× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: 5aeb907015ebeb8e78e73938f4aa413fd813f81fe2b32bbb19bba3e14ca94571
Имя файла: btc_pec.exe
Показатель выявления: 9 / 51
Дата анализа: 2014-06-07 19:46:52 UTC (4 лет назад) Показать последний анализ
Антивирус Результат Дата обновления
Yandex Packed/PECompact 20140607
Bkav HW32.CDB.075f 20140606
F-Prot W32/D_Downloader!GSA 20140607
Malwarebytes Trojan.Dropper.PGen 20140607
Qihoo-360 Malware.QVM17.Gen 20140607
SUPERAntiSpyware Trojan.Agent/Gen-StartPage 20140607
TrendMicro PAK_Generic.001 20140607
TrendMicro-HouseCall PAK_Generic.001 20140607
VBA32 suspected of Trojan.Downloader.gen 20140607
Ad-Aware 20140607
AegisLab 20140607
AhnLab-V3 20140607
AntiVir 20140607
Antiy-AVL 20140607
Avast 20140607
AVG 20140607
Baidu-International 20140607
BitDefender 20140607
ByteHero 20140607
CAT-QuickHeal 20140607
ClamAV 20140607
CMC 20140607
Commtouch 20140607
Comodo 20140607
DrWeb 20140607
Emsisoft 20140607
ESET-NOD32 20140607
F-Secure 20140607
Fortinet 20140607
GData 20140607
Ikarus 20140607
K7AntiVirus 20140606
K7GW 20140606
Kaspersky 20140607
Kingsoft 20140607
McAfee 20140607
McAfee-GW-Edition 20140607
Microsoft 20140607
eScan 20140607
NANO-Antivirus 20140607
Norman 20140607
nProtect 20140605
Panda 20140607
Rising 20140607
Sophos AV 20140607
Symantec 20140607
Tencent 20140607
TheHacker 20140606
TotalDefense 20140607
VIPRE 20140607
ViRobot 20140607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT PECompact, PecBundle
PEiD PECompact 2.xx --> BitSum Technologies
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00001000
Number of sections 2
PE sections
PE imports
RegQueryValueExA
InitCommonControls
ChooseFontA
StretchDIBits
VirtualFree
LoadLibraryA
VirtualAlloc
GetProcAddress
VariantCopyInd
Shell_NotifyIconA
GetKeyboardType
InternetSetOptionA
timeKillEvent
Number of PE resources by type
RT_ICON 2
RT_STRING 2
RT_RCDATA 2
Struct(100) 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 5
RUSSIAN 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
119296

LinkerVersion
2.25

FileAccessDate
2015:01:15 23:35:22+01:00

EntryPoint
0x1000

InitializedDataSize
91648

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
1.0

FileCreateDate
2015:01:15 23:35:22+01:00

UninitializedDataSize
0

File identification
MD5 08bb4769470f0dd097386bb5324455ad
SHA1 a997a1043a38f5acdf89b16faa58fdf2f27014af
SHA256 5aeb907015ebeb8e78e73938f4aa413fd813f81fe2b32bbb19bba3e14ca94571
ssdeep
3072:HeWA3ce089sI0AIwqNMhbDIVVRNUKA5TQyr:HeLrR9iADGM+TNNa

authentihash a6b339a22eec77fe077bcb3d0049a4e683115f3364e36e1e8c4645a52fc252d9
imphash f894ec22b0fe9d4571428118713fada9
Размер файла 103.5 KБ ( 105984 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 EXE PECompact compressed (v2.x) (50.1%)
Win32 EXE PECompact compressed (generic) (35.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.8%)
Win16/32 Executable Delphi generic (1.7%)
Tags
pecompact peexe

VirusTotal metadata
First submission 2014-06-07 19:46:52 UTC (4 лет назад)
Last submission 2014-06-07 19:46:52 UTC (4 лет назад)
Имена файлов btc_pec.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections