× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
File name: downHa.exe
Detection ratio: 41 / 50
Analysis date: 2014-04-29 02:14:07 UTC ( 1 year, 4 months ago )
Antivirus Result Update
AVG PSW.Generic11.CMPR 20140428
Ad-Aware Trojan.GenericKDV.1270616 20140429
Agnitum TrojanSpy.Zbot!rq29jalwBWg 20140428
AhnLab-V3 Trojan/Win32.Zbot 20140428
AntiVir TR/Rogue.1270183 20140429
Antiy-AVL Trojan[Spy]/Win32.Zbot 20140429
Avast Win32:Malware-gen 20140429
Baidu-International Trojan.Win32.Zbot.Aq 20140428
BitDefender Trojan.GenericKDV.1270616 20140429
CAT-QuickHeal Trojan.Crilock.A 20140428
Commtouch W32/Trojan.UMDR-5684 20140429
DrWeb Trojan.PWS.Panda.4379 20140429
ESET-NOD32 a variant of Win32/Kryptik.BKRO 20140429
Emsisoft Trojan-Spy.Win32.Zbot (A) 20140429
F-Secure Trojan.GenericKDV.1270616 20140428
Fortinet W32/Zbot.GFC!tr 20140428
GData Trojan.GenericKDV.1270616 20140429
Ikarus Trojan-Spy.Win32.Zbot 20140429
Jiangmin TrojanSpy.Zbot.fgdg 20140428
K7AntiVirus Spyware ( 0045b7641 ) 20140428
K7GW Spyware ( 0045b7641 ) 20140428
Kaspersky Trojan-Spy.Win32.Zbot.puov 20140429
Malwarebytes Trojan.Backdoor.RV 20140429
McAfee PWS-Zbot.dx 20140429
McAfee-GW-Edition PWS-Zbot.dx 20140429
MicroWorld-eScan Trojan.GenericKDV.1270616 20140429
Microsoft PWS:Win32/Zbot 20140429
NANO-Antivirus Trojan.Win32.Zbot.cszcet 20140429
Norman Troj_Generic.PTYRO 20140428
Panda Trj/Genetic.gen 20140429
Qihoo-360 Win32/Trojan.Multi.daf 20140429
Rising PE:Trojan.Win32.Generic.15C851A8!365449640 20140428
SUPERAntiSpyware Trojan.Agent/Gen-Zbot 20140429
Sophos Troj/Zbot-GHQ 20140429
Symantec Trojan.Gen 20140429
TheHacker Trojan/Kryptik.bkro 20140426
TrendMicro TSPY_ZBOT.ULN 20140429
TrendMicro-HouseCall TSPY_ZBOT.ULN 20140429
VBA32 TrojanSpy.Zbot 20140428
VIPRE Trojan.Win32.Zbot.ata (v) 20140429
nProtect Trojan-Spy/W32.ZBot.466944.AL 20140428
AegisLab 20140429
Bkav 20140428
ByteHero 20140429
CMC 20140424
ClamAV 20140429
Comodo 20140429
F-Prot 20140429
Kingsoft 20140429
TotalDefense 20140428
ViRobot 20140428
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2003-2011 Climbforce Corporation. All rights reserved.

Publisher Climbforce Corp.
Product Climbforce Thatonly
Original name downHa.exe
Internal name downHa.exe
File version 9.3.419.286
Description Climbforce Thatonly
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-17 08:58:23
Link date 9:58 AM 9/17/2013
Entry Point 0x000077E3
Number of sections 4
PE sections
PE imports
GetLastError
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
GetOEMCP
LCMapStringA
HeapDestroy
HeapAlloc
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetEnvironmentStrings
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
SetSystemTimeAdjustment
HeapSize
SetStdHandle
SetFilePointer
RaiseException
WideCharToMultiByte
GetStringTypeA
GetModuleHandleA
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
CloseHandle
GetACP
HeapReAlloc
GetStringTypeW
GetCurrentThreadId
TerminateProcess
InitializeCriticalSection
HeapCreate
VirtualFree
GetEnvironmentStringsW
InterlockedDecrement
Sleep
GetFileType
IsBadReadPtr
TlsSetValue
IsBadCodePtr
ExitProcess
GetVersion
LeaveCriticalSection
VirtualAlloc
SetLastError
InterlockedIncrement
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
ExifTool file metadata
SpecialBuild
Public

CodeSize
57344

SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
9.3.419.286

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Climbforce Thatonly

CharacterSet
Unicode

InitializedDataSize
557056

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Copyright 2003-2011 Climbforce Corporation. All rights reserved.

FileVersion
9.3.419.286

TimeStamp
2013:09:17 09:58:23+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
downHa.exe

FileAccessDate
2014:04:29 03:14:29+01:00

ProductVersion
9.3.419.286

UninitializedDataSize
0

OSVersion
4.0

FileCreateDate
2014:04:29 03:14:29+01:00

OriginalFilename
downHa.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Climbforce Corp.

LegalTrademarks
Copyright (C) 2004-2014 Climbforce Corporation. All rights reserved.

ProductName
Climbforce Thatonly

ProductVersionNumber
9.3.419.286

EntryPoint
0x77e3

ObjectFileType
Executable application

File identification
MD5 7b6332de90e25a5b26f7c75910a22e0c
SHA1 c8a77a2de19097c1a4c5cb830bd0025dcbd95528
SHA256 b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
ssdeep
6144:muihiOgCd5GW6kKWHk4eyAD/bkxbdl6MgHQNb1VgJq/7UHzeRqwP27PtIVGGyuD:mu1Cd5G/5v4eyAD/bOdl/KqA3jIgx

imphash f0dd9240c6929ee847d13968390be2e7
File size 456.0 KB ( 466944 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2013-09-17 10:48:20 UTC ( 1 year, 11 months ago )
Last submission 2013-09-24 03:20:36 UTC ( 1 year, 11 months ago )
File names about.exe
J.BIN
calc.exe
15165296
fyatguqwwydlrkticmi.bfg.exe
b34459b573637cb5e6fc938f989a24d79d0b83e9cb3fac272e5f7ecaad90519a
fyatguqwwydlrkticmi.bfg
J.bin
info.exe
readme.exe
90ebfaaca179a45d7b7655e599c83cf8cf6ff67b
downHa.exe
7B6332DE90E25A5B26F7C75910A22E0C.vir
contacts.exe
gmqapgvhwffbqenqqlj.bfg
output.15165296.txt
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
TCP connections
UDP communications