× Çerezler devre dışı bırakılmış! Bu sitenin düzgün bir şekilde çalışabilmesi için çerezlerin açık olması gerekir.
SHA256: d2a1c71371ce6e12c5cbb29c77ef982508e40f1135b7f318a569b277dc4083c8
Dosya adı: xk.exe
Tespit edilme orani 0 / 56
Analiz tarihi: 2015-08-10 18:50:59 UTC ( 1 yıl, 7 ay önce)
Antivirus Sonuç Güncelle
Ad-Aware 20150810
AegisLab 20150810
Yandex 20150810
AhnLab-V3 20150810
Alibaba 20150803
ALYac 20150810
Antiy-AVL 20150810
Arcabit 20150810
Avast 20150810
AVG 20150810
Avira (no cloud) 20150810
AVware 20150810
Baidu-International 20150810
BitDefender 20150810
Bkav 20150810
ByteHero 20150810
CAT-QuickHeal 20150810
ClamAV 20150810
CMC 20150710
Comodo 20150810
Cyren 20150810
DrWeb 20150810
Emsisoft 20150810
ESET-NOD32 20150810
F-Prot 20150810
F-Secure 20150810
Fortinet 20150810
GData 20150810
Ikarus 20150810
Jiangmin 20150807
K7AntiVirus 20150810
K7GW 20150810
Kaspersky 20150810
Kingsoft 20150810
Malwarebytes 20150810
McAfee 20150810
McAfee-GW-Edition 20150809
Microsoft 20150810
eScan 20150810
NANO-Antivirus 20150810
nProtect 20150810
Panda 20150810
Qihoo-360 20150810
Rising 20150810
Sophos 20150810
SUPERAntiSpyware 20150810
Symantec 20150810
Tencent 20150810
TheHacker 20150810
TrendMicro 20150810
TrendMicro-HouseCall 20150810
VBA32 20150809
VIPRE 20150810
ViRobot 20150810
Zillya 20150810
Zoner 20150810
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
File version 1.1.13.01
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-10-19 00:01:02
Entry Point 0x0008DBE3
Number of sections 4
PE sections
PE imports
RegCreateKeyExW
CloseServiceHandle
RegEnumValueW
RegConnectRegistryW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegDeleteValueW
RegQueryInfoKeyW
GetUserNameW
OpenSCManagerW
RegEnumKeyExW
LockServiceDatabase
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
UnlockServiceDatabase
RegQueryValueExW
ImageList_Destroy
CreateStatusWindowW
ImageList_AddMasked
ImageList_GetIconSize
ImageList_Create
Ord(17)
ImageList_ReplaceIcon
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
CreatePolygonRgn
GetTextMetricsW
GetSystemPaletteEntries
GetClipBox
GetPixel
GetDeviceCaps
ExcludeClipRect
DeleteDC
SetBkMode
GetObjectW
BitBlt
CreateDIBSection
SetTextColor
FillRgn
CreateEllipticRgn
GetTextFaceW
CreateDCW
EnumFontFamiliesExW
GetStockObject
GetDIBits
GdiFlush
CreateRoundRectRgn
CreateCompatibleDC
CreateFontW
CreateRectRgn
SelectObject
CreateSolidBrush
GetClipRgn
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
GetPrivateProfileSectionNamesW
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetDiskFreeSpaceW
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
FormatMessageW
InitializeCriticalSection
OutputDebugStringW
FindClose
InterlockedDecrement
QueryDosDeviceW
MoveFileW
GetFullPathNameW
GetEnvironmentVariableW
SetLastError
GetSystemTime
DeviceIoControl
TlsGetValue
CopyFileW
WriteProcessMemory
LoadResource
RemoveDirectoryW
Beep
IsDebuggerPresent
HeapAlloc
HeapSetInformation
SetThreadPriority
WritePrivateProfileSectionW
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
SetFileAttributesW
CreateThread
SetEnvironmentVariableW
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
SetPriorityClass
TerminateProcess
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
GlobalSize
GetWindowsDirectoryW
GetFileSize
OpenProcess
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GlobalLock
GetProcessHeap
GetComputerNameW
EnumResourceNamesW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
FindFirstFileW
GetProcAddress
SetVolumeLabelW
GetPrivateProfileSectionW
CreateFileW
GetFileType
TlsSetValue
ExitProcess
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
VirtualAllocEx
GlobalFree
GetConsoleCP
FindResourceW
GetTimeFormatW
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
VirtualFreeEx
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
GetCPInfo
HeapSize
WritePrivateProfileStringW
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
GetTempPathW
CreateProcessW
Sleep
SafeArrayDestroy
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
VariantClear
SysAllocString
GetActiveObject
SafeArrayUnlock
VariantCopy
SysFreeString
SafeArrayLock
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCopy
OleLoadPicture
SysStringLen
GetModuleFileNameExW
GetModuleBaseNameW
SHGetFolderPathW
SHBrowseForFolderW
DragQueryFileW
SHFileOperationW
ExtractIconW
SHGetPathFromIDListW
DragQueryPoint
ShellExecuteExW
SHGetDesktopFolder
Shell_NotifyIconW
SHGetMalloc
DragFinish
RedrawWindow
GetMessagePos
SetWindowRgn
RegisterWindowMessageW
UnregisterHotKey
DrawTextW
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
IsWindow
ScreenToClient
WindowFromPoint
SetMenuItemInfoW
SetActiveWindow
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
mouse_event
GetClientRect
SetMenuDefaultItem
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
CountClipboardFormats
GetTopWindow
RegisterHotKey
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetKeyState
DestroyWindow
GetClassInfoExW
UpdateWindow
EnumWindows
CheckRadioButton
GetMessageW
ShowWindow
SetMenuInfo
GetDesktopWindow
IsCharAlphaW
PeekMessageW
EnableWindow
CharUpperW
GetClipboardFormatNameW
SetClipboardViewer
TranslateMessage
IsWindowEnabled
GetWindow
GetIconInfo
SetParent
SetClipboardData
IsZoomed
IsCharLowerW
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
CreateMenu
GetKeyboardLayout
FlashWindow
CreateAcceleratorTableW
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetMenuStringW
MapWindowPoints
VkKeyScanExW
IsIconic
EmptyClipboard
SystemParametersInfoW
DefWindowProcW
keybd_event
KillTimer
MapVirtualKeyW
GetClipboardData
GetParent
ToUnicodeEx
GetSystemMetrics
SetWindowLongW
GetWindowRect
IsDialogMessageW
EnumChildWindows
IsMenu
CharLowerW
SendDlgItemMessageW
SetKeyboardState
GetCursor
CreatePopupMenu
CheckMenuItem
GetClassLongW
PtInRect
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
BringWindowToTop
SendInput
ClientToScreen
PostMessageW
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
AttachThreadInput
DestroyAcceleratorTable
CreateIconFromResourceEx
SetWindowsHookExW
LoadCursorW
FindWindowW
GetMenuItemID
FillRect
SetForegroundWindow
ExitWindowsEx
SetFocus
OpenClipboard
GetAsyncKeyState
IntersectRect
EndDialog
CreateIconIndirect
MessageBeep
GetCaretPos
RemoveMenu
GetWindowThreadProcessId
GetQueueStatus
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
DialogBoxParamW
AppendMenuW
ChangeClipboardChain
AdjustWindowRectEx
LookupIconIdFromDirectoryEx
GetFocus
GetSysColor
SetDlgItemTextW
CopyImage
DestroyIcon
IsWindowVisible
IsCharAlphaNumericW
DispatchMessageW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
IsCharUpperW
SendMessageTimeoutW
CloseClipboard
DefDlgProcW
SetMenu
TranslateAcceleratorW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
mixerGetLineControlsW
mixerGetControlDetailsW
mixerOpen
waveOutSetVolume
mixerSetControlDetails
mciSendStringW
mixerClose
mixerGetDevCapsW
waveOutGetVolume
mixerGetLineInfoW
joyGetPosEx
joyGetDevCapsW
WSAStartup
gethostbyname
gethostname
inet_addr
WSACleanup
CreateStreamOnHGlobal
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CoGetObject
CLSIDFromString
StringFromGUID2
Number of PE resources by type
RT_ICON 8
RT_GROUP_ICON 8
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_RCDATA 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 22
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
1.1.13.1

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
177152

EntryPoint
0x8dbe3

MIMEType
application/octet-stream

FileVersion
1.1.13.01

TimeStamp
2013:10:19 01:01:02+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.1.13.01

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
632832

FileSubtype
0

ProductVersionNumber
1.1.13.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2b50efede031c2b3d00563e3c30d4532
SHA1 d75ef9714909a670d54f1b48c3f7789954f5360f
SHA256 d2a1c71371ce6e12c5cbb29c77ef982508e40f1135b7f318a569b277dc4083c8
ssdeep
12288:29bLglSSigTPIifgpSSfvbUL2LtpRXNeZYbixBNc2n1C:29bLqrTgiopS2+2JpRXKYbipc2n1C

authentihash 0e04219e61c48a33b1c90f8b774a85a86f8ee2c56aa12d45ec935d28843e71f0
imphash cd72e942ac03b9c7c92f6aa6500828d2
Dosya boyutu 792.0 KB ( 811008 bytes )
Dosya türü Win32 EXE
Magic lafzı
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (52.5%)
Windows screen saver (22.0%)
Win32 Dynamic Link Library (generic) (11.0%)
Win32 Executable (generic) (7.5%)
Generic Win/DOS Executable (3.3%)
Tags
peexe

VirusTotal metadata
First submission 2015-03-27 14:05:48 UTC ( 1 yıl, 12 ay önce)
Last submission 2015-08-10 18:50:59 UTC ( 1 yıl, 7 ay önce)
Dosya isimleri xk.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Yorum yok.. Henüz hiçbir VirusTotal Topluluğu üyesi bu öğeye yorum yapmadı.Bunu yapan ilk sen ol!

Yorum ekleyin...

?
Yorumu gönder.

Üye girişi yapmadınız..Sadece kayıtlı kullanıcılar yorum yapabilir.Sesinizi duyurmak için giriş yapın.

Oy yok.. Bu öğeyi daha önce hiç kimse oylamadı.Bunu yapan ilk sen ol!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications