× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dd8d6aaa43f007c8be8b90af3469eedeeba95ff5a6b8814314a366a46758816b
File name: abBFVhWja0oWMt.exe
Detection ratio: 4 / 54
Analysis date: 2016-08-03 10:30:08 UTC ( 1 year, 4 months ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.151026.9950.9999 20160803
Bkav HW32.Packed.4203 20160802
McAfee-GW-Edition BehavesLike.Win32.Fujacks.cc 20160803
Qihoo-360 QVM19.1.Malware.Gen 20160803
Ad-Aware 20160803
AegisLab 20160803
AhnLab-V3 20160802
Alibaba 20160803
ALYac 20160803
Antiy-AVL 20160803
Arcabit 20160803
Avast 20160803
AVG 20160803
Avira (no cloud) 20160803
AVware 20160803
BitDefender 20160803
CAT-QuickHeal 20160803
ClamAV 20160803
CMC 20160803
Comodo 20160803
Cyren 20160803
DrWeb 20160803
Emsisoft 20160803
ESET-NOD32 20160803
F-Prot 20160803
F-Secure 20160803
Fortinet 20160803
GData 20160803
Ikarus 20160803
Jiangmin 20160803
K7AntiVirus 20160803
K7GW 20160803
Kaspersky 20160803
Kingsoft 20160803
Malwarebytes 20160803
McAfee 20160803
Microsoft 20160803
eScan 20160803
NANO-Antivirus 20160803
nProtect 20160803
Panda 20160802
Sophos AV 20160803
SUPERAntiSpyware 20160803
Symantec 20160803
Tencent 20160803
TheHacker 20160803
TrendMicro 20160803
TrendMicro-HouseCall 20160803
VBA32 20160802
VIPRE 20160803
ViRobot 20160803
Yandex 20160802
Zillya 20160802
Zoner 20160803
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2013

Product ClocX Application
Internal name ElocC.exe
File version 2.7.9.9
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-08-03 06:28:03
Entry Point 0x00007548
Number of sections 8
PE sections
PE imports
RegCreateKeyExW
CryptDestroyKey
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
RegCreateKeyW
CryptVerifySignatureW
LookupPrivilegeValueW
RegEnumKeyW
RegRestoreKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
OpenProcessToken
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueW
CryptReleaseContext
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
GetUserNameA
CryptDestroyHash
CryptAcquireContextW
CryptGetUserKey
RegDeleteValueW
RegSetValueExW
GetSaveFileNameW
GetFileTitleW
CommDlgExtendedError
ImmReleaseContext
ImmGetContext
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
EnumUILanguagesW
GetFileAttributesW
DuplicateHandle
GetLocalTime
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
GetLogicalDrives
GetFileInformationByHandle
GetLocaleInfoW
SetStdHandle
GetFileTime
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
FormatMessageW
GetExitCodeProcess
CreateEventW
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
LocalLock
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
LoadLibraryA
SetProcessWorkingSetSize
EnumResourceLanguagesW
SetThreadPriority
WritePrivateProfileSectionW
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
MoveFileW
SetFileAttributesW
GlobalAddAtomW
CreateThread
DeleteCriticalSection
GetExitCodeThread
CreateSemaphoreW
ConvertDefaultLocale
CreateMutexW
MulDiv
GetDateFormatA
ExitThread
SetUnhandledExceptionFilter
WriteConsoleA
SetCurrentDirectoryW
GlobalAlloc
CopyFileW
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
AddAtomA
HeapFree
EnterCriticalSection
SetHandleCount
GetLastError
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
lstrcmpiW
RtlUnwind
GlobalFindAtomW
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
OpenProcess
GetModuleHandleW
GetDateFormatW
GetStartupInfoW
GetCPInfo
DeleteFileW
GlobalLock
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
CompareStringW
GetFileSizeEx
GlobalReAlloc
RemoveDirectoryW
FreeEnvironmentStringsW
lstrcmpA
FindNextFileW
CreateDirectoryW
CompareStringA
GetComputerNameA
FindFirstFileW
lstrcmpW
GetProcAddress
SetEvent
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LocalUnlock
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
VirtualFree
CancelWaitableTimer
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
WritePrivateProfileStringW
ExpandEnvironmentStringsW
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetVersion
FreeResource
GetFileAttributesExW
SizeofResource
HeapCreate
FindResourceW
VirtualQuery
CreateProcessW
Sleep
VirtualAlloc
GetTimeFormatA
LoadRegTypeLib
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
UnRegisterTypeLib
SystemTimeToVariantTime
RegisterTypeLib
SysStringLen
VarUI4FromStr
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetVartype
VariantTimeToSystemTime
LoadTypeLib
SysFreeString
SafeArrayCopy
VariantInit
SafeArrayGetElement
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
DragQueryFileW
SHQueryRecycleBinW
SHEmptyRecycleBinW
SHCreateDirectoryExW
DragFinish
SHGetFolderLocation
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
ExtractIconExW
SHGetDesktopFolder
Shell_NotifyIconW
SHGetMalloc
CommandLineToArgvW
SHBrowseForFolderW
PathFindFileNameW
SHCopyKeyW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathMakeSystemFolderW
PathUnmakeSystemFolderW
MapWindowPoints
GetMessagePos
RedrawWindow
UnregisterHotKey
SetMenuItemBitmaps
LoadBitmapW
SetRectEmpty
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
IsWindow
GrayStringW
EndPaint
WindowFromPoint
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
DispatchMessageW
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
UnregisterClassA
SendMessageA
UnregisterClassW
GetClientRect
SetCaretPos
AllowSetForegroundWindow
DrawTextW
PostThreadMessageW
GetNextDlgTabItem
InSendMessage
CallNextHookEx
GetActiveWindow
RegisterHotKey
OpenClipboard
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetTopWindow
GetMenuItemID
PtInRect
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
CreateCaret
MapVirtualKeyExW
GetMessageW
ShowWindow
GetCaretPos
DrawFrameControl
SetPropW
ValidateRect
PeekMessageW
SetWindowsHookExW
EnableWindow
CharUpperW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
SetClipboardData
GetIconInfo
MsgWaitForMultipleObjects
SetParent
RegisterClassW
CharLowerA
GetWindowPlacement
LoadStringW
SetWindowLongW
IsIconic
TrackPopupMenuEx
GetSubMenu
SetTimer
IsDialogMessageW
FillRect
CopyRect
DeferWindowPos
GetDialogBaseUnits
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetMenuStringW
DragDetect
SetFocus
VkKeyScanExW
GetMonitorInfoW
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
KillTimer
TrackMouseEvent
GetComboBoxInfo
CharPrevW
RegisterWindowMessageW
GetClipboardData
GetParent
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
DrawTextExW
RemovePropW
SendDlgItemMessageW
PostMessageW
MonitorFromRect
EndDialog
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ClientToScreen
GetAsyncKeyState
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
CheckDlgButton
GetMenuState
ShowOwnedPopups
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetDC
InsertMenuW
SetForegroundWindow
GetMenuItemInfoW
EmptyClipboard
GetCaretBlinkTime
CreateDialogIndirectParamW
IntersectRect
SetLayeredWindowAttributes
GetScrollInfo
GetKeyboardLayout
FindWindowW
GetCapture
ScreenToClient
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
EnumDisplayMonitors
IsWindowVisible
WinHelpW
GetDesktopWindow
UnpackDDElParam
SystemParametersInfoW
FrameRect
SetRect
DeleteMenu
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
DestroyWindow
ModifyMenuW
IsRectEmpty
GetFocus
InsertMenuItemW
CloseClipboard
SetCursor
SetMenu
TranslateAcceleratorW
InternetTimeFromSystemTimeW
HttpQueryInfoW
InternetOpenW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetTimeToSystemTimeW
InternetGetConnectedState
InternetGetLastResponseInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
GdipDrawImageRectRect
GdipGetFontStyle
GdipDrawRectangleI
GdipCreateLineBrushFromRectWithAngleI
GdipSaveGraphics
GdipGetGenericFontFamilySansSerif
GdipTranslateMatrix
GdipSetPenBrushFill
GdipCreateBitmapFromScan0
GdipGetImageVerticalResolution
GdipDisposeImage
GdipImageSelectActiveFrame
GdipGetFamilyName
GdipGetFontSize
GdipGetCompositingMode
GdipGetTextRenderingHint
GdipGetCellAscent
GdipGetClipBounds
GdipSetStringFormatAlign
GdipImageGetFrameCount
GdipGetImageWidth
GdipDrawImageI
GdipStringFormatGetGenericTypographic
GdipCreateFont
GdipCloneBrush
GdipCloneStringFormat
GdipSetClipRect
GdipFree
GdipGetImageRawFormat
GdipGetImageHeight
GdipDeleteStringFormat
GdipTranslateWorldTransform
GdipSetPenDashStyle
GdipSetTextRenderingHint
GdipCreateBitmapFromHICON
GdipGetImageHorizontalResolution
GdipSetImageAttributesColorMatrix
GdipSaveImageToFile
GdipMeasureString
GdipTransformMatrixPoints
GdipBitmapSetResolution
GdiplusStartup
GdipDrawImageRectRectI
GdipGetFamily
GdipFillPath
GdipCreateBitmapFromStream
GdipGetImageThumbnail
GdipGetImageEncoders
GdipFillRectangleI
GdipDisposeImageAttributes
GdipSetCompositingMode
GdipClosePathFigure
GdipCreateMatrix
GdipDrawLine
GdipRotateMatrix
GdipGetImageGraphicsContext
GdipRestoreGraphics
GdipGetImageEncodersSize
GdipBitmapLockBits
GdipClonePen
GdipGetCellDescent
GdipStringFormatGetGenericDefault
GdipDrawPath
GdipDeleteFontFamily
GdipCloneFontFamily
GdipCreatePath
GdipBitmapUnlockBits
GdipFillRectangle
GdipDeleteFont
GdipSetPixelOffsetMode
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipDrawLineI
GdipBitmapGetPixel
GdipCreateFontFamilyFromName
GdipSetStringFormatFlags
GdipDeleteBrush
GdipRotateWorldTransform
GdipInvertMatrix
GdipAddPathArcI
GdipSetMatrixElements
GdipSetClipRectI
GdipGetStringFormatFlags
GdipGetClipBoundsI
GdipGetImagePixelFormat
GdipCreateSolidFill
GdipSetSmoothingMode
GdipSetStringFormatTrimming
GdipGetEmHeight
GdipGetDC
GdipDeleteMatrix
GdipGetLineSpacing
GdipDeleteGraphics
GdipTransformPath
GdipCreateImageAttributes
GdipCreateFromHDC
GdipCreatePen1
GdipDrawRectangle
GdipAlloc
GdipDeletePath
GdipDeletePen
GdipSetInterpolationMode
GdipDrawString
GdipCloneImage
GdipReleaseDC
_except_handler3
_CIsin
free
exit
calloc
_wtoi
__set_app_type
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromProgID
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
CoLockObjectExternal
CoUninitialize
OleSetContainedObject
RegisterDragDrop
CoCreateInstance
CoTaskMemRealloc
RevokeDragDrop
CoRegisterClassObject
CoCreateInstanceEx
CoCreateGuid
CLSIDFromString
CoTaskMemFree
StringFromGUID2
OleInitialize
SnmpUtilOidCpy
SnmpUtilOidNCmp
SnmpUtilVarBindFree
CreateURLMonikerEx
Number of PE resources by type
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 1
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.7.9.9

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
41984

EntryPoint
0x7548

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.7.9.9

TimeStamp
2016:08:03 07:28:03+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ElocC.exe

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

LegalCopyright
Copyright (C) 2013

MachineType
Intel 386 or later, and compatibles

CodeSize
105472

ProductName
ClocX Application

ProductVersionNumber
2.7.9.9

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 6c6b00a876211d41c2362b96968cee63
SHA1 23357717ac0b9dfd1db35a2f0d807d4084061b48
SHA256 dd8d6aaa43f007c8be8b90af3469eedeeba95ff5a6b8814314a366a46758816b
ssdeep
3072:GA+b8NQwbG6qU4de/u1ky8Ss+jfDYkcTGhxDcoATQcvvfQB7mc4/vdl:GHzGDeL8kgGhxSeB0

authentihash 34d82090901e82103a96e32e9fd1ccd7548a932c0cc4d8e56e380237403ed0b4
imphash e925a94fc4f4b6cad9e451bc513d313d
File size 141.0 KB ( 144384 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2016-08-03 10:30:08 UTC ( 1 year, 4 months ago )
Last submission 2016-09-25 18:43:04 UTC ( 1 year, 2 months ago )
File names hWja0oWMt.exe
ElocC.exe
abBFVhWja0oWMt.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs
UDP communications