× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0fcdcf497d07851223627436bc1ff340345ab62c3d18ad1f2839815a760bced8
File name: ea670205f96b8209b650827a0f7912d723367478
Detection ratio: 23 / 57
Analysis date: 2015-02-25 10:32:12 UTC ( 3 years, 2 months ago )
Antivirus Result Update
Ad-Aware Trojan.Agent.BHYK 20150225
AhnLab-V3 Trojan/Win32.Agent 20150225
ALYac Trojan.Agent.BHYK 20150225
AVG Inject2.BQEV 20150225
Avira (no cloud) TR/Injector.237642 20150225
BitDefender Trojan.Agent.BHYK 20150225
DrWeb Trojan.DownLoad3.35002 20150225
Emsisoft Trojan.Agent.BHYK (B) 20150225
ESET-NOD32 a variant of Win32/Injector.BVEA 20150225
F-Secure Trojan.Agent.BHYK 20150225
GData Trojan.Agent.BHYK 20150225
K7AntiVirus Trojan ( 004b6cef1 ) 20150225
K7GW Trojan ( 004b6cef1 ) 20150225
Kaspersky Trojan-Dropper.Win32.Injector.lkbs 20150225
Malwarebytes Trojan.Agent 20150225
McAfee Artemis!B22679713FA6 20150225
McAfee-GW-Edition BehavesLike.Win32.Pate.dc 20150225
eScan Trojan.Agent.BHYK 20150225
nProtect Trojan-Dropper/W32.Injector.237642 20150225
Rising PE:Malware.Obscure/Heur!1.9E03 20150224
Sophos AV Troj/Fondu-DP 20150225
TrendMicro-HouseCall TROJ_GEN.R042H09BO15 20150225
ViRobot Trojan.Win32.Agent.237642[h] 20150225
AegisLab 20150225
Yandex 20150224
Alibaba 20150225
Antiy-AVL 20150225
Avast 20150225
AVware 20150225
Baidu-International 20150225
Bkav 20150225
ByteHero 20150225
CAT-QuickHeal 20150225
ClamAV 20150225
CMC 20150223
Comodo 20150225
Cyren 20150225
F-Prot 20150225
Fortinet 20150225
Ikarus 20150225
Jiangmin 20150224
Kingsoft 20150225
Microsoft 20150225
NANO-Antivirus 20150225
Norman 20150225
Panda 20150224
Qihoo-360 20150225
SUPERAntiSpyware 20150225
Symantec 20150225
Tencent 20150225
TheHacker 20150225
TotalDefense 20150224
TrendMicro 20150225
VBA32 20150225
VIPRE 20150225
Zillya 20150224
Zoner 20150223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-02-23 16:17:59
Entry Point 0x00001FEE
Number of sections 5
PE sections
PE imports
CreateFontIndirectA
IntersectClipRect
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentVariableA
OpenProcess
CreateFileA
GetStartupInfoW
VirtualProtect
GetModuleFileNameA
GetModuleHandleW
SetEnvironmentVariableA
Ord(3820)
Ord(4609)
Ord(6113)
Ord(4621)
Ord(537)
Ord(5233)
Ord(5298)
Ord(354)
Ord(2980)
Ord(6371)
Ord(2438)
Ord(5237)
Ord(4073)
Ord(6048)
Ord(5996)
Ord(5278)
Ord(5257)
Ord(3733)
Ord(5736)
Ord(3311)
Ord(5236)
Ord(2606)
Ord(4523)
Ord(922)
Ord(5238)
Ord(5727)
Ord(4786)
Ord(3744)
Ord(6617)
Ord(3164)
Ord(4616)
Ord(3167)
Ord(6332)
Ord(2873)
Ord(3917)
Ord(4852)
Ord(1569)
Ord(4539)
Ord(6370)
Ord(554)
Ord(815)
Ord(4525)
Ord(3257)
Ord(5208)
Ord(641)
Ord(3345)
Ord(4583)
Ord(3449)
Ord(2388)
Ord(5277)
Ord(5256)
Ord(2354)
Ord(338)
Ord(6898)
Ord(2502)
Ord(3076)
Ord(4414)
Ord(4233)
Ord(1739)
Ord(4430)
Ord(3142)
Ord(3060)
Ord(3193)
Ord(5285)
Ord(4617)
Ord(5699)
Ord(1903)
Ord(776)
Ord(1165)
Ord(2486)
Ord(617)
Ord(4451)
Ord(366)
Ord(825)
Ord(535)
Ord(4604)
Ord(5710)
Ord(693)
Ord(5276)
Ord(4146)
Ord(567)
Ord(4401)
Ord(2874)
Ord(540)
Ord(6119)
Ord(4606)
Ord(5706)
Ord(4461)
Ord(4692)
Ord(1006)
Ord(2619)
Ord(4286)
Ord(1767)
Ord(4527)
Ord(4607)
Ord(4229)
Ord(2294)
Ord(823)
Ord(4715)
Ord(2047)
Ord(775)
Ord(4537)
Ord(5186)
Ord(4954)
Ord(2504)
Ord(5006)
Ord(4219)
Ord(800)
Ord(5157)
Ord(4124)
Ord(1254)
Ord(858)
Ord(6051)
Ord(5261)
Ord(3074)
Ord(4334)
Ord(2613)
Ord(3592)
Ord(5673)
Ord(4459)
Ord(3309)
Ord(4381)
Ord(2109)
Ord(2387)
Ord(2977)
Ord(2116)
Ord(4418)
Ord(1718)
Ord(2641)
Ord(1834)
Ord(3053)
Ord(796)
Ord(4957)
Ord(674)
Ord(2382)
Ord(4831)
Ord(5070)
Ord(538)
Ord(4255)
Ord(2618)
Ord(1089)
Ord(2527)
Ord(5573)
Ord(6076)
Ord(2715)
Ord(1779)
Ord(2482)
Ord(6117)
Ord(5704)
Ord(4426)
Ord(4269)
Ord(4992)
Ord(5297)
Ord(4608)
Ord(4883)
Ord(3398)
Ord(4480)
Ord(520)
Ord(4817)
Ord(3743)
Ord(986)
Ord(2377)
Ord(4893)
Ord(3825)
Ord(4419)
Ord(4074)
Ord(1904)
Ord(2640)
Ord(6318)
Ord(503)
Ord(3490)
Ord(4421)
Ord(3365)
Ord(807)
Ord(4520)
Ord(3254)
Ord(2506)
Ord(4947)
Ord(3341)
Ord(4237)
Ord(5654)
Ord(5468)
Ord(2574)
Ord(5273)
Ord(2971)
Ord(2601)
Ord(2534)
Ord(1817)
Ord(4347)
Ord(5248)
Ord(1658)
Ord(324)
Ord(4341)
Ord(2391)
Ord(5296)
Ord(6050)
Ord(504)
Ord(1768)
Ord(4704)
Ord(3793)
Ord(5097)
Ord(3826)
Ord(5193)
Ord(4847)
Ord(4298)
Ord(1720)
Ord(4075)
Ord(4396)
Ord(5679)
Ord(652)
Ord(5004)
Ord(5094)
Ord(4420)
Ord(1986)
Ord(2756)
Ord(1131)
Ord(3635)
Ord(2546)
Ord(4435)
Ord(5303)
Ord(4518)
Ord(6171)
Ord(2717)
Ord(861)
Ord(3993)
Ord(2359)
Ord(561)
Ord(3054)
Ord(975)
Ord(6372)
Ord(3131)
Ord(4154)
Ord(4158)
Ord(5059)
Ord(924)
Ord(6211)
Ord(4072)
Ord(4103)
Ord(529)
Ord(4370)
Ord(2083)
Ord(296)
Ord(5649)
Ord(5239)
Ord(1766)
Ord(5286)
Ord(4690)
Ord(860)
_except_handler3
?terminate@@YAXXZ
__CxxFrameHandler
__p__fmode
_exit
__p__commode
__setusermatherr
__dllonexit
_onexit
__wgetmainargs
wcscmp
exit
_XcptFilter
clock
_initterm
_controlfp
_wcmdln
_adjust_fdiv
__set_app_type
GetModuleFileNameExW
EnableWindow
RegisterClassA
RegisterClipboardFormatW
SendMessageW
UpdateWindow
Number of PE resources by type
RT_STRING 15
RT_DIALOG 3
RT_ICON 3
Struct(241) 1
GIF 1
RT_MENU 1
RT_ACCELERATOR 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE SIMPLIFIED 22
NEUTRAL 5
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2015:02:23 17:17:59+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
16384

LinkerVersion
7.0

EntryPoint
0x1fee

InitializedDataSize
217088

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
144

File identification
MD5 b22679713fa650a847f43c14bbead48e
SHA1 cb6104b5b1f23b7825cb7f74be3a2190e684b9a9
SHA256 0fcdcf497d07851223627436bc1ff340345ab62c3d18ad1f2839815a760bced8
ssdeep
6144:k49cD4tGpPKhwY4KLfmmMSQktjyf1QW9Sw9pmu8:sTSwKLfmfMm379sv

authentihash 337fec068a058d2c63ddb94787cf1ed4bb3696290dc2b1ef8b4666e12ae5bda7
imphash 1d91192bd9ba7570d5b8317452d01b79
File size 232.1 KB ( 237642 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2015-02-25 10:32:12 UTC ( 3 years, 2 months ago )
Last submission 2015-02-25 10:32:12 UTC ( 3 years, 2 months ago )
File names ea670205f96b8209b650827a0f7912d723367478
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.