× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1d7ce94eaefc8291a670e2454e6a11556c5a793cf1f9ca68c49b54f53713a222
File name: vti-rescan
Detection ratio: 35 / 55
Analysis date: 2014-09-07 07:47:18 UTC ( 4 years, 6 months ago )
Antivirus Result Update
Ad-Aware Trojan.GenericKD.1841857 20140907
AhnLab-V3 Dropper/Win32.Necurs 20140906
Antiy-AVL Trojan/Win32.Yakes 20140907
Avast Win32:Dropper-gen [Drp] 20140907
AVG Inject2.AUHV 20140906
Avira (no cloud) TR/Crypt.ZPACK.95824 20140906
AVware Trojan.Win32.Generic!BT 20140907
Baidu-International Trojan.Win32.Yakes.aaf 20140907
BitDefender Trojan.GenericKD.1841857 20140907
DrWeb Trojan.PWS.Panda.7630 20140907
Emsisoft Trojan.GenericKD.1841857 (B) 20140907
ESET-NOD32 a variant of Win32/Injector.BLHB 20140907
F-Secure Trojan.GenericKD.1841857 20140907
Fortinet W32/Yakes.FVSW!tr 20140907
GData Trojan.GenericKD.1841857 20140907
Ikarus Trojan-Spy.Zbot 20140907
K7AntiVirus Riskware ( 0040eff71 ) 20140905
K7GW Riskware ( 0040eff71 ) 20140905
Kaspersky Trojan.Win32.Yakes.fvsw 20140906
Malwarebytes Trojan.Ransom.ED 20140907
McAfee RDN/Suspicious.bfr!bh 20140907
McAfee-GW-Edition BehavesLike.Win32.Spybot.fc 20140906
Microsoft PWS:Win32/Zbot 20140907
eScan Trojan.GenericKD.1841857 20140907
NANO-Antivirus Trojan.Win32.Ruskill.denhak 20140907
Norman Injector.HFZC 20140907
nProtect Trojan.GenericKD.1841857 20140907
Panda Trj/Chgt.E 20140906
Qihoo-360 HEUR/Malware.QVM10.Gen 20140907
Sophos AV Mal/Wonton-J 20140907
Symantec WS.Reputation.1 20140907
Tencent Win32.Trojan.Yakes.Eegx 20140907
TrendMicro TROJ_FORUCON.BMC 20140907
TrendMicro-HouseCall TROJ_FORUCON.BMC 20140907
VIPRE Trojan.Win32.Generic!BT 20140907
AegisLab 20140907
Yandex 20140906
Bkav 20140906
ByteHero 20140907
CAT-QuickHeal 20140904
ClamAV 20140906
CMC 20140904
Comodo 20140907
Cyren 20140907
F-Prot 20140907
Jiangmin 20140906
Kingsoft 20140907
Rising 20140906
SUPERAntiSpyware 20140906
TheHacker 20140905
TotalDefense 20140906
VBA32 20140905
ViRobot 20140907
Zillya 20140906
Zoner 20140905
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
FileVersionInfo properties
Copyright
Boban Spasic

Publisher MyCity
File version 1.2.0.0
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-09-04 08:53:02
Entry Point 0x0001A0F3
Number of sections 4
PE sections
Number of PE resources by type
RT_ICON 7
RT_CURSOR 4
RT_GROUP_CURSOR 3
RT_FONT 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
GERMAN SWISS 8
ENGLISH US 7
NEUTRAL 2
PE resources
File identification
MD5 f2e3aa5b074e5743e7cf56c509e2815b
SHA1 5808c227ad7d82b32bdef6c8df427e107c63c84a
SHA256 1d7ce94eaefc8291a670e2454e6a11556c5a793cf1f9ca68c49b54f53713a222
ssdeep
6144:sXM71FMhGYcdu1DUJzDh/SG3xhKBqDLWk8pOidDHErWdkv6qe:GaFMhGY62DYBSXqD0UidDHErWqv63

imphash e091fb422d9b6bc22565466df4f26ddd
File size 356.2 KB ( 364771 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2014-09-04 15:53:00 UTC ( 4 years, 6 months ago )
Last submission 2014-09-07 07:47:18 UTC ( 4 years, 6 months ago )
File names vti-rescan
f2e3aa5b074e5743e7cf56c509e2815b
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs
UDP communications