× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0dc62aabf9f9e9a6fc5fc6afe69eb57eb2e45a43cc22aa9264246e993dc0a883
File name: vt-upload-n1Oqk
Detection ratio: 33 / 54
Analysis date: 2014-10-19 09:20:37 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware Gen:Trojan.Zboter.3 20141019
AegisLab Troj.GameThief.W32.OnLineGames 20141019
Yandex TrojanSpy.Zbot!13V6BYtwXRY 20141018
AhnLab-V3 Spyware/Win32.Zbot 20141018
Antiy-AVL Trojan[Spy]/Win32.Zbot 20141019
Avast Win32:Zbot-SXL [Drp] 20141019
AVG PSW.Generic12.ZPR 20141019
Avira (no cloud) TR/Dropper.Gen 20141018
AVware Trojan.Win32.Generic!BT 20141019
BitDefender Gen:Trojan.Zboter.3 20141019
DrWeb Trojan.DownLoader9.22851 20141019
Emsisoft Gen:Trojan.Zboter.3 (B) 20141019
ESET-NOD32 a variant of Win32/Injector.AWUE 20141019
F-Secure Gen:Trojan.Zboter.3 20141019
Fortinet W32/Zbot.AJIF!tr 20141019
GData Gen:Trojan.Zboter.3 20141019
Ikarus Virus.Win32.CeeInject 20141019
Jiangmin TrojanSpy.Zbot.gweh 20141018
K7AntiVirus Trojan ( 0040f7961 ) 20141018
K7GW Trojan ( 0040f7961 ) 20141018
Kaspersky HEUR:Trojan.Win32.Generic 20141019
Kingsoft Win32.Troj.Generic.a.(kcloud) 20141019
Malwarebytes Trojan.Inject 20141019
McAfee PWSZbot-FMU!5D9AFF8E6E00 20141019
McAfee-GW-Edition BehavesLike.Win32.Downloader.dc 20141019
Microsoft VirTool:Win32/CeeInject.gen!KK 20141019
eScan Gen:Trojan.Zboter.3 20141019
NANO-Antivirus Trojan.Win32.Tepfer.cteelw 20141019
Norman Gamarue.BEZ 20141019
Sophos Mal/Ransom-CE 20141019
Symantec Infostealer.Napolar 20141019
VIPRE Trojan.Win32.Generic!BT 20141019
Zillya Trojan.Zbot.Win32.148267 20141018
Baidu-International 20141019
Bkav 20141017
ByteHero 20141019
CAT-QuickHeal 20141018
ClamAV 20141017
CMC 20141017
Comodo 20141019
Cyren 20141019
F-Prot 20141019
nProtect 20141019
Qihoo-360 20141019
Rising 20141018
SUPERAntiSpyware 20141018
Tencent 20141019
TheHacker 20141017
TotalDefense 20141019
TrendMicro 20141019
TrendMicro-HouseCall 20141019
VBA32 20141017
ViRobot 20141019
Zoner 20141014
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 1914

Product Aplicación K2
Original name K2.EXE
Internal name K2
File version 1, 0, 0, 1
Description Aplicación MFC K2
Packers identified
PEiD InstallShield 2000
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-01-28 19:03:19
Entry Point 0x00002210
Number of sections 5
PE sections
PE imports
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
Ord(4483)
Ord(1775)
Ord(4080)
Ord(3415)
Ord(4710)
Ord(441)
Ord(3597)
Ord(354)
Ord(2175)
Ord(2120)
Ord(3136)
Ord(4524)
Ord(554)
Ord(4037)
Ord(5012)
Ord(5237)
Ord(665)
Ord(5455)
Ord(5577)
Ord(3350)
Ord(2124)
Ord(5092)
Ord(3198)
Ord(3798)
Ord(6052)
Ord(971)
Ord(3259)
Ord(266)
Ord(4890)
Ord(1665)
Ord(2446)
Ord(5214)
Ord(5105)
Ord(5260)
Ord(5301)
Ord(2383)
Ord(4163)
Ord(1979)
Ord(4964)
Ord(5652)
Ord(5824)
Ord(6215)
Ord(2401)
Ord(4245)
Ord(5627)
Ord(738)
Ord(4545)
Ord(5128)
Ord(1876)
Ord(3869)
Ord(4529)
Ord(2652)
Ord(815)
Ord(2723)
Ord(4345)
Ord(1168)
Ord(641)
Ord(4155)
Ord(1883)
Ord(2494)
Ord(4428)
Ord(1992)
Ord(3351)
Ord(4353)
Ord(2514)
Ord(4382)
Ord(4425)
Ord(4669)
Ord(2058)
Ord(3454)
Ord(5277)
Ord(4441)
Ord(1134)
Ord(4465)
Ord(4430)
Ord(5104)
Ord(5300)
Ord(5284)
Ord(5914)
Ord(5508)
Ord(6175)
Ord(4730)
Ord(5024)
Ord(1669)
Ord(4627)
Ord(4512)
Ord(5022)
Ord(3738)
Ord(4853)
Ord(2127)
Ord(4589)
Ord(2982)
Ord(3250)
Ord(617)
Ord(3172)
Ord(4526)
Ord(3256)
Ord(4234)
Ord(5290)
Ord(825)
Ord(3081)
Ord(5199)
Ord(5307)
Ord(796)
Ord(4531)
Ord(4697)
Ord(5244)
Ord(2542)
Ord(4424)
Ord(4610)
Ord(4273)
Ord(3449)
Ord(5076)
Ord(2858)
Ord(4078)
Ord(3059)
Ord(2554)
Ord(2510)
Ord(1945)
Ord(5106)
Ord(1859)
Ord(6376)
Ord(4246)
Ord(4614)
Ord(2117)
Ord(401)
Ord(1727)
Ord(823)
Ord(4492)
Ord(5186)
Ord(4954)
Ord(813)
Ord(2725)
Ord(5956)
Ord(2548)
Ord(4998)
Ord(5981)
Ord(5472)
Ord(268)
Ord(4554)
Ord(4436)
Ord(4457)
Ord(3787)
Ord(3749)
Ord(1199)
Ord(2512)
Ord(4427)
Ord(4274)
Ord(5261)
Ord(2394)
Ord(4079)
Ord(4467)
Ord(3058)
Ord(2521)
Ord(4437)
Ord(3147)
Ord(1858)
Ord(6375)
Ord(5283)
Ord(2621)
Ord(2879)
Ord(1726)
Ord(4077)
Ord(6009)
Ord(4508)
Ord(5101)
Ord(6336)
Ord(4238)
Ord(4824)
Ord(3262)
Ord(5653)
Ord(674)
Ord(2371)
Ord(975)
Ord(1576)
Ord(6081)
Ord(6344)
Ord(2880)
Ord(2014)
Ord(1567)
Ord(3748)
Ord(5065)
Ord(4859)
Ord(4407)
Ord(2379)
Ord(1265)
Ord(6117)
Ord(3346)
Ord(4303)
Ord(4490)
Ord(2396)
Ord(2101)
Ord(4159)
Ord(3831)
Ord(5100)
Ord(6374)
Ord(5280)
Ord(986)
Ord(4612)
Ord(3825)
Ord(2976)
Ord(2535)
Ord(2955)
Ord(1089)
Ord(3514)
Ord(3298)
Ord(2985)
Ord(4421)
Ord(437)
Ord(807)
Ord(3922)
Ord(5240)
Ord(2445)
Ord(2649)
Ord(976)
Ord(6329)
Ord(4376)
Ord(6395)
Ord(2626)
Ord(1776)
Ord(402)
Ord(1781)
Ord(1729)
Ord(4647)
Ord(6000)
Ord(4623)
Ord(324)
Ord(296)
Ord(2391)
Ord(3830)
Ord(4388)
Ord(2385)
Ord(4613)
Ord(5871)
Ord(4493)
Ord(4349)
Ord(2878)
Ord(2990)
Ord(3079)
Ord(4899)
Ord(3353)
Ord(5255)
Ord(4387)
Ord(4723)
Ord(2055)
Ord(2627)
Ord(4837)
Ord(3442)
Ord(5241)
Ord(734)
Ord(4468)
Ord(420)
Ord(2648)
Ord(5741)
Ord(3065)
Ord(5714)
Ord(5289)
Ord(2793)
Ord(1205)
Ord(3403)
Ord(5003)
Ord(5127)
Ord(4615)
Ord(4622)
Ord(561)
Ord(1746)
Ord(2390)
Ord(411)
Ord(4563)
Ord(3769)
Ord(2563)
Ord(5102)
Ord(4543)
Ord(4645)
Ord(4962)
Ord(4921)
Ord(4961)
Ord(5751)
Ord(4486)
Ord(560)
Ord(4341)
Ord(529)
Ord(4698)
Ord(5254)
Ord(4338)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4152)
Ord(5122)
Ord(1003)
Ord(4153)
Ord(5019)
Ord(4432)
Ord(5302)
Ord(2382)
Ord(3268)
Ord(720)
Ord(5826)
Ord(5731)
Ord(3318)
_except_handler3
__p__fmode
malloc
__CxxFrameHandler
??1type_info@@UAE@XZ
_adjust_fdiv
__setusermatherr
__p__commode
__dllonexit
_setmbcp
_controlfp
__p__acmdln
exit
_XcptFilter
__getmainargs
_exit
fopen
_EH_prolog
_initterm
_onexit
__set_app_type
GetCursorPos
EnableWindow
SetRect
UpdateWindow
Number of PE resources by type
RT_STRING 16
RT_MENU 3
RT_ACCELERATOR 2
RT_DIALOG 1
Struct(241) 1
RM 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
SPANISH MODERN 25
NEUTRAL 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
267776

ImageVersion
0.0

ProductName
Aplicaci n K2

FileVersionNumber
1.0.0.1

UninitializedDataSize
0

LanguageCode
Spanish (Modern)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
5.0

OriginalFilename
K2.EXE

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1, 0, 0, 1

TimeStamp
2014:01:28 20:03:19+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
K2

FileAccessDate
2014:10:19 10:21:47+01:00

ProductVersion
1, 0, 0, 1

FileDescription
Aplicaci n MFC K2

OSVersion
4.0

FileCreateDate
2014:10:19 10:21:47+01:00

FileOS
Win32

LegalCopyright
Copyright (C) 1914

MachineType
Intel 386 or later, and compatibles

CodeSize
5632

FileSubtype
0

ProductVersionNumber
1.0.0.1

EntryPoint
0x2210

ObjectFileType
Executable application

File identification
MD5 5d9aff8e6e00b004424999a9944b5c1f
SHA1 d2400b9f9612cd4d33be2857ed601d119584c515
SHA256 0dc62aabf9f9e9a6fc5fc6afe69eb57eb2e45a43cc22aa9264246e993dc0a883
ssdeep
6144:Fif9pS7LfUzFsE9ahpINQvjGGTXUiPvl9BrtSxNA:/Hf0shgNQv/TEil9BBSrA

authentihash 3c46ccb174fffd893d89ef7eb10df5b1c545f25607ab5631e5c1455c25b11ff9
imphash 3e034691a36b851dea04aeaed1438d7a
File size 269.0 KB ( 275456 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.2%)
Win32 Executable (generic) (26.2%)
Win16/32 Executable Delphi generic (12.0%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe installshield

VirusTotal metadata
First submission 2014-10-19 09:20:37 UTC ( 2 years, 6 months ago )
Last submission 2014-10-19 09:20:37 UTC ( 2 years, 6 months ago )
File names K2
K2.EXE
vt-upload-n1Oqk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.