× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c3913eb1200690a31aa3fa20a73369d4a70185002c21cf10d0d56f0e9524c8eb
File name: 655992
Detection ratio: 10 / 55
Analysis date: 2016-04-15 16:16:33 UTC ( 2 weeks, 2 days ago )
Antivirus Result Update
CAT-QuickHeal Trojan.Skillis.r3 20160415
Fortinet W32/Skillis.ASCS!tr 20160413
Jiangmin Trojan/Generic.bgrhi 20160415
K7AntiVirus Riskware ( 0040eff71 ) 20160415
K7GW Riskware ( 0040eff71 ) 20160415
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20160415
SUPERAntiSpyware Trojan.Agent/Gen-Skillis 20160415
ViRobot Trojan.Win32.Downloader.824320.A[UPX][h] 20160415
Yandex Trojan.Skillis!VQYNuprKiyQ 20160414
Zillya Trojan.Skillis.Win32.2808 20160415
AVG 20160415
AVware 20160415
Ad-Aware 20160415
AegisLab 20160415
AhnLab-V3 20160414
Alibaba 20160415
Antiy-AVL 20160415
Arcabit 20160415
Avast 20160415
Avira (no cloud) 20160415
Baidu 20160414
Baidu-International 20160415
BitDefender 20160415
Bkav 20160415
CMC 20160412
ClamAV 20160415
Comodo 20160415
Cyren 20160415
DrWeb 20160415
ESET-NOD32 20160415
Emsisoft 20160415
F-Prot 20160415
F-Secure 20160415
GData 20160415
Ikarus 20160415
Kaspersky 20160415
Kingsoft 20160415
Malwarebytes 20160415
McAfee 20160415
McAfee-GW-Edition 20160415
eScan 20160415
Microsoft 20160415
NANO-Antivirus 20160415
Panda 20160415
Qihoo-360 20160415
Sophos 20160415
Symantec 20160415
Tencent 20160415
TheHacker 20160414
TrendMicro 20160415
TrendMicro-HouseCall 20160415
VBA32 20160415
VIPRE 20160415
Zoner 20160415
nProtect 20160415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-11-07 00:46:03
Entry Point 0x003017B0
Number of sections 3
PE sections
PE imports
RegCloseKey
GetOpenFileNameW
BitBlt
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
SysStringLen
GetModuleBaseNameW
DragFinish
VerQueryValueW
mixerOpen
WSAStartup
CoGetObject
Number of PE resources by type
RT_ICON 11
RT_RCDATA 8
RT_GROUP_ICON 8
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 32
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.6.3.0

UninitializedDataSize
2068480

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
12288

EntryPoint
0x3017b0

OriginalFileName
NppToR.ahk

MIMEType
application/octet-stream

LegalCopyright
(c)XXXX Andrew Redd

FileVersion
df3b3c4

TimeStamp
2012:11:07 01:46:03+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
npptor

ProductVersion
2.6.3

FileDescription
Utility for Notpad++/R communication.

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
1081344

ProductName
NppToR

ProductVersionNumber
2.6.3.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 8c415605eee904c1142caee603d0b792
SHA1 e99c1e3352e441569de78a38daeeff1f09ec408d
SHA256 c3913eb1200690a31aa3fa20a73369d4a70185002c21cf10d0d56f0e9524c8eb
ssdeep
24576:OP/kiM3WzkLUCn6ZVy26UDoPrrWhSc32UgOTp/xjre:OkNWzkLr+Vy27DoPGhMUDd

authentihash d9119e6ab8002d3b02e1bad97eba95b12da50386fabfa07b37f2f9efefb3b2f6
imphash 89c84f8523c580c6c8a18c07419e855a
File size 1.0 MB ( 1089536 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2013-11-14 09:35:48 UTC ( 2 years, 5 months ago )
Last submission 2016-04-15 16:16:33 UTC ( 2 weeks, 2 days ago )
File names 25782049
8c415605eee904c1142caee603d0b792.exe
file-6291247_exe
output.18118955.txt
NppToR-2.6.3.exe
655992
NppToR-2.6.3.exe
e99c1e3352e441569de78a38daeeff1f09ec408d
NppToR-2.6.3 (1).exe
output.25782049.txt
NppToR-2.6.3.exe
Fv8huk19nAzgi6poPh.exe
npptor-2.6.3.exe
18118955
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Searched windows
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.