From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 19 6c 63
196c635e3de4e27e15a6ec0f0a24811a6d269e29 196c63c61be91a6822dec225f416b4b6f5b2b12c 196c63d22f4c4728c4fbefc5dc7354240d22cffa