× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: eeeec2303f5b8ca68e3e8b129dbd116364c4ce67c3e80944ddb9ffb819045e11
File name: 1fb51f6d1f7c006c51653467483864f2
Detection ratio: 14 / 49
Analysis date: 2015-05-11 09:38:21 UTC ( 3 years, 10 months ago )
Antivirus Result Update
Antiy-AVL Trojan/Win32.Inject 20150511
Avast Win32:MalOb-AR [Cryp] 20150511
Fortinet W32/Kryptik.CAHR!tr 20150511
GData Win32.Trojan.Agent.4JVOJ1 20150511
Ikarus Trojan.Win32.Inject 20150511
Kaspersky Trojan.Win32.Inject.sex 20150511
McAfee Artemis!1FB51F6D1F7C 20150511
Microsoft PWS:Win32/Zbot.gen!VM 20150511
Panda Generic Suspicious 20150510
Rising PE:Malware.XPACK-HIE/Heur!1.9C48 20150510
Sophos AV Mal/Generic-S 20150511
Symantec WS.Reputation.1 20150511
VBA32 Malware-Cryptor.General.3 20150511
VIPRE Trojan.Win32.Generic!BT 20150511
Ad-Aware 20150511
AegisLab 20150511
Yandex 20150511
AhnLab-V3 20150510
ALYac 20150511
AVG 20150511
Baidu-International 20150509
BitDefender 20150511
Bkav 20150509
ByteHero 20150511
CAT-QuickHeal 20150511
ClamAV 20150510
Comodo 20150511
Cyren 20150511
ESET-NOD32 20150511
F-Prot 20150511
Jiangmin 20150506
K7AntiVirus 20150510
K7GW 20150510
Kingsoft 20150511
Malwarebytes 20150511
McAfee-GW-Edition 20150510
eScan 20150509
NANO-Antivirus 20150511
Norman 20150511
nProtect 20150508
Qihoo-360 20150511
SUPERAntiSpyware 20150509
TheHacker 20150508
TotalDefense 20150510
TrendMicro 20150511
TrendMicro-HouseCall 20150511
ViRobot 20150511
Zillya 20150510
Zoner 20150507
File identification
MD5 1fb51f6d1f7c006c51653467483864f2
SHA1 35981107e86f93084d657b080a02c54376c1a869
SHA256 eeeec2303f5b8ca68e3e8b129dbd116364c4ce67c3e80944ddb9ffb819045e11
ssdeep
1536:Jfzo34SdGksJVflvx7Buoe9FweCVzWzUwuEm8h/:to34/ksxvx7BFe9t2gmW/

authentihash 097241b0f747ad0ebf65890e1e5c7eb859559381f559be38c695824ce2f06299
File size 413.5 KB ( 423424 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID
Tags
peexe

VirusTotal metadata
First submission 2015-05-11 09:38:21 UTC ( 3 years, 10 months ago )
Last submission 2015-05-11 09:38:21 UTC ( 3 years, 10 months ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Moved files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.