Analysis Date2014-06-01 03:16:05
MD5688a4b6befe62005a071a6e272a42933
SHA1d6bd164a118a99bb274e3a7f8e4e4afe147cd534

Static Details:

PEhash9b24fa43c023943fbbbab0e34a514dfdd476ba46
IMPhash
AVAlwil (avast)Crypt-QUY [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumno_virus
AVAvira (antivir)TR/Crypt.ZPACK.67935
AVCA (E-Trust Ino)Win32/Upatre.OCcFGPC
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEset (nod32)Win32/TrojanDownloader.Tiny.NKK
AVFortinetW32/Tiny.WMQ!tr
AVFrisk (f-prot)no_virus
AVF-SecureTrojan.Dropper.WMQ
AVGrisoft (avg)Downloader.Generic13.CCPR
AVIkarusTrojan-Dropper.WMQ
AVKasperskyTrojan.Win32.Yakes.emrc
AVMalwareBytesSpyware.Zbot.VXGen
AVMcafeeDownloader-FACB!01CFF2842A50
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre.Z
AVMicroWorld (escan)Trojan.Dropper.WMQ
AVNormanwinpe/Troj_Generic.UAERC
AVRisingno_virus
AVSophosno_virus
AVSymantecDownloader.Ponik
AVTrend Microno_virus
AVVirusBlokAda (vba32)Trojan.Yakes

Runtime Details:

Network Details:


Raw Pcap

Strings
CC
0
\
. 
CC
0
\
. 
CC
0CC

|$49=H)A
@.data
D$,y>I
j@j ^V
PPPPPPPP
`.rdata
^SSSSS
t$$9|$
!This program cannot be run in DOS mode.
< tK<	tG
t"SS9] u
t$<"u	3
;t$,v-
UQPXY]Y[
URPQQh
v	N+D$