× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 587e784f8c54b49f25c01e0e8f71c205bd422e2b673fb7fbf28d721aa768e055
File name: 1ecb6e64fa03f0315955383aa82f9ed5
Detection ratio: 39 / 51
Analysis date: 2014-04-07 20:50:25 UTC ( 1 week, 5 days ago )
Antivirus Result Update
AVG BackDoor.Generic_r.ERM 20140407
Ad-Aware Gen:Variant.FakeAlert.11 20140407
Agnitum Trojan.FakeAlert!h6Ix0YaknP0 20140407
AhnLab-V3 Trojan/Win32.FakeAlert 20140407
AntiVir TR/Rogue.1448599 20140407
Antiy-AVL Trojan[Spy]/Win32.IISn 20140407
Avast Win64:IISniffer-A [Spy] 20140407
Baidu-International Trojan.Win32.IISn.abRU 20140407
BitDefender Gen:Variant.FakeAlert.11 20140407
Bkav W32.Clodd15.Trojan.3ce1 20140407
CAT-QuickHeal TrojanSpy.Vorsii 20140407
Commtouch W32/IISniff.JQSU-7695 20140407
Comodo UnclassifiedMalware 20140407
DrWeb Trojan.IISniff.1 20140407
ESET-NOD32 Win32/Spy.IISniff.A 20140407
Emsisoft Gen:Variant.FakeAlert.11 (B) 20140407
F-Prot W32/IISniff.A 20140407
F-Secure Gen:Variant.FakeAlert.11 20140407
Fortinet W32/IISniff.A!tr.spy 20140407
GData Gen:Variant.FakeAlert.11 20140407
Ikarus Trojan.IIsMod 20140407
K7AntiVirus Spyware ( 004911691 ) 20140407
K7GW Spyware ( 004911691 ) 20140407
Kaspersky Trojan-Spy.Win32.IISn.a 20140407
Kingsoft Win32.Troj.Generic.a.(kcloud) 20140407
McAfee Generic Packed 20140407
McAfee-GW-Edition Generic Packed 20140407
MicroWorld-eScan Gen:Variant.FakeAlert.11 20140407
Microsoft TrojanDropper:Win32/Vorsii.A 20140407
NANO-Antivirus Trojan.Win32.IISn.csbfmv 20140407
Norman MalIIS.A 20140407
Panda Trj/CI.A 20140407
Qihoo-360 Win32/Trojan.c85 20140407
Sophos Mal/Generic-S 20140407
Symantec Infostealer.Isniffer 20140407
TrendMicro TSPY_IISNIFF.NIL 20140407
TrendMicro-HouseCall TSPY_IISNIFF.NIL 20140407
VBA32 TrojanSpy.IISn 20140407
VIPRE Trojan.Win32.Generic!BT 20140407
AegisLab 20140407
ByteHero 20140407
CMC 20140407
ClamAV 20140407
Jiangmin 20140407
Malwarebytes 20140407
Rising 20140406
SUPERAntiSpyware 20140407
TheHacker 20140407
TotalDefense 20140407
ViRobot 20140407
nProtect 20140407
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-11 10:59:18
Link date 11:59 AM 9/11/2013
Entry Point 0x00007B75
Number of sections 5
PE sections
PE imports
SetSecurityDescriptorDacl
FreeSid
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeSecurityDescriptor
InitializeAcl
SetFileSecurityA
GetStdHandle
GetConsoleOutputCP
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
LocalFree
InitializeCriticalSection
LoadResource
TlsGetValue
SetLastError
PeekNamedPipe
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
DeleteCriticalSection
SetUnhandledExceptionFilter
GetSystemDirectoryA
SetHandleInformation
TerminateProcess
WriteConsoleA
GetVersion
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetUserDefaultLCID
IsValidLocale
GetProcAddress
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
SizeofResource
GetCurrentProcessId
LockResource
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetEnvironmentStrings
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
FindResourceA
VirtualAlloc
OemToCharA
wvsprintfA
Number of PE resources by type
LIB 5
RT_MANIFEST 1
Number of PE resources by language
RUSSIAN 5
ENGLISH US 1
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:09:11 11:59:18+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
76288

LinkerVersion
9.0

FileAccessDate
2014:04:07 21:49:20+01:00

EntryPoint
0x7b75

InitializedDataSize
620032

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

FileCreateDate
2014:04:07 21:49:20+01:00

UninitializedDataSize
0

Compressed bundles
File identification
MD5 1ecb6e64fa03f0315955383aa82f9ed5
SHA1 1d2218d064ed62fabb343a92a2757e31ffaf5b1a
SHA256 587e784f8c54b49f25c01e0e8f71c205bd422e2b673fb7fbf28d721aa768e055
ssdeep
6144:2bQGrHs2fJuzsZybndmCxUslC9lkfUR+U7eiGs1wxU++gN+YL0hMjKS:2bFrHs2fJsKMndxx8R+U7es1eUQCho

imphash 63e45a09d562021500a10b16ba24400d
File size 681.0 KB ( 697344 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-12-06 11:19:31 UTC ( 4 months, 2 weeks ago )
Last submission 2014-04-07 20:50:25 UTC ( 1 week, 5 days ago )
File names 1d2218d064ed62fabb343a92a2757e31ffaf5b1a
vti-rescan
isn.exe
file-6319725_
1ecb6e64fa03f0315955383aa82f9ed5
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.