Virustotal results belw, systemlook txt file to follow
Virustotal
SHA256: 96d84e0416ce5f7daefcb3b047989ef4b6551e619b651e13e9fae93085ecb191
SHA1: eeb71cf5a4fe016e6369d2c98a1c6bc9ecc2bcf1
MD5: 06c8b39afd2cf1cf6a8fc7352bec7ced
File size: 288.5 KB ( 295424 bytes )
File name: termsrv.exe
File type: Win32 DLL
Tags: pedll
Detection ratio: 0 / 46
Analysis date: 2013-05-01 17:07:01 UTC ( 1 minute ago )
0 0 More details Analysis File detail
Additional information Comments Votes Antivirus Result Update
Agnitum 20130501
AhnLab-V3 20130501
AntiVir 20130501
Antiy-AVL 20130501
Avast 20130501
AVG 20130501
BitDefender 20130501
ByteHero 20130430
CAT-QuickHeal 20130430
ClamAV 20130501
Commtouch 20130501
Comodo 20130501
DrWeb 20130501
Emsisoft 20130501
eSafe 20130501
ESET-NOD32 20130501
F-Prot 20130501
F-Secure 20130501
Fortinet 20130501
GData 20130501
Ikarus 20130501
Jiangmin 20130501
K7AntiVirus 20130430
K7GW 20130430
Kaspersky 20130501
Kingsoft 20130422
Malwarebytes 20130501
McAfee 20130501
McAfee-GW-Edition 20130501
Microsoft 20130501
MicroWorld-eScan 20130501
NANO-Antivirus 20130501
Norman 20130501
nProtect 20130501
Panda 20130501
PCTools 20130501
Sophos 20130501
SUPERAntiSpyware 20130501
Symantec 20130501
TheHacker 20130430
TotalDefense 20130501
TrendMicro 20130501
TrendMicro-HouseCall 20130501
VBA32 20130430
VIPRE 20130501
ViRobot 20130501
An error occurred
An error occurred
An error occurred ssdeep6144:6Ub4QerW7bcH7bR/FKDag7zednX8kY0cGU4yBnmeB6ULCNe:6U0Qn7bcR0GYednJUhBnRIe
TrIDWin32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (38.0%)
Generic Win/DOS Executable (11.7%)
DOS Executable Generic (11.6%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ExifToolSubsystemVersion.........: 4.0
InitializedDataSize......: 69120
ImageVersion.............: 5.1
ProductName..............: Microsoft Windows Operating System
FileVersionNumber........: 5.1.2600.2180
UninitializedDataSize....: 0
LanguageCode.............: English (U.S.)
FileFlagsMask............: 0x003f
CharacterSet.............: Unicode
LinkerVersion............: 7.1
OriginalFilename.........: termsrv.exe
MIMEType.................: application/octet-stream
Subsystem................: Windows command line
FileVersion..............: 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
TimeStamp................: 2004:08:04 08:56:45+01:00
FileType.................: Win32 DLL
PEType...................: PE32
InternalName.............: termsrv.exe
FileAccessDate...........: 2013:05:01 18:07:08+01:00
ProductVersion...........: 5.1.2600.2180
FileDescription..........: Terminal Server Service
OSVersion................: 5.1
FileCreateDate...........: 2013:05:01 18:07:08+01:00
FileOS...................: Windows NT 32-bit
LegalCopyright...........: Microsoft Corporation. All rights reserved.
MachineType..............: Intel 386 or later, and compatibles
CompanyName..............: Microsoft Corporation
CodeSize.................: 260096
FileSubtype..............: 0
ProductVersionNumber.....: 5.1.2600.2180
EntryPoint...............: 0x2192e
ObjectFileType...........: Executable application
Sigcheckpublisher................: Microsoft Corporation
product..................: Microsoft_ Windows_ Operating System
internal name............: termsrv.exe
copyright................: (c) Microsoft Corporation. All rights reserved.
original name............: termsrv.exe
file version.............: 5.1.2600.2180 (xpsp_sp2_rtm.040803-2158)
description..............: Terminal Server Service
Portable Executable structural informationCompilation timedatestamp.....: 2004-08-04 07:56:45
Target machine................: Intel 386 or later processors and compatible processors
Entry point address...........: 0x0002192E
PE Sections...................:
Name Virtual Address Virtual Size Raw Size Entropy MD5
.text 4096 259690 260096 6.61 571983960a885ab7c451cea5a252310e
.data 266240 38968 4608 5.41 b6f46a64f3515283049d0afa87288aef
.rsrc 307200 15968 16384 3.25 39d3d9c93594b5868500536d35c7df36
.reloc 323584 12992 13312 6.19 12ab2d7046bd30c66e6b657741a2dfce
PE Imports....................:
[[SHLWAPI.dll]]
PathAppendA
[[AUTHZ.dll]]
AuthzFreeResourceManager, AuthziInitializeAuditParamsWithRM, AuthzInitializeResourceManager, AuthziInitializeAuditEventType, AuthziFreeAuditParams, AuthzFreeAuditEvent, AuthziAllocateAuditParams, AuthziLogAuditEvent, AuthziFreeAuditEventType, AuthziInitializeAuditEvent
[[SETUPAPI.dll]]
SetupDiGetDeviceRegistryPropertyA, SetupDiGetClassDevsA, SetupDiEnumDeviceInfo, SetupDiDestroyDeviceInfoList
[[ICAAPI.dll]]
IcaChannelOpen, IcaStackConnectionClose, IcaClose, IcaStackTerminate, IcaChannelClose, IcaChannelIoControl, IcaStackIoControl, IcaOpen, IcaStackConnectionRequest, IcaStackUnlock, IcaStackConnectionWait, IcaStackDisconnect, _IcaStackIoControl, IcaPushConsoleStack, IcaIoControl, IcaStackClose, IcaStackOpen, IcaStackReconnect, IcaStackCallback, IcaStackConnectionAccept
[[WINTRUST.dll]]
CryptCATAdminReleaseCatalogContext, CryptCATCatalogInfoFromContext, WTHelperGetProvSignerFromChain, WinVerifyTrust, CryptCATAdminCalcHashFromFileHandle, CryptCATAdminEnumCatalogFromHash, CryptCATAdminReleaseContext, WTHelperProvDataFromStateData, CryptCATAdminAcquireContext
[[SHELL32.dll]]
SHGetFolderPathA
[[KERNEL32.dll]]
LocalSize, ReleaseMutex, FileTimeToSystemTime, WaitForSingleObject, GetDriveTypeA, DebugBreak, GetLocalTime, DeleteCriticalSection, GetCurrentProcess, OpenFileMappingW, LocalAlloc, GetVolumeInformationW, lstrcatW, WideCharToMultiByte, InterlockedExchange, WriteFile, GetProfileIntW, GetSystemTimeAsFileTime, GetDiskFreeSpaceA, FreeLibrary, LocalFree, FormatMessageW, ResumeThread, GetLogicalDriveStringsA, InitializeCriticalSection, InterlockedDecrement, QueryDosDeviceW, OutputDebugStringA, SetLastError, IsBadWritePtr, GetSystemTime, IsDebuggerPresent, HeapAlloc, lstrcmpiW, GetVolumeInformationA, LoadLibraryExA, SetThreadPriority, DelayLoadFailureHook, GetSystemDefaultLCID, MultiByteToWideChar, VerifyVersionInfoW, GetModuleHandleA, CreateThread, GetSystemDirectoryW, GetExitCodeThread, SetUnhandledExceptionFilter, CreateMutexW, ExitThread, TerminateProcess, GetVersion, SetWaitableTimer, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, HeapFree, EnterCriticalSection, LoadLibraryW, GetVersionExW, SetEvent, QueryPerformanceCounter, GetTickCount, DisableThreadLibraryCalls, GetVersionExA, LoadLibraryA, GetWindowsDirectoryW, GetFileSize, OpenProcess, GetDateFormatW, WaitForMultipleObjects, GetProcessHeap, CreateWaitableTimerW, GetProfileStringW, lstrcpyW, lstrcpyA, ResetEvent, GetComputerNameExW, GetComputerNameA, GlobalMemoryStatus, GetProcAddress, GetProcessAffinityMask, CreateEventW, CreateFileW, CreateFileA, InterlockedIncrement, GetLastError, SystemTimeToFileTime, GetComputerNameW, GetSystemInfo, lstrlenA, lstrlenW, UnregisterWait, GetCurrentProcessId, ProcessIdToSessionId, RegisterWaitForSingleObject, SetThreadAffinityMask, InterlockedCompareExchange, GetCurrentThread, lstrcpynW, UnhandledExceptionFilter, MapViewOfFile, SetFilePointer, ReadFile, PulseEvent, CloseHandle, OpenMutexW, GetACP, GetCurrentThreadId, CompareFileTime, UnmapViewOfFile, OpenEventW, CreateProcessW, Sleep, IsBadReadPtr
[[msvcrt.dll]]
strncmp, _purecall, malloc, _wcsupr, _ftol, wcschr, _stricmp, _snwprintf, swprintf, strncpy, _except_handler3, wcscmp, ??2@YAPAXI@Z, qsort, _mbslen, wcslen, mktime, wcsncat, sprintf, _snprintf, mbstowcs, wcsrchr, _adjust_fdiv, __CxxFrameHandler, _wcsicmp, _wcsnicmp, wcsncpy, ??3@YAXPAX@Z, gmtime, free, wcscat, _wtol, memmove, swscanf, wcscpy, iswdigit, wcstok, time, _initterm
[[Secur32.dll]]
GetUserNameExW
[[CRYPT32.dll]]
CertEnumCertificatesInStore, CertOpenStore, CertComparePublicKeyInfo, CryptExportPublicKeyInfo, CertFreeCertificateContext, CertGetIssuerCertificateFromStore, CertCloseStore, CertFindExtension, CertDuplicateCertificateContext, CertVerifyCertificateChainPolicy, CryptDecodeObject, CertCreateCertificateContext, CryptBinaryToStringW, CertVerifySubjectCertificateContext, CryptVerifyCertificateSignature
[[ntdll.dll]]
RtlConvertSharedToExclusive, RtlCreateSecurityDescriptor, NtRequestPort, RtlSetGroupSecurityDescriptor, NtOpenThreadToken, NtCreateEvent, RtlWriteRegistryValue, RtlInitializeCriticalSection, RtlDeleteAce, RtlAllocateAndInitializeSid, NtDelayExecution, NtOpenSymbolicLinkObject, RtlInsertElementGenericTable, RtlLengthRequiredSid, RtlCreateRegistryKey, RtlAddAccessAllowedAce, NtCreatePort, RtlAllocateHeap, RtlIntegerToUnicodeString, RtlNtStatusToDosError, NtWaitForSingleObject, RtlFreeUnicodeString, RtlAppendUnicodeToString, RtlInitializeSid, NtReplyWaitReceivePort, NtDuplicateToken, RtlLengthSecurityDescriptor, NtSetTimer, RtlpNtEnumerateSubKey, NtSetEvent, NtQueryDirectoryObject, RtlAcquireResourceExclusive, NtQueryValueKey, NtQueryVirtualMemory, VerSetConditionMask, NtCompleteConnectPort, NtResetEvent, NtDeviceIoControlFile, RtlCopySid, NtCreateDirectoryObject, RtlGetAce, NtQuerySystemInformation, RtlDeleteResource, RtlLookupElementGenericTable, NtQuerySystemTime, RtlQueryInformationAcl, NtConnectPort, RtlEnterCriticalSection, RtlDeleteCriticalSection, NtQueryMutant, DbgBreakPoint, RtlSetDaclSecurityDescriptor, RtlFreeSid, NtReleaseMutant, RtlAdjustPrivilege, NtCreateTimer, RtlCompareMemory, RtlInitUnicodeString, RtlSubAuthoritySid, RtlConvertExclusiveToShared, NtReplyPort, NtTerminateProcess, RtlAcquireResourceShared, RtlSetProcessIsCritical, NtSetSecurityObject, NtWaitForMultipleObjects, NtAllocateVirtualMemory, RtlInitializeGenericTable, RtlCreateEnvironment, RtlAnsiStringToUnicodeString, RtlGetDaclSecurityDescriptor, RtlMapGenericMask, RtlExtendedLargeIntegerDivide, NtRequestWaitReplyPort, RtlLeaveCriticalSection, RtlLengthSid, RtlEqualSid, NtCreateSection, RtlInitAnsiString, NtOpenProcessToken, RtlCreateAcl, NtDuplicateObject, NtOpenProcess, NtClose, NtQueryInformationToken, NtSetInformationThread, NtFreeVirtualMemory, DbgPrint, RtlQueryRegistryValues, RtlDeleteElementGenericTable, RtlPrefixUnicodeString, RtlGetOwnerSecurityDescriptor, NtAcceptConnectPort, RtlCreateUserSecurityObject, RtlFreeHeap, RtlGetGroupSecurityDescriptor, NtCreateMutant, NtOpenKey, RtlInitializeResource, NtQuerySecurityObject, RtlReleaseResource, RtlCopySecurityDescriptor, NtQueryInformationProcess
[[ADVAPI32.dll]]
CryptDestroyKey, RegCreateKeyExW, RegCloseKey, LookupAccountSidW, RegQueryValueExA, GetAce, SetServiceBits, CryptVerifySignatureW, LsaNtStatusToWinError, RegOpenKeyExW, RegNotifyChangeKeyValue, OpenThreadToken, CryptHashData, GetAclInformation, RegQueryValueExW, CryptImportKey, CryptCreateHash, SetSecurityDescriptorDacl, GetSidSubAuthorityCount, GetSidSubAuthority, RegisterEventSourceW, OpenProcessToken, DeregisterEventSource, MakeAbsoluteSD, SetServiceStatus, AddAccessAllowedAce, RegEnumKeyW, LsaStorePrivateData, LsaCreateSecret, LsaDelete, RegOpenKeyW, GetSidIdentifierAuthority, RegOpenKeyExA, LsaSetSecret, LsaOpenPolicy, I_ScSendTSMessage, CheckTokenMembership, GetTokenInformation, LsaFreeMemory, CryptReleaseContext, GetUserNameW, IsValidSid, AccessCheckAndAuditAlarmW, RegisterServiceCtrlHandlerW, GetSecurityDescriptorDacl, CryptGenRandom, LsaOpenSecret, CryptAcquireContextW, GetUserNameA, RegEnumKeyExW, GetLengthSid, ElfReportEventW, RegEnumKeyExA, CryptDestroyHash, ElfRegisterEventSourceW, LsaQueryInformationPolicy, SetEntriesInAclW, LogonUserW, RegSetValueExW, RegDeleteValueW, MakeSelfRelativeSD, GetCurrentHwProfileA, ReportEventW, AllocateAndInitializeSid, InitializeSecurityDescriptor, LsaClose, InitializeAcl, EqualSid, IsValidSecurityDescriptor, LsaRetrievePrivateData, LsaQuerySecret, AddAce, GetEventLogInformation
[[RPCRT4.dll]]
I_RpcBindingIsClientLocal, RpcRevertToSelf, NdrServerCall2, RpcServerRegisterIfEx, RpcServerRegisterIf, RpcStringBindingParseW, RpcSsContextLockExclusive, RpcBindingToStringBindingW, RpcImpersonateClient, RpcServerListen, I_RpcBindingInqLocalClientPID, RpcServerRegisterAuthInfoW, RpcRaiseException, RpcStringFreeW, RpcServerInqDefaultPrincNameW, RpcServerUseProtseqEpW
[[mstlsapi.dll]]
Ord(132), Ord(134), Ord(24), Ord(39), Ord(33), Ord(40), Ord(35), Ord(131), Ord(133), Ord(43), Ord(135), Ord(6), Ord(34), Ord(25), Ord(26), Ord(36), Ord(10), Ord(38), Ord(30), Ord(29), Ord(32), Ord(41)
[[WS2_32.dll]]
Ord(12), getaddrinfo, Ord(11), Ord(111), Ord(115), Ord(52)
[[USER32.dll]]
GetCursorPos, wsprintfA, GetSystemMetrics, BroadcastSystemMessageA, LoadStringW, wvsprintfA, wsprintfW, GetMessageTime, MessageBeep, ExitWindowsEx
[[OLEAUT32.dll]]
Ord(24), Ord(149), Ord(23), Ord(6), Ord(16), Ord(4), Ord(15), Ord(8), Ord(2), Ord(9)
PE Exports....................:
ServiceMain
PE Resources..................:
Resource type Number of resources
RT_STRING 5
RT_MESSAGETABLE 1
RT_VERSION 1
Resource language Number of resources
ENGLISH US 7
Symantec ReputationSuspicious.Insight
ClamAV PUA EnginePossibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .
First seen by VirusTotal2010-08-12 16:32:28 UTC ( 2 years, 8 months ago )
Last seen by VirusTotal2013-05-01 17:07:01 UTC ( 1 minute ago )
File names (max. 25)termsrv.dll 06c8b39afd2cf1cf6a8fc7352bec7ced termsrv.dll termsrv.exe 06c8b39afd2cf1cf6a8fc7352bec7ced 06C8B39AFD2CF1CF6A8FC7352BEC7CED termsrv.dll.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so! More comments Leave your comment...? Rich Text AreaToolbar Bold (Ctrl+B) Italic (Ctrl+I) Underline (Ctrl+U) Undo (Ctrl+Z) Redo (Ctrl+Y) StylesStyles ▼
Remove Formatting
Post comment You have not signed in. Only registered users can leave comments, sign in and have a voice!
Sign in Join the community
No votes. No one has voted on this item yet, be the first one to do so! More votes Blog | Twitter | contact@virustotal.com| Google groups | ToS | Privacy policy scan results as follows;