× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 05fd425f1dd24de360666f2c4be195275464769fa8ea7830691aab63ad481824
File name: vti-rescan
Detection ratio: 5 / 54
Analysis date: 2016-02-10 11:07:17 UTC ( 3 years ago ) View latest
Antivirus Result Update
AhnLab-V3 Trojan/Win32.FakeMS 20160209
McAfee Artemis!6BE38BB77476 20160210
McAfee-GW-Edition BehavesLike.Win32.Sdbot.ch 20160210
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20160210
Rising PE:Malware.XPACK-LNR/Heur!1.5594 [F] 20160210
Ad-Aware 20160210
AegisLab 20160210
Yandex 20160209
Alibaba 20160204
ALYac 20160209
Antiy-AVL 20160210
Arcabit 20160210
Avast 20160210
AVG 20160210
Avira (no cloud) 20160210
Baidu-International 20160210
BitDefender 20160210
Bkav 20160204
ByteHero 20160210
CAT-QuickHeal 20160210
ClamAV 20160210
CMC 20160205
Comodo 20160210
Cyren 20160210
DrWeb 20160210
Emsisoft 20160210
ESET-NOD32 20160210
F-Prot 20160210
F-Secure 20160210
Fortinet 20160210
GData 20160210
Ikarus 20160210
Jiangmin 20160210
K7AntiVirus 20160210
K7GW 20160210
Kaspersky 20160210
Malwarebytes 20160210
Microsoft 20160210
eScan 20160210
NANO-Antivirus 20160210
nProtect 20160205
Panda 20160208
Sophos AV 20160210
SUPERAntiSpyware 20160210
Symantec 20160209
Tencent 20160210
TheHacker 20160210
TrendMicro 20160210
TrendMicro-HouseCall 20160210
VBA32 20160209
VIPRE 20160210
ViRobot 20160210
Zillya 20160209
Zoner 20160210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name CHANGJIE.IME
Internal name CHANGJIE IME
File version 10.1.7627.16385 (win7_rtm.090713-1255)
Description Chinese (Traditional) - ChangJie
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1970-01-01 01:08:16
Entry Point 0x0001F220
Number of sections 9
PE sections
PE imports
SaveDC
GetPrivateProfileSectionNamesA
GetDriveTypeW
VerifyVersionInfoA
GetOverlappedResult
DeactivateActCtx
EncodePointer
SetConsoleCursorPosition
FreeEnvironmentStringsA
CreatePipe
SetSystemTime
GetConsoleMode
GetFileTime
IsDBCSLeadByteEx
FindResourceExA
GetThreadIOPendingFlag
EnumCalendarInfoExW
SetTimerQueueTimer
WriteFile
Thread32First
LocalFree
InitAtomTable
InterlockedDecrement
GetProfileIntA
FindFirstVolumeMountPointA
GetEnvironmentVariableW
GetUserDefaultUILanguage
VerLanguageNameA
OpenThread
WriteTapemark
FoldStringA
LoadLibraryExA
CreateActCtxW
SetConsoleCtrlHandler
CreateDirectoryExW
ActivateActCtx
WriteProfileStringW
EraseTape
GetSystemDefaultUILanguage
EnumSystemLanguageGroupsA
CreateSemaphoreW
GetNumberOfConsoleMouseButtons
SetEnvironmentVariableA
ReadConsoleA
FindAtomW
WriteConsoleA
ReadConsoleOutputW
GetModuleHandleExW
GetCurrentConsoleFont
SearchPathA
ReadConsoleW
GetVersion
AddRefActCtx
CreateToolhelp32Snapshot
EnumSystemCodePagesA
TerminateThread
RequestDeviceWakeup
MoveFileWithProgressW
GetVersionExW
QueryPerformanceCounter
GetTickCount
ClearCommError
MoveFileWithProgressA
CreateMailslotA
WriteConsoleOutputAttribute
GlobalSize
SystemTimeToFileTime
Process32First
GetPrivateProfileIntA
DeleteFileA
GetCommProperties
BackupWrite
DeleteFileW
GetProcAddress
FillConsoleOutputAttribute
QueryDepthSList
GetProfileStringW
CreateHardLinkA
SetCriticalSectionSpinCount
DebugBreakProcess
FindFirstFileExA
WaitNamedPipeA
EnumResourceNamesA
CreateHardLinkW
FreeConsole
IsValidLocale
lstrcmpW
FindFirstFileExW
WaitForMultipleObjects
EncodeSystemPointer
GetFileType
TlsSetValue
LocalUnlock
LeaveCriticalSection
GetLastError
FlushConsoleInputBuffer
VirtualAllocEx
LCMapStringA
SetProcessShutdownParameters
GetDevicePowerState
GetShortPathNameA
GetAtomNameA
CompareFileTime
CreateIoCompletionPort
GetCompressedFileSizeW
GetConsoleTitleA
GetCompressedFileSizeA
GetSystemDefaultLangID
Module32NextW
WriteFileEx
GlobalFlags
SetConsoleTitleA
OpenMutexW
GetModuleHandleW
SetFileShortNameW
IsBadHugeWritePtr
GetLongPathNameW
HeapCreate
GetDefaultCommConfigW
GetProcessVersion
MprAdminMIBBufferFree
MprInfoRemoveAll
MprAdminMIBEntryGet
VarUI1FromCy
VarUI2FromI4
VarCyFromI1
VarR4FromDec
DragQueryFileW
ExtractAssociatedIconExW
DragAcceptFiles
Shell_NotifyIconW
DragQueryPoint
SHGetFileInfoW
wnsprintfW
AnimateWindow
ReleaseDC
OpenInputDesktop
CreateMDIWindowW
EnableWindow
GetLastActivePopup
wsprintfA
IsCharUpperW
wsprintfW
IsWindowEnabled
MessageBeep
PtInRect
wcsftime
putchar
fputws
fscanf
iswgraph
wprintf
wctomb
rewind
fclose
mbtowc
getenv
iswascii
localeconv
abort
getwc
wscanf
realloc
iswupper
strncmp
strtol
tolower
strcspn
wcstombs
qsort
strcat
labs
wcscmp
iswdigit
isgraph
strspn
sprintf
atol
isdigit
isalpha
vsprintf
isspace
GetErrorInfo
PdhGetRawCounterValue
PdhEnumObjectsA
PdhGetDataSourceTimeRangeA
PdhCalculateCounterFromRawValue
PdhReadRawLogRecord
PdhEnumMachinesA
GetClassURL
URLDownloadToFileA
CoInternetCombineUrl
FaultInIEFeature
CoInternetParseUrl
Number of PE resources by type
RT_ICON 12
RT_STRING 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 13
ENGLISH US 2
CHINESE TRADITIONAL 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
2.17

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
10.1.7627.16385

UninitializedDataSize
6656

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
42752

EntryPoint
0x1f220

OriginalFileName
CHANGJIE.IME

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
10.1.7627.16385 (win7_rtm.090713-1255)

TimeStamp
1970:01:01 02:08:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
CHANGJIE IME

ProductVersion
10.1.7627.16385

FileDescription
Chinese (Traditional) - ChangJie

OSVersion
4.1

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
51712

ProductName
Microsoft Windows Operating System

ProductVersionNumber
10.1.7627.16385

FileTypeExtension
exe

ObjectFileType
Driver

Compressed bundles
File identification
MD5 6be38bb7747678254efde1d977220cfd
SHA1 87a63bf96d4561bd431ea0b13047fa83c06a8247
SHA256 05fd425f1dd24de360666f2c4be195275464769fa8ea7830691aab63ad481824
ssdeep
3072:XQruUUNP8uOnvNwzdl59fhccS+Jk2DDJK/AAt0tzC:gruPtTOnvN0/fhSX2DD64Z

authentihash 6d2e3df3fee17602b556bd416c6086eb07df0fa24890096518eb0f07e9ee6073
imphash 631a3fd8840156a047e08235fa745d23
File size 157.0 KB ( 160768 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.3%)
Win32 Executable (generic) (26.2%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-10 09:25:19 UTC ( 3 years ago )
Last submission 2018-05-13 17:37:52 UTC ( 9 months, 1 week ago )
File names 65fg67n
65fg67n.exe
label8.exe
65fg67n[1].txt.1968.dr
65fg67n[1].txt.2108.dr
isheriff_6be38bb7747678254efde1d977220cfd.bin
CHANGJIE IME
label8.exe
label8.exe
05FD425F1DD24DE360666F2C4BE195275464769FA8EA7830691AAB63AD481824.exe
65fg67n.exe
CHANGJIE.IME
87a63bf96d4561bd431ea0b13047fa83c06a8247.exe
65fg67n_exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications