× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4831efe187ac7977cf652e0d7c4d9c40cf0208b8a71a36112d05745bc7fa533d
File name: vt-upload-fHrkZ
Detection ratio: 35 / 51
Analysis date: 2014-04-23 19:39:10 UTC ( 4 years, 10 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Symmi.38931 20140423
Yandex TrojanSpy.Zbot!pEudqT1TOpk 20140423
AhnLab-V3 Spyware/Win32.Zbot 20140423
AntiVir TR/Spy.ZBot.rsop 20140423
Antiy-AVL Trojan[Spy]/Win32.Zbot 20140423
Avast Win32:Zbot-SPQ [Trj] 20140423
AVG Zbot.FNN 20140423
BitDefender Gen:Variant.Symmi.38931 20140423
Comodo TrojWare.Win32.Injector.BWWA 20140423
DrWeb Trojan.PWS.Panda.2401 20140423
Emsisoft Gen:Variant.Symmi.38931 (B) 20140423
ESET-NOD32 Win32/Spy.Zbot.AAO 20140423
F-Secure Gen:Variant.Symmi.38931 20140423
Fortinet W32/Zbot.HNO!tr 20140422
GData Gen:Variant.Symmi.38931 20140423
Ikarus Virus.Win32.Zbot 20140423
Jiangmin TrojanSpy.Zbot.gzlw 20140423
K7AntiVirus Spyware ( 0029a43a1 ) 20140423
K7GW Spyware ( 0029a43a1 ) 20140423
Kaspersky Trojan-Spy.Win32.Zbot.rmkr 20140423
Malwarebytes Trojan.Agent.ED 20140423
McAfee PWSZbot-FRO!B60548CBC169 20140423
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.B 20140423
Microsoft VirTool:Win32/CeeInject.gen!KK 20140423
eScan Gen:Variant.Symmi.38931 20140423
NANO-Antivirus Trojan.Win32.Zbot.ctkkwr 20140423
Norman Injector.FZKR 20140423
Panda Trj/Genetic.gen 20140423
Qihoo-360 HEUR/Malware.QVM02.Gen 20140423
Sophos AV Mal/Zbot-OA 20140423
Symantec WS.Reputation.1 20140423
TrendMicro TROJ_GEN.R0C1C0FBE14 20140423
TrendMicro-HouseCall TROJ_GEN.R0C1C0FBE14 20140423
VBA32 Backdoor.Andromeda.1214 20140423
VIPRE Trojan.Win32.Zbot.hno (v) 20140423
AegisLab 20140423
Baidu-International 20140423
Bkav 20140423
ByteHero 20140423
CAT-QuickHeal 20140423
ClamAV 20140423
CMC 20140422
Commtouch 20140423
F-Prot 20140423
Kingsoft 20140423
nProtect 20140423
Rising 20140423
SUPERAntiSpyware 20140423
TheHacker 20140423
TotalDefense 20140423
ViRobot 20140423
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 1914

Product Aplicación K2
Original name K2.EXE
Internal name K2
File version 1, 0, 0, 1
Description Aplicación K2
Packers identified
PEiD InstallShield 2000
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-02-01 14:35:54
Entry Point 0x00002F60
Number of sections 6
PE sections
PE imports
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
Ord(4483)
Ord(1775)
Ord(4080)
Ord(3415)
Ord(4710)
Ord(441)
Ord(3597)
Ord(354)
Ord(2175)
Ord(2120)
Ord(3136)
Ord(4524)
Ord(554)
Ord(4037)
Ord(5012)
Ord(5237)
Ord(665)
Ord(5455)
Ord(5577)
Ord(3350)
Ord(2124)
Ord(5092)
Ord(3198)
Ord(3798)
Ord(6052)
Ord(971)
Ord(3259)
Ord(266)
Ord(4890)
Ord(1665)
Ord(2446)
Ord(5214)
Ord(5105)
Ord(5260)
Ord(5301)
Ord(2383)
Ord(4163)
Ord(1979)
Ord(4964)
Ord(5652)
Ord(5824)
Ord(6215)
Ord(2401)
Ord(4245)
Ord(5627)
Ord(738)
Ord(4545)
Ord(5128)
Ord(1876)
Ord(3869)
Ord(4529)
Ord(2652)
Ord(815)
Ord(2723)
Ord(4345)
Ord(1168)
Ord(641)
Ord(4155)
Ord(1883)
Ord(2494)
Ord(4428)
Ord(1992)
Ord(3351)
Ord(4353)
Ord(2514)
Ord(4382)
Ord(4425)
Ord(4669)
Ord(2058)
Ord(3454)
Ord(5277)
Ord(4441)
Ord(1134)
Ord(4465)
Ord(4430)
Ord(5104)
Ord(5300)
Ord(5284)
Ord(5914)
Ord(5508)
Ord(6175)
Ord(4730)
Ord(5024)
Ord(1669)
Ord(4627)
Ord(4512)
Ord(5022)
Ord(3738)
Ord(4853)
Ord(2127)
Ord(4589)
Ord(2982)
Ord(3250)
Ord(617)
Ord(3172)
Ord(4526)
Ord(3256)
Ord(4234)
Ord(5290)
Ord(825)
Ord(3081)
Ord(5199)
Ord(5307)
Ord(796)
Ord(4531)
Ord(4697)
Ord(5244)
Ord(2542)
Ord(4424)
Ord(4610)
Ord(4273)
Ord(3449)
Ord(5076)
Ord(2858)
Ord(4078)
Ord(3059)
Ord(2554)
Ord(2510)
Ord(1945)
Ord(5106)
Ord(1859)
Ord(6376)
Ord(4246)
Ord(4614)
Ord(2117)
Ord(401)
Ord(1727)
Ord(823)
Ord(4492)
Ord(5186)
Ord(4954)
Ord(813)
Ord(2725)
Ord(5956)
Ord(2548)
Ord(4998)
Ord(5981)
Ord(5472)
Ord(268)
Ord(4554)
Ord(4436)
Ord(4457)
Ord(3787)
Ord(3749)
Ord(1199)
Ord(2512)
Ord(4427)
Ord(4274)
Ord(5261)
Ord(2394)
Ord(4079)
Ord(4467)
Ord(3058)
Ord(2521)
Ord(4437)
Ord(3147)
Ord(1858)
Ord(6375)
Ord(5283)
Ord(2621)
Ord(2879)
Ord(1726)
Ord(4077)
Ord(6009)
Ord(4508)
Ord(5101)
Ord(6336)
Ord(4238)
Ord(4824)
Ord(3262)
Ord(5653)
Ord(674)
Ord(2371)
Ord(975)
Ord(1576)
Ord(6081)
Ord(6344)
Ord(2880)
Ord(2014)
Ord(1567)
Ord(3748)
Ord(5065)
Ord(4859)
Ord(4407)
Ord(2379)
Ord(1265)
Ord(6117)
Ord(3346)
Ord(4303)
Ord(4490)
Ord(2396)
Ord(2101)
Ord(4159)
Ord(3831)
Ord(5100)
Ord(6374)
Ord(5280)
Ord(986)
Ord(4612)
Ord(3825)
Ord(2976)
Ord(2535)
Ord(2955)
Ord(1089)
Ord(3514)
Ord(3298)
Ord(2985)
Ord(4421)
Ord(437)
Ord(807)
Ord(3922)
Ord(5240)
Ord(2445)
Ord(2649)
Ord(976)
Ord(6329)
Ord(4376)
Ord(6395)
Ord(2626)
Ord(1776)
Ord(402)
Ord(1781)
Ord(1729)
Ord(4647)
Ord(6000)
Ord(4623)
Ord(324)
Ord(296)
Ord(2391)
Ord(5460)
Ord(3830)
Ord(4388)
Ord(2385)
Ord(4613)
Ord(5871)
Ord(4493)
Ord(4349)
Ord(2878)
Ord(2990)
Ord(3079)
Ord(4899)
Ord(3353)
Ord(5255)
Ord(4387)
Ord(4723)
Ord(2055)
Ord(2627)
Ord(4837)
Ord(3442)
Ord(5241)
Ord(734)
Ord(4468)
Ord(420)
Ord(2648)
Ord(5741)
Ord(3065)
Ord(5714)
Ord(5289)
Ord(2793)
Ord(1205)
Ord(3403)
Ord(5003)
Ord(5127)
Ord(4615)
Ord(4622)
Ord(561)
Ord(1746)
Ord(2390)
Ord(411)
Ord(4563)
Ord(3769)
Ord(2563)
Ord(5102)
Ord(4543)
Ord(4645)
Ord(4962)
Ord(4921)
Ord(4961)
Ord(5751)
Ord(4486)
Ord(560)
Ord(4341)
Ord(529)
Ord(4698)
Ord(5254)
Ord(4338)
Ord(5163)
Ord(6055)
Ord(5265)
Ord(4152)
Ord(5122)
Ord(1003)
Ord(4153)
Ord(5019)
Ord(4432)
Ord(5302)
Ord(2382)
Ord(3268)
Ord(720)
Ord(5826)
Ord(5731)
Ord(3318)
_except_handler3
__p__fmode
malloc
__CxxFrameHandler
??1type_info@@UAE@XZ
_adjust_fdiv
__setusermatherr
__p__commode
_setmbcp
__dllonexit
_onexit
_controlfp
__p__acmdln
exit
_XcptFilter
__getmainargs
_exit
fopen
_initterm
__set_app_type
GetCursorPos
EnableWindow
SetRect
UpdateWindow
Number of PE resources by type
RT_STRING 16
RT_MENU 3
RT_ACCELERATOR 2
RT_DIALOG 1
Struct(241) 1
RM 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
SPANISH MODERN 25
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
280064

ImageVersion
0.0

ProductName
Aplicaci n K2

FileVersionNumber
1.0.0.1

LanguageCode
Spanish (Modern)

FileFlagsMask
0x003f

FileDescription
Aplicaci n K2

CharacterSet
Unicode

LinkerVersion
5.0

OriginalFilename
K2.EXE

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1, 0, 0, 1

TimeStamp
2014:02:01 15:35:54+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
K2

FileAccessDate
2014:04:23 20:40:18+01:00

ProductVersion
1, 0, 0, 1

SubsystemVersion
4.0

OSVersion
4.0

FileCreateDate
2014:04:23 20:40:18+01:00

FileOS
Win32

LegalCopyright
Copyright (C) 1914

MachineType
Intel 386 or later, and compatibles

CodeSize
9216

FileSubtype
0

ProductVersionNumber
1.0.0.1

EntryPoint
0x2f60

ObjectFileType
Executable application

File identification
MD5 b60548cbc169129608a76fcfd5818642
SHA1 7fff37f7ed0ae6b69dcfbce7a6e366d194af9734
SHA256 4831efe187ac7977cf652e0d7c4d9c40cf0208b8a71a36112d05745bc7fa533d
ssdeep
6144:fA8vhC+iRaXcx+rObePqiZuKFJnb3F45KzxZSkXj1Ae:ImC+iRxx+1Dnb13zxZbn

imphash bdc34b8ce9cb1e841d96e05e67b06389
File size 284.5 KB ( 291328 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.4%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
VXD Driver (0.2%)
Tags
peexe installshield

VirusTotal metadata
First submission 2014-04-23 19:39:10 UTC ( 4 years, 10 months ago )
Last submission 2014-04-23 19:39:10 UTC ( 4 years, 10 months ago )
File names K2
K2.EXE
vt-upload-fHrkZ
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.