimer
LoadCursorA
LoadIconA
GetTopWindow
CharNextA
GetWindowWord
EnableWindow
SetForegroundWindow
SetCursor
Number of PE resources by type
RT_STRING 7
RT_ICON 3
RT_DIALOG 2
RT_MANIFEST 1
WZ_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 15
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2007:07:23 18:30:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
61440

LinkerVersion
8.0

FileTypeExtension
exe

InitializedDataSize
49152

SubsystemVersion
4.0

EntryPoint
0x7eb8

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 10393274c6bd2af484a5f22001ada9bf
SHA1 83e28f0b9eaa446410e62b173d4952b089055a59
SHA256 fd9dd021c6ae850ab5eb9915db9aaa0a88357a92865975d546b0bd755dd79596
ssdeep
24576:VG/vYxtjTRyKzclYz4OLAgxPYxWRWjCmecC1oEq:/xthfTiIq

authentihash b1dd6c1e31bd3647a714d9b1809a5f367565ff6cc8a1dc91cf54fa7bb91e66a4
imphash 854c336ac5ca4c481669547aa2d2a66f
File size 967.7 KB ( 990888 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (32.1%)
Win64 Executable (generic) (28.5%)
Winzip Win32 self-extracting archive (generic) (23.7%)
Win32 Dynamic Link Library (generic) (6.7%)
Win32 Executable (generic) (4.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2010-03-31 07:56:57 UTC ( 8 years, 6 months ago )
Last submission 2015-08-17 19:05:05 UTC ( 3 years, 2 months ago )
File names octet-stream
1283495401-dbfdemo.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs