× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 17a8c33ade61cad7f3a7657a5c6c383ab00af4aad53f61677106062b389b23a6
File name: a5e152f65eaec6a77f30900068fa294a.virus
Detection ratio: 22 / 57
Analysis date: 2016-05-24 18:42:37 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.195265 20160524
ALYac Gen:Variant.Zusy.195265 20160524
Arcabit Trojan.Zusy.D2FAC1 20160524
Avast Win32:Trojan-gen 20160524
Avira (no cloud) TR/Crypt.ZPACK.ocvs 20160524
Baidu Win32.Trojan.Kryptik.aee 20160523
BitDefender Gen:Variant.Zusy.195265 20160524
DrWeb Trojan.Siggen6.58358 20160524
Emsisoft Gen:Variant.Zusy.195265 (B) 20160524
ESET-NOD32 a variant of Win32/Kryptik.EXUW 20160524
F-Secure Gen:Variant.Zusy.195265 20160524
GData Gen:Variant.Zusy.195265 20160524
McAfee Artemis!A5E152F65EAE 20160524
McAfee-GW-Edition BehavesLike.Win32.PWSZbot.dm 20160524
Microsoft VirTool:Win32/CeeInject.GF 20160524
eScan Gen:Variant.Zusy.195265 20160524
nProtect Trojan/W32.Rootkit.221184.E 20160524
Panda Trj/GdSda.A 20160524
Qihoo-360 HEUR/QVM09.0.0000.Malware.Gen 20160524
Symantec Suspicious.Cloud.7.F 20160524
TrendMicro TROJ_GEN.R00XC0DEO16 20160524
ViRobot Trojan.Win32.Agent.221184.BL[h] 20160524
AegisLab 20160524
AhnLab-V3 20160524
Alibaba 20160524
Antiy-AVL 20160524
AVG 20160524
AVware 20160524
Baidu-International 20160524
Bkav 20160524
CAT-QuickHeal 20160524
ClamAV 20160524
CMC 20160523
Comodo 20160524
Cyren 20160524
F-Prot 20160524
Fortinet 20160524
Ikarus 20160524
Jiangmin 20160524
K7AntiVirus 20160524
K7GW 20160524
Kaspersky 20160524
Kingsoft 20160524
Malwarebytes 20160524
NANO-Antivirus 20160524
Rising 20160524
Sophos AV 20160524
SUPERAntiSpyware 20160524
Tencent 20160524
TheHacker 20160523
TotalDefense 20160524
TrendMicro-HouseCall 20160524
VBA32 20160524
VIPRE 20160524
Yandex 20160524
Zillya 20160524
Zoner 20160524
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2009. AnVir Software

Product AnVir Task Manager
Internal name usbhdd.exe
File version 6, 2, 0, 0
Description Usb HDD temperature monitoring
Comments Usb HDD temperature monitoring
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-05-19 10:04:36
Entry Point 0x00005EF1
Number of sections 4
PE sections
PE imports
RegEnumKeyW
GetSaveFileNameA
CreateICA
Escape
SetViewportExtEx
SetTextColor
CreateFontIndirectW
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetOEMCP
QueryPerformanceCounter
HeapDestroy
HeapAlloc
FreeEnvironmentStringsA
TlsAlloc
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
GetProcessIoCounters
GetEnvironmentStrings
GetFileType
GetLocaleInfoA
GetCurrentProcessId
OpenProcess
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
TlsFree
GetProcessHeap
ReleaseSemaphore
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
lstrcmpA
SetDllDirectoryA
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
GetSystemTimeAsFileTime
CreateFileMappingA
GetACP
HeapReAlloc
GetStringTypeW
SetPriorityClass
IsDebuggerPresent
TerminateProcess
LCMapStringA
InitializeCriticalSection
HeapCreate
VirtualFree
GetDiskFreeSpaceExW
TlsGetValue
Sleep
MoveFileW
GetTickCount
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
SetLastError
InterlockedIncrement
GetWindowRgn
TrackPopupMenu
GetKBCodePage
RegisterClassW
SetClassLongW
GetScrollRange
MessageBoxA
GetKeyboardLayoutList
GetNextDlgTabItem
InvertRect
GetKeyState
VerQueryValueA
Number of PE resources by type
RT_MENU 3
RT_ACCELERATOR 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 4
NEUTRAL 1
FRENCH 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
Usb HDD temperature monitoring

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.2.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
ASCII

InitializedDataSize
175104

EntryPoint
0x5ef1

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2009. AnVir Software

FileVersion
6, 2, 0, 0

TimeStamp
2016:05:19 11:04:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
usbhdd.exe

SubsystemVersion
5.0

ProductVersion
6, 2, 0, 0

FileDescription
Usb HDD temperature monitoring

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AnVir Software

CodeSize
45056

ProductName
AnVir Task Manager

ProductVersionNumber
6.2.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 a5e152f65eaec6a77f30900068fa294a
SHA1 c1d420695b24107ebf06a79678275975f7fed217
SHA256 17a8c33ade61cad7f3a7657a5c6c383ab00af4aad53f61677106062b389b23a6
ssdeep
3072:+Ktv3yP9EsYLrsiqpLfjW4Ar+xnNYVuOvbe/hT+Fe:+KUPGsqrsiqpvNAChOPvber

authentihash deeb0318ff42f9aac73cc7af107d582f7fc13542b9ee27636420324f697f8d08
imphash 3bdb6c120d67557ab960ac0a63d97319
File size 216.0 KB ( 221184 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.8%)
Win64 Executable (generic) (31.7%)
Windows screen saver (15.0%)
Win32 Dynamic Link Library (generic) (7.5%)
Win32 Executable (generic) (5.1%)
Tags
peexe

VirusTotal metadata
First submission 2016-05-24 18:42:37 UTC ( 2 years, 11 months ago )
Last submission 2016-05-24 18:42:37 UTC ( 2 years, 11 months ago )
File names usbhdd.exe
a5e152f65eaec6a77f30900068fa294a.virus
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
DNS requests
UDP communications