× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3ce6c526e1de24819cdd4482533462f0c729bff0fbf73f8d46c437a5fde99aaf
File name: dcaad6675f83d198461aea4bed065856
Detection ratio: 29 / 55
Analysis date: 2015-01-22 09:43:27 UTC ( 4 years, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Foreign.1 20150122
Yandex TrojanSpy.Zbot!iAppsY/4vGY 20150121
ALYac Gen:Variant.Zusy.121421 20150122
Antiy-AVL Trojan[Spy]/Win32.Zbot 20150122
Avast Win32:Malware-gen 20150122
AVG Downloader.Generic14.HJX 20150122
Avira (no cloud) TR/Crypt.ZPACK.119072 20150122
AVware Trojan.Win32.Generic.pak!cobra 20150122
BitDefender Trojan.Foreign.1 20150122
Cyren W32/Trojan.FOBE-9377 20150122
Emsisoft Trojan.Foreign.1 (B) 20150122
ESET-NOD32 Win32/TrojanDownloader.Tracur.AM 20150122
F-Secure Trojan.Foreign.1 20150122
Fortinet W32/ZBot.AM!tr 20150121
GData Trojan.Foreign.1 20150122
K7AntiVirus Trojan-Downloader ( 004aee451 ) 20150122
Kaspersky Trojan-Spy.Win32.Zbot.uuga 20150122
Malwarebytes Trojan.Agent.ED 20150122
McAfee GenericR-CTN!DCAAD6675F83 20150122
McAfee-GW-Edition BehavesLike.Win32.Fednu.fc 20150122
eScan Trojan.Foreign.1 20150122
NANO-Antivirus Trojan.Win32.Zbot.dlotkt 20150122
nProtect Trojan.Foreign.1 20150122
Qihoo-360 Malware.QVM10.Gen 20150122
Rising PE:Trojan.Win32.Generic.17EA9B74!401251188 20150121
Sophos AV Mal/Wonton-AA 20150122
TrendMicro TROJ_SPNR.15AF15 20150122
TrendMicro-HouseCall TROJ_SPNR.15AF15 20150122
VIPRE Trojan.Win32.Generic.pak!cobra 20150122
AhnLab-V3 20150122
Alibaba 20150120
Baidu-International 20150122
Bkav 20150121
ByteHero 20150122
CAT-QuickHeal 20150122
ClamAV 20150122
CMC 20150120
Comodo 20150122
DrWeb 20150122
F-Prot 20150122
Ikarus 20150122
Jiangmin 20150121
Kingsoft 20150122
Microsoft 20150122
Norman 20150122
Panda 20150122
SUPERAntiSpyware 20150122
Symantec 20150122
Tencent 20150122
TheHacker 20150121
TotalDefense 20150122
VBA32 20150121
ViRobot 20150122
Zillya 20150121
Zoner 20150121
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-01-03 11:38:09
Entry Point 0x000026A0
Number of sections 5
PE sections
PE imports
QueryServiceStatus
CreateFontIndirectW
SetBkMode
GetStockObject
SelectObject
SetTextColor
GetClipBox
DeleteObject
EnumFontFamiliesA
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
GetStdHandle
HeapSetInformation
GetCurrentProcess
GetStartupInfoW
GetFileType
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
UnhandledExceptionFilter
GetModuleHandleW
WideCharToMultiByte
ExitProcess
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
WaitForMultipleObjects
EncodePointer
GetProcessHeap
SetStdHandle
RaiseException
GetCPInfo
GetModuleFileNameW
TlsFree
SetFilePointer
DeleteCriticalSection
ReadFile
GetCurrentThreadId
SetUnhandledExceptionFilter
WriteFile
DecodePointer
CloseHandle
IsProcessorFeaturePresent
GetACP
HeapReAlloc
GetStringTypeW
GetProcAddress
TerminateProcess
IsValidCodePage
HeapCreate
CreateFileW
InterlockedDecrement
Sleep
SetLastError
SetEndOfFile
TlsSetValue
CreateFileA
HeapAlloc
OutputDebugStringA
LeaveCriticalSection
WriteConsoleW
InterlockedIncrement
WNetConnectionDialog
SHChangeNotify
SHGetSpecialFolderLocation
SHGetDesktopFolder
AcquireCredentialsHandleA
ReleaseDC
LoadMenuA
KillTimer
DestroyMenu
PostQuitMessage
DefWindowProcA
SetClassLongA
MessageBeep
GetSystemMetrics
MonitorFromWindow
GetWindowRect
MessageBoxA
GetSysColor
GetDC
SystemParametersInfoA
CheckMenuItem
GetMenu
SendMessageA
GetDlgItem
DrawTextW
EnableMenuItem
ClientToScreen
InvalidateRect
GetSubMenu
SetTimer
EnumDisplaySettingsA
TrackPopupMenu
GetWindowTextW
GetDesktopWindow
GetMonitorInfoA
OpenThemeData
CloseThemeData
GetThemeSysFont
WinVerifyTrust
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
StgCreateDocfile
CoTaskMemFree
Number of PE resources by type
RT_CURSOR 22
RT_GROUP_CURSOR 20
RT_DIALOG 18
RT_STRING 14
RT_ICON 9
RT_BITMAP 4
RT_ACCELERATOR 2
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 91
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2015:01:03 12:38:09+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
74240

LinkerVersion
10.0

EntryPoint
0x26a0

InitializedDataSize
308224

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 dcaad6675f83d198461aea4bed065856
SHA1 33701fe447ccb57897b1eb1f7c655e96cc09eca4
SHA256 3ce6c526e1de24819cdd4482533462f0c729bff0fbf73f8d46c437a5fde99aaf
ssdeep
6144:gD7BR9HtVTbO0neLWKT09DJcp+xVWfDQlAODu5pndSdNcI:gD7BvHtJO0noWKA9tbAfDi9idI

authentihash 942f1485286ce470d0b2c0a5cd181e726ae40025f69488f65ce55b3470de8ab3
imphash d96d2f8c900375d1bf1050a748108287
File size 374.5 KB ( 383488 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2015-01-22 09:43:27 UTC ( 4 years, 2 months ago )
Last submission 2015-01-22 09:43:27 UTC ( 4 years, 2 months ago )
File names dcaad6675f83d198461aea4bed065856
3ce6c526e1de24819cdd4482533462f0c729bff0fbf73f8d46c437a5fde99aaf.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.