× کوکی ها غیر فعال هستند! لطفا برای کارکرد صحیح کوکی ها را فعال کنید
SHA256: 968034bd6e215b075b321b82a6df8e01406f5dd4ed32055a8869f5854974f4df
نام فایل: keen2go-installer.exe
نرخ کشف: 5 / 53
تاریخ تحلیل: 2016-07-29 19:53:13 UTC ( 2 سال، 9 ماه قبل ) آخرین نمایش
آنتی ویروس نتایج بروزرسانی
AegisLab Suspicious.Cloud.Gen!c 20160729
Baidu Win32.Trojan.WisdomEyes.151026.9950.9988 20160729
McAfee-GW-Edition BehavesLike.Win32.Dropper.dh 20160729
Symantec Heur.AdvML.B 20160729
Zillya Adware.ConvertAd.Win32.19352 20160729
Ad-Aware 20160729
AhnLab-V3 20160729
Alibaba 20160729
ALYac 20160729
Antiy-AVL 20160729
Arcabit 20160729
Avast 20160729
AVG 20160729
Avira (no cloud) 20160729
AVware 20160729
BitDefender 20160729
Bkav 20160727
CAT-QuickHeal 20160729
ClamAV 20160729
CMC 20160728
Comodo 20160729
Cyren 20160729
DrWeb 20160729
Emsisoft 20160729
ESET-NOD32 20160729
F-Prot 20160729
F-Secure 20160729
Fortinet 20160729
GData 20160729
Ikarus 20160729
Jiangmin 20160729
K7AntiVirus 20160729
K7GW 20160729
Kaspersky 20160729
Kingsoft 20160729
Malwarebytes 20160729
McAfee 20160729
Microsoft 20160729
eScan 20160729
NANO-Antivirus 20160729
nProtect 20160729
Panda 20160729
Qihoo-360 20160729
Sophos AV 20160729
SUPERAntiSpyware 20160729
Tencent 20160729
TheHacker 20160729
TrendMicro 20160729
TrendMicro-HouseCall 20160729
VBA32 20160729
VIPRE 20160729
ViRobot 20160729
Zoner 20160729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT NSIS
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-08-05 00:46:33
Entry Point 0x000030E2
Number of sections 5
PE sections
Overlays
MD5 1b3a9fa8eb372ad683a563db7f8a8d56
File type data
Offset 212480
Size 90856
Entropy 7.99
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
GetTickCount
SetFileTime
GlobalUnlock
LoadLibraryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
lstrcpyA
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
GetProcAddress
SetEnvironmentVariableA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
WriteFile
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
ExitProcess
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
CharPrevA
GetMessagePos
EndPaint
ReleaseDC
EndDialog
BeginPaint
ShowWindow
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
PostQuitMessage
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
SendMessageA
DrawTextA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
EnableMenuItem
RegisterClassA
SendMessageTimeoutA
InvalidateRect
GetWindowLongA
FindWindowExA
CreateWindowExA
LoadCursorA
TrackPopupMenu
SetWindowTextA
FillRect
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EmptyClipboard
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoTaskMemFree
OleUninitialize
CoCreateInstance
OleInitialize
Number of PE resources by type
RT_ICON 9
RT_DIALOG 4
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 15
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:08:05 01:46:33+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24576

LinkerVersion
6.0

EntryPoint
0x30e2

InitializedDataSize
162816

SubsystemVersion
4.0

ImageVersion
6.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 d51b0a1f89056fa0d91821d8fe909bef
SHA1 568f933ce313f7420426fea64fb4c51f23f43536
SHA256 968034bd6e215b075b321b82a6df8e01406f5dd4ed32055a8869f5854974f4df
ssdeep
3072:L9KTgE+dQ0iM/DZXJOxXXXXXXXXXXXXXXXXXXXXXXXXXXXXXyMjrQ3nQxCs2brgA:L9KOQS4g3P3r223D0rjQGQUWt1I5A

authentihash 438b7df6df31264d5d988393262d15653047a5e9b118087d2cbca1c7f2a41a9f
imphash e160ef8e55bb9d162da4e266afd9eef3
File size 296.2 KB ( 303336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (91.9%)
Win32 Executable MS Visual C++ (generic) (3.3%)
Win64 Executable (generic) (3.0%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.4%)
Tags
nsis peexe overlay via-tor

VirusTotal metadata
First submission 2016-01-18 15:58:41 UTC ( 3 سال، 4 ماه قبل )
Last submission 2016-10-18 08:20:10 UTC ( 2 سال، 7 ماه قبل )
نام های فایل sample ._DONTEXECUTE
keen2go-installer.exe
بدون نظر. هیچ یک از اعضای انجمن ویروس توتال نظری در مورد این آیتم نداده است، بنابراین شما میتوانید اولین شخص باشید!

نظر بدهید...

?
ارسال نظر

شما هنوز وارد نشدید. تنها کاربران ثبت نام کرده می توانند نظر ارسال کنند، وارد شده و نظر بدهید.

بدون رای. هنوز شخصی برای این آیتم رای نداده است، شما اولین شخص باشید!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Runtime DLLs
UDP communications