× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c315d41569c42cf913f3ec3b0cf54072069a6912db0e9d2888f25352092c3c3b
File name: f1a0c1d69854d45568fab7adf380e43ccf0b2585
Detection ratio: 31 / 47
Analysis date: 2013-05-25 07:00:37 UTC ( 3 years, 11 months ago ) View latest
Antivirus Result Update
Yandex Trojan.Kryptik!E2JZzQN7HFA 20130524
AntiVir TR/Crypt.ZPACK.Gen 20130525
Avast Win32:Malware-gen 20130525
AVG Crypt.CCTO 20130525
BitDefender Gen:Variant.Kazy.132542 20130525
Comodo TrojWare.Win32.Kryptik.AOBO 20130525
DrWeb Trojan.PWS.Panda.786 20130525
Emsisoft Trojan.Win32.Zbot (A) 20130525
ESET-NOD32 Win32/Spy.Zbot.YW 20130524
F-Secure Gen:Variant.Kazy.132542 20130525
Fortinet W32/Kryptik.XUW!tr 20130525
GData Gen:Variant.Kazy.132542 20130525
Ikarus Trojan-PWS.Win32.Zbot 20130525
K7AntiVirus Backdoor 20130524
K7GW Backdoor 20130524
Kaspersky Trojan-Spy.Win32.Zbot.lujw 20130525
Kingsoft Win32.Troj.Generic.a.(kcloud) 20130506
Malwarebytes Trojan.Zbot.RV 20130525
McAfee PWS-Zbot.dx 20130525
McAfee-GW-Edition Artemis!AC2D2FE0BD0C 20130525
Microsoft PWS:Win32/Zbot.gen!Y 20130525
eScan Gen:Variant.Kazy.132542 20130525
NANO-Antivirus Trojan.Win32.Zbot.brjsmo 20130525
Norman Troj_Generic.LLOTE 20130524
Panda Trj/Genetic.gen 20130524
PCTools Email-Worm.Waledac 20130521
Symantec W32.Waledac.C!gen3 20130525
TotalDefense Win32/Zbot.HCL 20130524
TrendMicro TSPY_ZBOT.PDL 20130525
TrendMicro-HouseCall TSPY_ZBOT.PDL 20130525
VIPRE Packer.Win32.Mystic.a (v) 20130525
AhnLab-V3 20130524
Antiy-AVL 20130524
ByteHero 20130517
CAT-QuickHeal 20130523
ClamAV 20130523
Commtouch 20130525
eSafe 20130523
F-Prot 20130525
Jiangmin 20130525
nProtect 20130524
Rising 20130524
Sophos 20130522
SUPERAntiSpyware 20130524
TheHacker 20130524
VBA32 20130524
ViRobot 20130525
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
rFUHmdWmy

Product PlS94
Original name 2colzASKq
Internal name yb2UT1FF42uY
File version 121.128.15147.57780
Description wgvREw74hZ
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-09-29 02:25:58
Entry Point 0x0000739C
Number of sections 3
PE sections
Overlays
MD5 fbfe74df0aa8d34e929dc9abc341f7e3
File type data
Offset 129024
Size 746
Entropy 7.71
PE imports
CreatePrivateObjectSecurity
SetPrivateObjectSecurity
RegQueryValueExA
RegOverridePredefKey
GetInheritanceSourceA
AccessCheckByTypeResultListAndAuditAlarmW
RegCreateKeyA
GetAclInformation
DecryptFileW
CredDeleteW
ConvertStringSDToSDDomainW
ObjectDeleteAuditAlarmA
DecryptFileA
LsaRemoveAccountRights
ConvertStringSDToSDDomainA
UpdateTraceW
CopySid
CancelOverlappedAccess
DuplicateEncryptionInfoFile
CryptSetProvParam
InitiateSystemShutdownA
SetInformationCodeAuthzLevelW
IsValidSid
ObjectPrivilegeAuditAlarmW
SetUserFileEncryptionKey
ObjectCloseAuditAlarmA
LsaCreateTrustedDomain
ElfReadEventLogW
WmiQuerySingleInstanceA
BuildTrusteeWithObjectsAndNameA
EqualSid
MD5Init
SystemFunction021
SetThreadToken
QueryRecoveryAgentsOnEncryptedFile
_sopen
strncmp
memset
_pipe
_mbsupr
_getdiskfree
wcstok
__iscsym
_rmdir
getchar
_strrev
clearerr
_cputs
system
_dup
_creat
asctime
mbstowcs
_mbsspnp
_baseminor_dll
_ismbslead
_wcsnset
sinh
_spawnlp
_mbclen
_putch
ungetc
_getch
I_CryptCreateLruEntry
CryptHashMessage
PFXIsPFXBlob
CertVerifyValidityNesting
CertAddCertificateContextToStore
CryptVerifyCertificateSignatureEx
CertCreateContext
I_CryptUninstallOssGlobal
CertSetEnhancedKeyUsage
CertDeleteCRLFromStore
RegOpenHKCUKeyExU
I_CryptWalkAllLruCacheEntries
CertAlgIdToOID
CertAddCRLContextToStore
CryptMsgUpdate
I_CryptAllocTls
CryptGetDefaultOIDFunctionAddress
CryptEncodeObject
CryptBinaryToStringW
CryptMsgCountersign
CryptSIPVerifyIndirectData
RegSetValueExU
CertAddEncodedCRLToStore
CertAddEncodedCertificateToSystemStoreA
CryptGetAsyncParam
CryptFindOIDInfo
CertGetPublicKeyLength
CertEnumSystemStoreLocation
CryptSignHashU
CertFindRDNAttr
SetThreadLocale
GetConsoleAliasA
GlobalFree
GetConsoleCursorInfo
FillConsoleOutputCharacterW
GetNumberOfConsoleInputEvents
SetConsoleNlsMode
QueueUserAPC
LoadLibraryA
GetStartupInfoA
GetProcessIoCounters
Heap32Next
Heap32First
GetConsoleCommandHistoryLengthW
AllocConsole
BuildCommDCBAndTimeoutsW
_llseek
GlobalLock
Process32FirstW
EnumSystemCodePagesW
GetModuleHandleA
FindActCtxSectionStringA
LZCopy
ReadConsoleOutputCharacterW
WTSGetActiveConsoleSessionId
ConvertDefaultLocale
WaitForMultipleObjectsEx
GetACP
GetDiskFreeSpaceA
EnumCalendarInfoExA
GlobalUnWire
SetCommState
GlobalAlloc
GetDiskFreeSpaceExW
TlsGetValue
GetProfileIntA
EnumDateFormatsA
VirtualAlloc
SetLastError
PSetupGetDriverInfo3
PSetupEnumMonitor
PSetupGetLocalDataField
PSetupDestroyMonitorInfo
PSetupPreSelectDriver
PSetupGetSelectedDriverInfo
PSetupThisPlatform
PSetupInstallInboxDriverSilently
PSetupShowBlockedDriverUI
PSetupSelectDeviceButtons
PSetupDriverInfoFromName
PSetupFreeMem
PSetupDestroySelectedDriverInfo
ClassInstall32
PSetupSelectDriver
PSetupCreateMonitorInfo
PSetupIsTheDriverFoundInInfInstalled
PSetupCreateDrvSetupPage
ServerInstallW
PSetupFreeDrvField
PSetupAssociateICMProfiles
PSetupProcessPrinterAdded
PSetupDestroyPrinterDeviceInfoList
PSetupBuildDriversFromPath
PSetupGetPathToSearch
PSetupIsCompatibleDriver
PSetupSetSelectDevTitleAndInstructions
PSetupInstallICMProfiles
PSetupDestroyDriverInfo3
PSetupCreatePrinterDeviceInfoList
Number of PE resources by type
RT_MANIFEST 1
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
ITALIAN 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
5.1

FileSubtype
0

FileVersionNumber
0.2048.15344.18407

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
110592

EntryPoint
0x739c

OriginalFileName
2colzASKq

MIMEType
application/octet-stream

LegalCopyright
rFUHmdWmy

FileVersion
121.128.15147.57780

TimeStamp
2008:09:29 03:25:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
yb2UT1FF42uY

ProductVersion
93.185.59259.23413

FileDescription
wgvREw74hZ

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
fLJz5mdQdo3

CodeSize
52224

ProductName
PlS94

ProductVersionNumber
0.2048.15344.18407

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ac2d2fe0bd0c40db038c88cca4a3296f
SHA1 ba22fd882e1c8d7fc30ac13d8e6b2176b13370ee
SHA256 c315d41569c42cf913f3ec3b0cf54072069a6912db0e9d2888f25352092c3c3b
ssdeep
1536:+Qu5Bm9OIQ7oyYsKaNcwvt42wmWNjrXS6912viyRMR0H8uaDwO/3koPWkLmKXykM:zuW9OU0KaNcwv0RPE8uaPkbOm9EjhxOJ

authentihash fd83415224e05217ed4996d5efa570a1868609b58742f9285a9fe768ca35a4ac
imphash 39105d843ef3dbedacf0ca70047afe47
File size 126.7 KB ( 129770 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe overlay

VirusTotal metadata
First submission 2013-05-22 09:24:41 UTC ( 3 years, 11 months ago )
Last submission 2017-04-16 19:11:08 UTC ( 1 week, 1 day ago )
File names f1a0c1d69854d45568fab7adf380e43ccf0b2585
ac2d2fe0bd0c40db038c88cca4a3296f
yb2UT1FF42uY
csrss.exe
2colzASKq
04.exe
csrss.exe
11296040
output.11296040.txt
ac2d2fe0bd0c40db038c88cca4a3296f.exe
file-6765963_
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications