أخلاق الطبيب في الإسلام للسيد عادل العلوي.exe

This is a setup program which is used to install the application. The file has been seen being downloaded from dc366.4shared.com.
MD5:
88965c35e46fbbe4d6c9baf7769bf466

SHA-1:
f5a03e9d0f8bb9717dab7cc44f58ae59aae4c4f6

SHA-256:
7a8f78a9d31940637b3e9a26660b909d0a66be266f2d3086e30a332ad494ebef

Scanner detections:
7 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
12/25/2024 5:46:58 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Trojan/Win32.Downloader
2014.03.10

Bkav FE
W32.Clodb6a.Trojan
1.3.0.4959

McAfee
Artemis!88965C35E46F
5600.6926

Rising Antivirus
PE:Trojan.Win32.Small.bmd!1075089010
23.00.65.141202

Sophos
Mal/Generic-S
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Downloader
10198

ViRobot
Trojan.Win32.Downloader.242688.D
2011.4.7.4223

File size:
365.9 KB (374,701 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\????? ?????? ?? ??????? ????? ???? ??????.exe

File PE Metadata
Compilation timestamp:
6/19/1992 10:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
6144:BHKuYWO5gX1MNMp1QLNG/a3k5Bxd9pW04A/wOx+X/87IYm3Dp5PJjRtwjHPXzC8D:Bg5+1Ms1Cki3+vpjl8XmO3D/Rsv2O48

Entry address:
0xA1470

Entry point:
60, BE, 00, 80, 46, 00, 8D, BE, 00, 90, F9, FF, C7, 87, 10, 27, 08, 00, 5F, 26, B6, 2F, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 19, 8B, 1E, 83, EE, FC, 11, DB, 72, 10, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 78, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07...
 
[+]

Entropy:
7.9424

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
232 KB (237,568 bytes)

The file أخلاق الطبيب في الإسلام للسيد عادل العلوي.exe has been seen being distributed by the following URL.