× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: d90663681165b0d376563edebcddb68ef43235579316f57786a674923e83b6c8
Имя файла: btc_upx.exe
Показатель выявления: 8 / 51
Дата анализа: 2014-06-07 19:46:55 UTC (4 лет, 2 месяцев назад)
Антивирус Результат Дата обновления
F-Prot W32/D_Downloader!GSA 20140607
Ikarus Hoax.Win32.BadJoke.FakeKAV 20140607
McAfee-GW-Edition Heuristic.BehavesLike.Win32.ModifiedUPX.C 20140607
Sophos AV Mal/Agent-IE 20140607
SUPERAntiSpyware Trojan.Agent/Gen-Autorun[Swisyn] 20140607
TheHacker Posible_Worm32 20140606
TrendMicro PAK_Generic.005 20140607
TrendMicro-HouseCall PAK_Generic.005 20140607
Ad-Aware 20140607
AegisLab 20140607
Yandex 20140607
AhnLab-V3 20140607
AntiVir 20140607
Antiy-AVL 20140607
Avast 20140607
AVG 20140607
Baidu-International 20140607
BitDefender 20140607
Bkav 20140606
ByteHero 20140607
CAT-QuickHeal 20140607
ClamAV 20140607
CMC 20140607
Commtouch 20140607
Comodo 20140607
DrWeb 20140607
Emsisoft 20140607
ESET-NOD32 20140607
F-Secure 20140607
Fortinet 20140607
GData 20140607
K7AntiVirus 20140606
K7GW 20140606
Kaspersky 20140607
Kingsoft 20140607
Malwarebytes 20140607
McAfee 20140607
Microsoft 20140607
eScan 20140607
NANO-Antivirus 20140607
Norman 20140607
nProtect 20140605
Panda 20140607
Qihoo-360 20140607
Rising 20140607
Symantec 20140607
Tencent 20140607
TotalDefense 20140607
VBA32 20140607
VIPRE 20140607
ViRobot 20140607
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX_LZMA
PEiD UPX 2.93 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0003CE50
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
RegCloseKey
InitCommonControls
ChooseFontA
SaveDC
VariantClear
ShellExecuteA
InternetOpenA
PlaySoundA
Number of PE resources by type
RT_ICON 2
RT_STRING 2
RT_RCDATA 2
Struct(100) 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 5
RUSSIAN 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
98304

LinkerVersion
2.25

FileAccessDate
2014:06:07 20:47:18+01:00

EntryPoint
0x3ce50

InitializedDataSize
8192

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
1.0

FileCreateDate
2014:06:07 20:47:18+01:00

UninitializedDataSize
151552

File identification
MD5 54d443e577f5edda98f6d5c6b5c51c73
SHA1 f5503029932174843bc338fd1f4443d3268803b6
SHA256 d90663681165b0d376563edebcddb68ef43235579316f57786a674923e83b6c8
ssdeep
3072:B5pNynAOQ3+1Vmvf3Ck3QMeUqmh4Jout:B5pCAOQ36Un3/Qxmh4JoS

imphash 3c01966fce338667fc7d6a5c60c6ee9e
Размер файла 103.0 KБ ( 105472 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (41.1%)
Win32 EXE Yoda's Crypter (35.7%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Win16/32 Executable Delphi generic (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2014-06-07 19:46:55 UTC (4 лет, 2 месяцев назад)
Last submission 2014-06-07 19:46:55 UTC (4 лет, 2 месяцев назад)
Имена файлов btc_upx.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections