× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 976bd636c4f5673df4175870b13f958fb1e5fcd08f3e73ea5f90c39e03a6fe58
File name: vt-upload-HQEBK
Detection ratio: 11 / 55
Analysis date: 2014-08-29 23:55:06 UTC ( 4 years, 6 months ago )
Antivirus Result Update
DrWeb Trojan.PWS.Panda.7630 20140830
ESET-NOD32 Win32/Spy.Zbot.ACB 20140830
Fortinet W32/Kryptik.CJSZ!tr 20140829
Kaspersky Trojan-Spy.Win32.Zbot.tyeg 20140829
Kingsoft Win32.Troj.Zbot.ty.(kcloud) 20140830
Malwarebytes Trojan.Agent.ED 20140829
McAfee Artemis!51D17E111DE2 20140829
McAfee-GW-Edition Artemis!51D17E111DE2 20140829
Microsoft PWS:Win32/Zbot 20140829
Panda Trj/Chgt.E 20140829
Sophos AV Mal/Generic-S 20140829
Ad-Aware 20140830
AegisLab 20140830
Yandex 20140829
AhnLab-V3 20140829
AntiVir 20140829
Antiy-AVL 20140829
Avast 20140829
AVG 20140829
AVware 20140830
Baidu-International 20140829
BitDefender 20140829
Bkav 20140829
ByteHero 20140830
CAT-QuickHeal 20140828
ClamAV 20140829
CMC 20140828
Comodo 20140829
Cyren 20140829
Emsisoft 20140830
F-Prot 20140829
F-Secure 20140829
GData 20140830
Ikarus 20140829
Jiangmin 20140829
K7AntiVirus 20140828
K7GW 20140828
eScan 20140830
NANO-Antivirus 20140829
Norman 20140829
nProtect 20140829
Qihoo-360 20140830
Rising 20140829
SUPERAntiSpyware 20140829
Symantec 20140829
Tencent 20140830
TheHacker 20140829
TotalDefense 20140829
TrendMicro 20140829
TrendMicro-HouseCall 20140829
VBA32 20140829
VIPRE 20140830
ViRobot 20140829
Zillya 20140829
Zoner 20140829
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
FileVersionInfo properties
Copyright
Copyright (c) 1995-2012 BreakPoint Software, Inc. All Rights Reserved.

Publisher BreakPoint Software, Inc.
Product Hex Workshop
Original name hworks32
Internal name HWORKS
File version 6.7.3.5308
Description Hex Workshop
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-08-28 15:53:56
Entry Point 0x00003861
Number of sections 5
PE sections
Number of PE resources by type
RT_ICON 2
RT_GROUP_ICON 1
RT_DIALOG 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 6
PE resources
File identification
MD5 51d17e111de20b10abee27b733ae5985
SHA1 6a078caad67843e5f111bd3d19ca04cb8f8de4c1
SHA256 976bd636c4f5673df4175870b13f958fb1e5fcd08f3e73ea5f90c39e03a6fe58
ssdeep
6144:KYIn+WAAAAAAAAAAXPE3jDw2S9Iz3AE3fLXo/we:K1n+W7PCU2o

imphash 3db08a8de5933e95ef5675e57ef8c3e5
File size 268.0 KB ( 274432 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2014-08-29 23:55:06 UTC ( 4 years, 6 months ago )
Last submission 2014-08-29 23:55:06 UTC ( 4 years, 6 months ago )
File names HWORKS
hworks32
vt-upload-HQEBK
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications