× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 76636d22cb9a4170c7ee8c2f6fbbae128e977d17fe10dd4e468b5ac52319d82e
File name: 76636d22cb9a4170c7ee8c2f6fbbae128e977d17fe10dd4e468b5ac52319d82e.vir
Detection ratio: 38 / 53
Analysis date: 2015-12-20 09:00:54 UTC ( 3 years, 2 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Symmi.45066 20151220
Yandex Trojan.Kryptik!7NUwGOXk3nk 20151219
AhnLab-V3 Trojan/Win32.MDA 20151219
Arcabit Trojan.Symmi.DB00A 20151220
Avast Win32:Malware-gen 20151220
AVG Crypt_c.AKDH 20151220
Avira (no cloud) TR/ZbotCitadel.A.891 20151219
AVware Trojan.Win32.Generic!BT 20151220
Baidu-International Trojan.Win32.Zbot.tsrb 20151220
BitDefender Gen:Variant.Symmi.45066 20151220
CAT-QuickHeal TrojanPWS.ZBot 20151219
Comodo UnclassifiedMalware 20151219
DrWeb Trojan.PWS.Panda.7278 20151220
Emsisoft Gen:Variant.Symmi.45066 (B) 20151220
ESET-NOD32 a variant of Win32/Kryptik.CIJW 20151219
F-Secure Gen:Variant.Symmi.45066 20151218
Fortinet W32/Kryptik.CIJW!tr 20151220
GData Gen:Variant.Symmi.45066 20151220
Ikarus Trojan.Win32.Kryptik 20151220
K7AntiVirus Trojan ( 0049fc901 ) 20151220
K7GW Trojan ( 0049fc901 ) 20151220
Kaspersky Trojan-Spy.Win32.Zbot.tsrb 20151220
Malwarebytes Trojan.Agent.ED 20151220
McAfee Artemis!235D54EDC23A 20151220
McAfee-GW-Edition BehavesLike.Win32.Dropper.dc 20151220
Microsoft PWS:Win32/Zbot 20151220
eScan Gen:Variant.Symmi.45066 20151220
NANO-Antivirus Trojan.Win32.Kryptik.deipdw 20151220
nProtect Trojan-Spy/W32.ZBot.276892 20151218
Panda Generic Malware 20151219
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20151218
Sophos AV Mal/Generic-S 20151220
SUPERAntiSpyware Trojan.Agent/Gen-CeeInject 20151220
Symantec Trojan.ADH 20151217
TrendMicro TSPY_ZBOT.YYDFJ 20151220
TrendMicro-HouseCall TSPY_ZBOT.YYDFJ 20151220
VIPRE Trojan.Win32.Generic!BT 20151219
ViRobot Trojan.Win32.A.Zbot.276892[h] 20151220
AegisLab 20151220
Alibaba 20151208
Antiy-AVL 20151220
Bkav 20151219
ByteHero 20151220
ClamAV 20151219
CMC 20151217
Cyren 20151220
F-Prot 20151220
Jiangmin 20151220
TheHacker 20151220
TotalDefense 20151220
VBA32 20151218
Zillya 20151218
Zoner 20151220
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
File version 2.8.3.1
Description IUV
Comments Trolley and Foceps for vivisection
Packers identified
F-PROT NSIS, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-05-11 20:03:42
Entry Point 0x000030E2
Number of sections 5
PE sections
Overlays
MD5 91148ea1cf623db3f62830c316ea5bbe
File type data
Offset 51200
Size 225692
Entropy 8.00
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
GetTickCount
SetFileTime
GlobalUnlock
LoadLibraryA
DeleteFileA
GetModuleFileNameA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
lstrcpyA
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
GetProcAddress
SetEnvironmentVariableA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
WriteFile
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
ExitProcess
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
CharPrevA
GetMessagePos
EndPaint
ReleaseDC
EndDialog
BeginPaint
ShowWindow
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
PostQuitMessage
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
SendMessageA
DrawTextA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
EnableMenuItem
RegisterClassA
SendMessageTimeoutA
InvalidateRect
GetWindowLongA
FindWindowExA
CreateWindowExA
LoadCursorA
TrackPopupMenu
SetWindowTextA
FillRect
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EmptyClipboard
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoTaskMemFree
OleUninitialize
CoCreateInstance
OleInitialize
Number of PE resources by type
RT_ICON 3
RT_DIALOG 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
Trolley and Foceps for vivisection

LinkerVersion
6.0

ImageVersion
6.0

FileVersionNumber
2.8.3.1

UninitializedDataSize
1024

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
162816

EntryPoint
0x30e2

MIMEType
application/octet-stream

FileVersion
2.8.3.1

TimeStamp
2014:05:11 21:03:42+01:00

FileType
Win32 EXE

PEType
PE32

FileDescription
IUV

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
24064

FileSubtype
0

ProductVersionNumber
2.8.3.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 235d54edc23a0dd4530565ee6b4a1845
SHA1 dc79e5e040f6a657cea4bd89d9206b45e1cd1b33
SHA256 76636d22cb9a4170c7ee8c2f6fbbae128e977d17fe10dd4e468b5ac52319d82e
ssdeep
6144:d4SUjhtYUMfjkmbtlXmBWYQdXa1MBJQ4Euslic:GYUSbb72YYQd++Ju

authentihash 88265f5c3d7421cbe6bdb5c5647d1098a8eabb25d4fc72975c5bd01e8eae159f
imphash e160ef8e55bb9d162da4e266afd9eef3
File size 270.4 KB ( 276892 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2014-08-10 05:58:15 UTC ( 4 years, 6 months ago )
Last submission 2015-12-20 09:00:54 UTC ( 3 years, 2 months ago )
File names vt-upload-dQilV
76636d22cb9a4170c7ee8c2f6fbbae128e977d17fe10dd4e468b5ac52319d82e.vir
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.