× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4cce9e39c376f67c16df3bcd69efd9b7472c3b478e2e5ef347e1410f1105c38d
File name: Educatedscholar-1.0.0.exe
Detection ratio: 3 / 61
Analysis date: 2017-04-14 10:56:03 UTC ( 9 months, 1 week ago ) View latest
Antivirus Result Update
Avast Win32:Stuxnet-C [Wrm] 20170414
Kaspersky UDS:DangerousObject.Multi.Generic 20170414
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20170414
Ad-Aware 20170414
AegisLab 20170414
AhnLab-V3 20170414
Alibaba 20170414
ALYac 20170414
Antiy-AVL 20170414
Arcabit 20170414
AVG 20170414
Avira (no cloud) 20170414
AVware 20170410
Baidu 20170414
BitDefender 20170414
Bkav 20170414
CAT-QuickHeal 20170413
ClamAV 20170414
CMC 20170414
Comodo 20170414
CrowdStrike Falcon (ML) 20170130
Cyren 20170414
DrWeb 20170414
Emsisoft 20170414
Endgame 20170413
ESET-NOD32 20170414
F-Prot 20170414
F-Secure 20170414
Fortinet 20170414
GData 20170414
Ikarus 20170414
Sophos ML 20170413
Jiangmin 20170414
K7AntiVirus 20170414
K7GW 20170414
Kingsoft 20170414
Malwarebytes 20170414
McAfee 20170412
McAfee-GW-Edition 20170414
Microsoft 20170414
eScan 20170414
NANO-Antivirus 20170414
nProtect 20170414
Palo Alto Networks (Known Signatures) 20170414
Panda 20170414
Qihoo-360 20170414
Rising 20170414
SentinelOne (Static ML) 20170330
Sophos AV 20170414
SUPERAntiSpyware 20170414
Symantec 20170413
Symantec Mobile Insight 20170414
Tencent 20170414
TheHacker 20170412
TrendMicro 20170414
TrendMicro-HouseCall 20170414
Trustlook 20170414
VBA32 20170414
VIPRE 20170414
ViRobot 20170414
Webroot 20170414
WhiteArmor 20170409
Yandex 20170413
Zillya 20170414
Zoner 20170414
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-02 15:18:04
Entry Point 0x00002F7F
Number of sections 5
PE sections
PE imports
GetCurrentProcess
TerminateProcess
SetUnhandledExceptionFilter
RtlUnwind
GetCurrentProcessId
GetModuleHandleA
InterlockedExchange
QueryPerformanceCounter
UnhandledExceptionFilter
GetTickCount
GetSystemTimeAsFileTime
Sleep
GetCurrentThreadId
InterlockedCompareExchange
__WSAFDIsSet
inet_addr
ntohs
getsockname
inet_ntoa
htons
select
adfw_create
adfw_setValidate
adfw_setID
adfw_delete
adfw_setProcess
mainWrapper
_cexit
?terminate@@YAXXZ
__p__fmode
_exit
_adjust_fdiv
memset
__setusermatherr
free
_amsg_exit
exit
_XcptFilter
__getmainargs
calloc
_initterm
_controlfp
__p__commode
memcpy
__set_app_type
POSH_WriteU16ToLittle
POSH_WriteU32ToLittle
POSH_WriteU16ToBig
TbWinsockCleanup
TbWaitServerSocket
TbCleanSB
TbMalloc
TbRecv
TbWinsockStartup
TbCloseSocket
TbFreeStructBuffers
TbSetCallbackSocketData
TbSetRemoteSocketData
TbMakeSocket
TbMakeServerSocket
TbSend
TbInitStruct
Parameter_Socket_setValue
Parameter_Port_getValue
Parameter_U16_getValue
Params_getCallbackPortValues
Parameter_IPv4_getValue
Parameter_U32_getValue
Params_validateCallbackPorts
Parameter_String_setValue
Parameter_S16_getValue
Parameter_U8_setValue
Params_findParameter
Parameter_getType
TfFillRandom
TfXorw2Encoder
TfRandomByte
TfRandomAscii
TcLog
TcLogBuffer
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

TimeStamp
2009:11:02 16:18:04+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
9728

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
11264

SubsystemVersion
5.0

EntryPoint
0x2f7f

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 0bc136522423099f72dbf8f67f99e7d8
SHA1 d515bc77d5ade9da27af44bce7b31326e155e124
SHA256 4cce9e39c376f67c16df3bcd69efd9b7472c3b478e2e5ef347e1410f1105c38d
ssdeep
384:QZ9Y2CITCHCjd/H1xf+18hivyggo9jxV/hb1KY47ube8t:862CITCH4A1GggwZYYyOe8t

authentihash 5a781107ee70972b1c2ba765f0bc4afc8da6823e189125c08462e6b827efc03f
imphash b6c04ac2fb7e4cb3b48f73b1f94b39e9
File size 21.5 KB ( 22016 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe exploit cve-2009-3103

VirusTotal metadata
First submission 2017-04-14 10:56:03 UTC ( 9 months, 1 week ago )
Last submission 2017-07-07 06:35:16 UTC ( 6 months, 2 weeks ago )
File names 0bc136522423099f72dbf8f67f99e7d8
Educatedscholar-1.0.0.exe
svqAvXFD.dll
Educatedscholar-1.0.0.exe
d515bc77d5ade9da27af44bce7b31326e155e124
Educatedscholar-1.0.0.exe
educatedscholar-1.0.0.exe
Educatedscholar-1.0.0.exe
Y8DD_b7b5.lnk
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!