× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: af0e9f8464e7319807891ee888fc54b97325490ab3689b8c191811a36d400ace
Имя файла: ControlPanel #mit36rus
Показатель выявления: 1 / 68
Дата анализа: 2017-11-30 04:13:43 UTC (1 неделя, 4 дней назад)
Антивирус Результат Дата обновления
Cylance Unsafe 20171130
Ad-Aware 20171130
AegisLab 20171130
AhnLab-V3 20171129
Alibaba 20171130
ALYac 20171129
Antiy-AVL 20171130
Arcabit 20171130
Avast 20171130
Avast-Mobile 20171129
AVG 20171130
Avira (no cloud) 20171129
AVware 20171130
Baidu 20171129
BitDefender 20171130
Bkav 20171129
CAT-QuickHeal 20171129
ClamAV 20171130
CMC 20171126
Comodo 20171130
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cyren 20171130
DrWeb 20171130
eGambit 20171130
Emsisoft 20171130
Endgame 20171024
ESET-NOD32 20171130
F-Prot 20171130
F-Secure 20171130
Fortinet 20171130
GData 20171130
Ikarus 20171129
Sophos ML 20170914
Jiangmin 20171130
K7AntiVirus 20171129
K7GW 20171130
Kaspersky 20171129
Kingsoft 20171130
Malwarebytes 20171130
MAX 20171130
McAfee 20171130
McAfee-GW-Edition 20171129
Microsoft 20171130
eScan 20171130
NANO-Antivirus 20171130
nProtect 20171130
Palo Alto Networks (Known Signatures) 20171130
Panda 20171129
Qihoo-360 20171130
Rising 20171130
SentinelOne (Static ML) 20171113
Sophos AV 20171129
SUPERAntiSpyware 20171130
Symantec 20171130
Symantec Mobile Insight 20171129
Tencent 20171130
TheHacker 20171126
TotalDefense 20171129
TrendMicro 20171130
TrendMicro-HouseCall 20171130
Trustlook 20171130
VBA32 20171129
VIPRE 20171130
ViRobot 20171130
Webroot 20171130
WhiteArmor 20171104
Yandex 20171120
Zillya 20171129
ZoneAlarm by Check Point 20171130
Zoner 20171130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
mit36rus@gmail.com

Product ControlPanel #mit36rus
Original name ControlPanel #mit36rus
Internal name ControlPanel #mit36rus
File version 1.8.0.6
Description ControlPanel #mit36rus
Comments ControlPanel #mit36rus
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Entry Point 0x00002B90
Number of sections 7
PE sections
PE imports
ImageList_GetImageCount
ImageList_BeginDrag
ImageList_Destroy
_TrackMouseEvent
ImageList_AddMasked
ImageList_DragLeave
ImageList_DragShowNolock
ImageList_Replace
ImageList_SetImageCount
ImageList_Remove
InitCommonControls
ImageList_DrawIndirect
ImageList_DragMove
ImageList_Create
ImageList_DrawEx
ImageList_EndDrag
ImageList_Copy
ImageList_DragEnter
ImageList_Add
GetCharABCWidthsW
SetMapMode
GetWindowOrgEx
GetTextMetricsA
GetCharABCWidthsA
CombineRgn
GetROP2
GetViewportOrgEx
GetObjectType
GetTextExtentPointA
SetPixel
IntersectClipRect
CreateEllipticRgn
EqualRgn
CreateDIBitmap
GetDIBits
ExtCreateRegion
SetTextAlign
GetDCOrgEx
StretchBlt
Pie
SetWindowExtEx
Arc
SetViewportExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
TextOutW
CreateFontIndirectW
OffsetRgn
CreateFontIndirectA
LPtoDP
GetBitmapBits
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
RectInRegion
PtInRegion
GetRegionData
BitBlt
EnumFontFamiliesA
GetDeviceCaps
FillRgn
CreateBrushIndirect
SelectPalette
ExtSelectClipRgn
SetROP2
GetTextColor
DeleteObject
CreatePenIndirect
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetObjectA
PaintRgn
LineTo
DeleteDC
GetMapMode
GetObjectW
RealizePalette
CreatePatternBrush
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
ExtTextOutA
SelectClipRgn
RoundRect
GetTextAlign
SetWindowOrgEx
GetClipRgn
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
MaskBlt
GetRandomRgn
RestoreDC
GetPixel
GetTextExtentExPointW
CreateDIBSection
SetTextColor
ExtFloodFill
GetCurrentObject
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
SetStretchBltMode
PolyBezier
Chord
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
Ellipse
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
GetConsoleOutputCP
WaitForSingleObject
GetFileAttributesW
GetExitCodeProcess
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
FindResourceExA
WideCharToMultiByte
WriteFile
EnumResourceLanguagesA
ResumeThread
SetEvent
LocalFree
FormatMessageW
GetThreadPriority
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
SetLastError
PeekNamedPipe
SuspendThread
GetModuleFileNameW
TryEnterCriticalSection
HeapAlloc
GetModuleFileNameA
EnumCalendarInfoA
SetThreadPriority
GetUserDefaultLCID
MultiByteToWideChar
GetLocalTime
SetFilePointer
CreateThread
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ExitThread
SetCurrentDirectoryW
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
HeapFree
EnterCriticalSection
TerminateThread
LoadLibraryW
FreeLibrary
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
GlobalSize
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryA
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CompareStringW
GlobalReAlloc
FindNextFileW
EnumResourceNamesA
CompareStringA
FindFirstFileW
GlobalLock
CreateFileW
CreateEventA
TlsSetValue
ExitProcess
LeaveCriticalSection
GetLastError
GlobalDeleteAtom
GetSystemInfo
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
GetCommandLineA
EnumResourceTypesA
GetModuleHandleA
ReadFile
CloseHandle
GetACP
FreeResource
VirtualFree
Sleep
FindResourceA
GetOEMCP
ResetEvent
OleUninitialize
OleInitialize
VariantCopy
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayUnaccessData
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
SafeArrayRedim
SysFreeString
SafeArrayPutElement
VariantInit
VariantChangeTypeEx
DragAcceptFiles
DragQueryFileW
DragFinish
ShellExecuteA
DragQueryFileA
RedrawWindow
GetForegroundWindow
SetWindowRgn
CharLowerBuffA
EnableScrollBar
DestroyMenu
PostQuitMessage
DrawStateW
LoadBitmapA
SetWindowPos
IsWindow
EndPaint
ScrollWindowEx
CharUpperBuffA
WindowFromPoint
CharUpperBuffW
SetMenuItemInfoW
SetActiveWindow
DispatchMessageW
GetCursorPos
CharLowerBuffW
GetClassInfoA
SendMessageW
UnregisterClassA
SendMessageA
UnregisterClassW
GetClassInfoW
SetCaretPos
DrawTextW
CallNextHookEx
IsClipboardFormatAvailable
DestroyCaret
GetActiveWindow
GetWindowTextW
EnumClipboardFormats
LoadImageA
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetMenuItemCount
InvalidateRgn
CopyImage
DestroyWindow
DrawEdge
GetParent
UpdateWindow
SetPropA
ShowScrollBar
CreateCaret
ShowWindow
SetClassLongA
GetPropA
GetClipboardFormatNameA
PeekMessageW
InsertMenuItemW
SetWindowPlacement
ShowWindowAsync
MapWindowPoints
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
RegisterClassW
GetIconInfo
SetParent
SetClipboardData
FlashWindowEx
GetSystemMetrics
IsZoomed
GetWindowPlacement
WindowFromDC
DrawMenuBar
IsIconic
RegisterClassA
TrackPopupMenuEx
GetWindowLongA
EnumPropsA
CreateWindowExA
ShowOwnedPopups
FillRect
EnumThreadWindows
DeferWindowPos
CreateWindowExW
GetWindowLongW
GetUpdateRect
GetMenuItemInfoW
SetFocus
PostMessageA
BeginPaint
OffsetRect
DefWindowProcW
KillTimer
DefWindowProcA
DrawFocusRect
GetClipboardData
CharLowerA
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
SetWindowLongA
RemovePropA
CreatePopupMenu
ShowCaret
ChildWindowFromPointEx
GetSubMenu
GetLastActivePopup
SetWindowTextW
SetTimer
BringWindowToTop
ClientToScreen
LoadCursorA
LoadIconA
CountClipboardFormats
GetMenuItemInfoA
GetDesktopWindow
GetSystemMenu
GetDC
SetForegroundWindow
OpenClipboard
EmptyClipboard
ReleaseDC
IntersectRect
GetScrollInfo
HideCaret
CreateIconIndirect
GetCapture
ScreenToClient
MessageBeep
GetCaretPos
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
GetMenu
DestroyIcon
DrawFrameControl
SetMenu
RegisterClipboardFormatA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
SetSysColors
GetDoubleClickTime
EnableMenuItem
GetTopWindow
IsWindowVisible
CharToOemA
SetCursorPos
GetDCEx
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClientRect
CallWindowProcA
IsMenu
GetFocus
CreateMenu
EnableWindow
CloseClipboard
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Number of PE resources by type
RT_RCDATA 22
RT_GROUP_CURSOR 12
RT_CURSOR 12
RT_DIALOG 1
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 51
PE resources
ExifTool file metadata
LegalTrademarks
mit36rus@gmail.com

SubsystemVersion
4.0

Comments
ControlPanel #mit36rus

LinkerVersion
3.11

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.8.0.6

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ControlPanel #mit36rus

CharacterSet
Windows, Latin1

InitializedDataSize
108708

EntryPoint
0x2b90

OriginalFileName
ControlPanel #mit36rus

MIMEType
application/octet-stream

LegalCopyright
mit36rus@gmail.com

FileVersion
1.8.0.6

TimeStamp
0000:00:00 00:00:00

FileType
Win32 EXE

PEType
PE32

InternalName
ControlPanel #mit36rus

ProductVersion
V3

UninitializedDataSize
25124

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
mitsoft.ru

CodeSize
1384800

ProductName
ControlPanel #mit36rus

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 6ad45d1ff7c5751850a584f5e4a331ce
SHA1 863190ab4edf189d69dae99d1f6e3252e25b6fc5
SHA256 af0e9f8464e7319807891ee888fc54b97325490ab3689b8c191811a36d400ace
ssdeep
49152:d4B6iF+8YeIMZ8Ae71YNMjdLHmJTi+uIV5q9+/:d4B6d+SljdLIBuI3B

authentihash 0d5bd5e003357e24e4b4c616d0d7be2ee069c205847f7d967d888a811309915f
imphash 6d644be4f58c98d8aaf5aecc1cae0b1c
Размер файла 2.0 MБ ( 2141696 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2017-11-06 05:23:47 UTC (1 месяц назад)
Last submission 2017-11-06 05:23:47 UTC (1 месяц назад)
Имена файлов PoloniexV3.exe
ControlPanel #mit36rus
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Runtime DLLs
UDP communications