× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3b2dba499fc805c363f91940fdac01d376f7f93f958cadc249f456dd239c78c2
File name: vti-rescan
Detection ratio: 37 / 51
Analysis date: 2014-03-31 14:13:03 UTC ( 1 year ago )
Antivirus Result Update
AVG Win32/DH{flAWgQWBBxxTICIl} 20140331
Ad-Aware Gen:Trojan.Heur.GZ.cmX@bamxE8n 20140331
Agnitum Trojan.DR.Daws!pu8t7cYfYFQ 20140330
AhnLab-V3 Trojan/Win32.Daws 20140331
AntiVir TR/Crypt.XPACK.Gen 20140331
Antiy-AVL Trojan[Dropper]/Win32.Daws 20140331
Avast Win32:Crypt-QKM [Trj] 20140331
Baidu-International Trojan.Win32.Daws.aaRZ 20140331
BitDefender Gen:Trojan.Heur.GZ.cmX@bamxE8n 20140331
Bkav W32.HfsAutoB.942d 20140331
ByteHero Virus.Win32.Heur.c 20140331
Commtouch W32/Trojan.MPXR-8899 20140331
Comodo UnclassifiedMalware 20140331
DrWeb Trojan.Inject1.35349 20140331
ESET-NOD32 Win32/Viknok.F 20140331
Emsisoft Gen:Trojan.Heur.GZ.cmX@bamxE8n (B) 20140331
F-Secure Gen:Trojan.Heur.GZ.cmX@bamxE8n 20140331
Fortinet W32/Daws.CAMG!tr 20140331
GData Gen:Trojan.Heur.GZ.cmX@bamxE8n 20140331
Ikarus Trojan-Dropper.Win32.Daws 20140331
K7AntiVirus Trojan ( 004943f21 ) 20140331
K7GW Trojan ( 004943f21 ) 20140331
Kaspersky Trojan-Dropper.Win32.Daws.camg 20140331
Malwarebytes Trojan.Rootkit.Dropper 20140331
McAfee RDN/Generic Dropper!to 20140331
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.J 20140331
MicroWorld-eScan Gen:Trojan.Heur.GZ.cmX@bamxE8n 20140331
Microsoft Trojan:Win32/Viknok.C 20140331
NANO-Antivirus Virus.Win32.Gen.ccmw 20140331
Norman Troj_Generic.SCYOT 20140331
Panda Trj/CI.A 20140331
Qihoo-360 Win32/Trojan.Multi.daf 20140331
Sophos Mal/Behav-238 20140331
Symantec Trojan.Viknok 20140331
TrendMicro TROJ_GEN.R047C0OAF14 20140331
TrendMicro-HouseCall TROJ_GEN.R047C0OAF14 20140331
VIPRE Trojan.Win32.Generic!BT 20140331
AegisLab 20140331
CAT-QuickHeal 20140330
CMC 20140331
ClamAV 20140331
F-Prot 20140331
Jiangmin 20140331
Kingsoft 20140331
Rising 20140331
SUPERAntiSpyware 20140331
TheHacker 20140329
TotalDefense 20140330
VBA32 20140331
ViRobot 20140331
nProtect 20140331
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-01-10 18:37:09
Link date 7:37 PM 1/10/2014
Entry Point 0x000011E8
Number of sections 3
PE sections
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2014:01:10 19:37:09+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
14848

LinkerVersion
9.0

FileAccessDate
2014:03:31 15:07:45+01:00

EntryPoint
0x11e8

InitializedDataSize
0

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

FileCreateDate
2014:03:31 15:07:45+01:00

UninitializedDataSize
0

File identification
MD5 b8beb29c40fcfbefc989dfdcb7b08e1e
SHA1 1969a619b7891914b81daf80b4ce6be0fb105778
SHA256 3b2dba499fc805c363f91940fdac01d376f7f93f958cadc249f456dd239c78c2
ssdeep
768:rA+fOpe66b3SdUA+nS/sp39OWbI8zapcs2uMeJjcoe6:FOpe4uRzzhs28JjL

File size 36.0 KB ( 36864 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
Clipper DOS Executable (19.1%)
Generic Win/DOS Executable (19.0%)
DOS Executable Generic (18.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2014-01-15 17:40:58 UTC ( 1 year, 3 months ago )
Last submission 2014-03-31 14:13:03 UTC ( 1 year ago )
File names vti-rescan
4.exe
CD423CEF02_04460000_00009000.F927C3AF.mem
3b2dba499fc805c363f91940fdac01d376f7f93f958cadc249f456dd239c78c2
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections