× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: d85ab10a582dca013e69658c13e7d00913f596ade8225ad20abd3bca9a4913fe
Имя файла: btc_ASP.exe
Показатель выявления: 0 / 47
Дата анализа: 2014-06-07 19:46:50 UTC (4 лет, 2 месяцев назад) Показать последний анализ
Антивирус Результат Дата обновления
Ad-Aware 20140607
AegisLab 20140607
Yandex 20140607
AhnLab-V3 20140607
AntiVir 20140607
Antiy-AVL 20140607
Avast 20140607
AVG 20140607
Baidu-International 20140607
BitDefender 20140607
Bkav 20140606
ByteHero 20140607
CAT-QuickHeal 20140607
ClamAV 20140607
CMC 20140607
Commtouch 20140607
Comodo 20140607
DrWeb 20140607
Emsisoft 20140607
ESET-NOD32 20140607
F-Prot 20140607
F-Secure 20140607
Fortinet 20140607
GData 20140607
Ikarus 20140607
K7AntiVirus 20140606
K7GW 20140606
Kaspersky 20140607
Kingsoft 20140607
Malwarebytes 20140607
McAfee 20140607
McAfee-GW-Edition 20140607
Microsoft 20140607
eScan 20140607
NANO-Antivirus 20140607
Norman 20140607
nProtect 20140605
Panda 20140607
Qihoo-360 20140607
Rising 20140607
Sophos AV 20140607
SUPERAntiSpyware 20140607
Symantec 20140607
Tencent 20140607
TheHacker 20140606
VBA32 20140607
ViRobot 20140607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD ASPack v2.12
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0003A001
Number of sections 10
PE sections
PE imports
RegSetValueExA
RegQueryValueExA
InitCommonControls
ChooseFontA
StretchDIBits
GetProcAddress
GetModuleHandleA
LoadLibraryA
VariantCopyInd
Shell_NotifyIconA
GetKeyboardType
wvsprintfA
InternetSetOptionA
timeKillEvent
sndPlaySoundA
Number of PE resources by type
RT_ICON 2
RT_STRING 2
RT_RCDATA 2
Struct(100) 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 5
RUSSIAN 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
119296

LinkerVersion
2.25

FileAccessDate
2014:07:05 20:53:45+01:00

EntryPoint
0x3a001

InitializedDataSize
91648

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
1.0

FileCreateDate
2014:07:05 20:53:45+01:00

UninitializedDataSize
0

File identification
MD5 dd1cdf9409466a3dd953c5f7d66e18ec
SHA1 c6cb3bdb37bd55dd0ae9d471c980c0c019e86c4a
SHA256 d85ab10a582dca013e69658c13e7d00913f596ade8225ad20abd3bca9a4913fe
ssdeep
3072:Z5IVsZhkAaisHLZnw2m3bUyQG0J+d3d9gwXV9NT0QeZ:/zhkDwDb0GLJD9QZ

imphash 06dc7c9cc5ff6804f3faea2ca64d4ab0
Размер файла 112.0 KБ ( 114688 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID ASPack compressed Win32 Executable (generic) (92.6%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Generic Win/DOS Executable (1.3%)
DOS Executable Generic (1.3%)
Tags
peexe aspack

VirusTotal metadata
First submission 2014-06-07 19:46:50 UTC (4 лет, 2 месяцев назад)
Last submission 2014-06-08 14:07:27 UTC (4 лет, 2 месяцев назад)
Имена файлов btc_ASP.exe
btcemon.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections