× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 32a107cefbc1f6a5cd194a638b8d625e420eba2a6b866d509684192edb7c561a
File name: vti-rescan
Detection ratio: 36 / 50
Analysis date: 2014-03-06 07:55:15 UTC ( 1 month, 1 week ago )
Antivirus Result Update
AVG Worm/Pakes.BMD 20140305
Ad-Aware Trojan.GenericKD.1242757 20140306
Agnitum Trojan.Caphaw!FGpLil4g2W0 20140305
AhnLab-V3 Trojan/Win32.Foreign 20140305
AntiVir TR/Crypt.ZPACK.Gen8 20140306
Avast Win32:Malware-gen 20140306
Baidu-International Trojan.Win32.Generic.ApyE 20140306
BitDefender Trojan.GenericKD.1242757 20140306
Bkav W32.Clodb58.Trojan.12dc 20140305
Comodo UnclassifiedMalware 20140306
DrWeb BackDoor.Caphaw.2 20140306
ESET-NOD32 Win32/Caphaw.I 20140306
Emsisoft Trojan.GenericKD.1242757 (B) 20140306
F-Secure Trojan.GenericKD.1242757 20140306
Fortinet W32/BackDoor.FBFT!tr 20140306
GData Trojan.GenericKD.1242757 20140306
Ikarus Trojan.Agent4 20140306
K7AntiVirus Trojan ( 001d712b1 ) 20140305
K7GW Trojan ( 001d712b1 ) 20140305
Kaspersky HEUR:Trojan.Win32.Generic 20140306
Kingsoft Win32.Troj.Generic.a.(kcloud) 20140306
Malwarebytes Trojan.Crypt 20140306
McAfee BackDoor-FBFT!0746C48F0195 20140306
McAfee-GW-Edition BackDoor-FBFT!0746C48F0195 20140306
MicroWorld-eScan Trojan.GenericKD.1242757 20140306
Microsoft Backdoor:Win32/Caphaw.X 20140306
Norman FakeAV.CPDJ 20140306
Panda Generic Malware 20140305
Qihoo-360 HEUR/Malware.QVM20.Gen 20140306
Sophos Mal/EncPk-AKV 20140306
Symantec Trojan.Shylock 20140306
TheHacker Trojan/Caphaw.i 20140305
TrendMicro BKDR_CAPHAW.G 20140306
TrendMicro-HouseCall BKDR_CAPHAW.G 20140306
VIPRE Trojan.Win32.Encpk.akva (v) 20140306
nProtect Trojan.GenericKD.1242757 20140305
Antiy-AVL 20140306
ByteHero 20140306
CAT-QuickHeal 20140306
CMC 20140228
ClamAV 20140305
Commtouch 20140306
F-Prot 20140306
Jiangmin 20140306
NANO-Antivirus 20140306
Rising 20140305
SUPERAntiSpyware 20140306
TotalDefense 20140305
VBA32 20140305
ViRobot 20140306
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-09-05 11:59:21
Link date 12:59 PM 9/5/2013
Entry Point 0x00006450
Number of sections 5
PE sections
PE imports
GetTextExtentPoint32A
TextOutA
GetTextMetricsA
SetBkColor
GetCharWidth32A
SetTextColor
GetLastError
HeapFree
GetStdHandle
LCMapStringW
TerminateThread
GlobalFree
WaitForSingleObject
GetOEMCP
QueryPerformanceCounter
HeapAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
VirtualQuery
RtlUnwind
GetModuleFileNameA
GetACP
GetStartupInfoA
SetThreadPriority
GetCurrentProcessId
OpenProcess
GetCurrentDirectoryA
ExitProcess
MultiByteToWideChar
GetCPInfo
GetCommandLineA
GetProcAddress
GetSystemInfo
GetProcessHeap
SetStdHandle
SetFilePointer
CreateThread
GetStringTypeA
GetModuleHandleA
InterlockedExchange
WriteFile
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
GetComputerNameA
ExitThread
HeapReAlloc
GetStringTypeW
SetPriorityClass
TerminateProcess
LCMapStringA
WideCharToMultiByte
GlobalAlloc
VirtualFree
Sleep
GetLocaleInfoA
GetProcessVersion
GetTickCount
GetCurrentThreadId
VirtualAlloc
SetLastError
ReleaseDC
GetSystemMetrics
ShowCaret
DrawTextA
UnregisterHotKey
EndPaint
BeginPaint
HideCaret
SetCaretPos
GetDesktopWindow
MessageBoxA
wsprintfA
PostQuitMessage
DefWindowProcA
SendMessageA
MessageBeep
DestroyCaret
GetDC
GetKeyState
timeBeginPeriod
SCardAccessStartedEvent
Number of PE resources by type
RT_RCDATA 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 2
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:09:05 12:59:21+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
102400

LinkerVersion
8.0

FileAccessDate
2014:03:06 09:00:32+01:00

EntryPoint
0x6450

InitializedDataSize
278528

SubsystemVersion
4.0

ImageVersion
8.37

OSVersion
4.0

FileCreateDate
2014:03:06 09:00:32+01:00

UninitializedDataSize
0

File identification
MD5 0746c48f0195240b2ec6ea6621511597
SHA1 929edfb9f5bb666479247f3951b6c9c530b0225d
SHA256 32a107cefbc1f6a5cd194a638b8d625e420eba2a6b866d509684192edb7c561a
ssdeep
6144:w4Cpii2x3yuatzUZDyBg+kFT2htG4M2geqIt8V9tZoIT8:Dx3yualZSTktG4M2gB9fv

imphash 6a5ec83753dff0f98e88657a636fa996
File size 376.0 KB ( 385024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-09-06 07:32:35 UTC ( 7 months, 2 weeks ago )
Last submission 2013-09-24 19:30:19 UTC ( 6 months, 3 weeks ago )
File names vt_15322140.@
vti-rescan
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications