× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7f83fa3ca27d73251b3e5d0e99bc0166adc8ae2e74f6e64241bfdf123fd43bd0
File name: 95810231f8f633223f561c0094a04946
Detection ratio: 34 / 55
Analysis date: 2014-09-25 21:32:08 UTC ( 4 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Kazy.458961 20140925
Yandex TrojanSpy.Zbot!0srr4COFbjE 20140925
AhnLab-V3 Trojan/Win32.ZBot 20140925
Antiy-AVL Trojan/Win32.SGeneric 20140925
Avast Win32:Malware-gen 20140925
AVG Zbot.OEM 20140925
Avira (no cloud) TR/Crypt.Xpack.88266 20140925
AVware Trojan.Win32.Generic!BT 20140925
BitDefender Gen:Variant.Kazy.458961 20140925
Comodo UnclassifiedMalware 20140925
DrWeb Trojan.Siggen6.23739 20140925
Emsisoft Gen:Variant.Kazy.458961 (B) 20140925
ESET-NOD32 Win32/Spy.Zbot.ACB 20140925
F-Secure Gen:Variant.Kazy.458961 20140925
Fortinet W32/Kryptik.XOA!tr 20140925
GData Gen:Variant.Kazy.458961 20140925
Ikarus Trojan.Win32.Spy 20140925
K7AntiVirus Spyware ( 004a08e61 ) 20140925
K7GW Spyware ( 004a08e61 ) 20140925
Kaspersky Trojan-Spy.Win32.Zbot.ufud 20140925
Kingsoft Win32.Troj.Generic.a.(kcloud) 20140925
Malwarebytes Trojan.Zbot 20140925
McAfee PWSZbot-FABY!95810231F8F6 20140925
McAfee-GW-Edition BehavesLike.Win32.Klez.fm 20140925
Microsoft PWS:Win32/Zbot 20140925
eScan Gen:Variant.Kazy.458961 20140925
NANO-Antivirus Trojan.Win32.Zbot.dfjzbd 20140925
Panda Trj/CI.A 20140925
Qihoo-360 HEUR/Malware.QVM20.Gen 20140925
Sophos AV Mal/Generic-S 20140925
Symantec Packed.Generic.459 20140925
TotalDefense Win32/Zbot.bSIZaLD 20140925
TrendMicro-HouseCall TROJ_GEN.F0C2H00IO14 20140925
VIPRE Trojan.Win32.Generic!BT 20140925
AegisLab 20140925
Baidu-International 20140925
Bkav 20140925
ByteHero 20140925
CAT-QuickHeal 20140925
ClamAV 20140925
CMC 20140925
Cyren 20140925
F-Prot 20140925
Jiangmin 20140925
Norman 20140925
nProtect 20140925
Rising 20140925
SUPERAntiSpyware 20140925
Tencent 20140925
TheHacker 20140924
TrendMicro 20140925
VBA32 20140925
ViRobot 20140925
Zillya 20140925
Zoner 20140925
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-09-19 15:18:19
Entry Point 0x00001270
Number of sections 4
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
GetColorSpace
CancelDC
GetBkMode
GetDCBrushColor
GetLastError
GetModuleHandleA
LoadLibraryW
ExitProcess
GetProcAddress
VirtualAlloc
LoadLibraryA
wsprintfA
LoadIconA
EndMenu
MessageBoxA
GetSysColor
GetKeyboardType
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2014:09:19 16:18:19+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
2560

LinkerVersion
9.0

EntryPoint
0x1270

InitializedDataSize
404480

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 95810231f8f633223f561c0094a04946
SHA1 de9a20f6a89b1b2a5dabae333471a6cba087e04a
SHA256 7f83fa3ca27d73251b3e5d0e99bc0166adc8ae2e74f6e64241bfdf123fd43bd0
ssdeep
3072:EV4Wv2o3u4qtSYL4yEDIIJtKbDvTe43chqtkuXD6am7fKLWFMsta+Cm0UeHZ23+k:EOx4DVchvtlT6alLWFU+eHZ23+k

authentihash 2499109f9fc2d62a3e99528f97971c4ea6b2a3911f03bbe9b27a376219bdf53f
imphash c522dcab25783be10182dad5c652bd3f
File size 398.0 KB ( 407552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2014-09-25 21:32:08 UTC ( 4 years, 5 months ago )
Last submission 2014-09-25 21:32:08 UTC ( 4 years, 5 months ago )
File names 7f83fa3ca27d73251b3e5d0e99bc0166adc8ae2e74f6e64241bfdf123fd43bd0.exe
95810231f8f633223f561c0094a04946
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.