× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4be99fdcc05ad6d74160505b5fd1f62def038569fd1bb4ec09f6c2caba1bd074
File name: vti-rescan
Detection ratio: 29 / 50
Analysis date: 2014-03-06 10:31:15 UTC ( 1 month, 1 week ago )
Antivirus Result Update
AVG Delf.ALZZ 20140305
Ad-Aware Trojan.Generic.9503959 20140306
AhnLab-V3 Win-Trojan/Agent.241664.HH 20140305
AntiVir TR/Spy.241664.397 20140306
Avast Win32:Malware-gen 20140306
Baidu-International Trojan.Win32.DelFiles.NAX 20140306
BitDefender Trojan.Generic.9503959 20140306
Bkav W32.Clodc22.Trojan.3693 20140305
Comodo UnclassifiedMalware 20140306
DrWeb Trojan.KillDisk.421 20140306
ESET-NOD32 Win32/DelFiles.NAX 20140306
Emsisoft Trojan.Generic.9503959 (B) 20140306
F-Secure Trojan.Generic.9503959 20140306
Fortinet W32/INJECTO.MBF!tr 20140306
GData Trojan.Generic.9503959 20140306
Ikarus Trojan.Win32.Spy 20140306
McAfee Artemis!E823221609B3 20140306
McAfee-GW-Edition Artemis!E823221609B3 20140306
MicroWorld-eScan Trojan.Generic.9503959 20140306
NANO-Antivirus Trojan.Win32.KillDisk.cpxvwt 20140306
Norman Suspicious_Gen5.QGAP 20140306
Panda Trj/CI.A 20140306
Sophos Mal/Generic-S 20140306
Symantec Trojan Horse 20140306
TrendMicro TROJ_KILLMBR.DF 20140306
TrendMicro-HouseCall TROJ_KILLMBR.DF 20140306
VIPRE Trojan.Win32.Generic!BT 20140306
ViRobot Trojan.Win32.S.Agent.241664.O 20140306
nProtect Trojan/W32.Agent.241664.ACQ 20140306
Agnitum 20140305
Antiy-AVL 20140306
ByteHero 20140306
CAT-QuickHeal 20140306
CMC 20140228
ClamAV 20140305
Commtouch 20140306
F-Prot 20140306
Jiangmin 20140306
K7AntiVirus 20140305
K7GW 20140305
Kaspersky 20140306
Kingsoft 20140306
Malwarebytes 20140306
Microsoft 20140306
Qihoo-360 20140306
Rising 20140306
SUPERAntiSpyware 20140306
TheHacker 20140305
TotalDefense 20140306
VBA32 20140305
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-19 23:57:06
Link date 12:57 AM 3/20/2013
Entry Point 0x00003DDD
Number of sections 4
PE sections
PE imports
CloseServiceHandle
RegOpenKeyA
RegCloseKey
StartServiceCtrlDispatcherA
OpenServiceA
SetServiceStatus
CreateServiceA
RegSetValueExA
ControlService
StartServiceA
ChangeServiceConfig2A
OpenSCManagerA
RegisterServiceCtrlHandlerA
GetStdHandle
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLogicalDrives
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
MoveFileA
InitializeCriticalSection
FindClose
InterlockedDecrement
SetLastError
GetSystemTime
CopyFileA
HeapAlloc
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
SetFilePointer
CreateThread
SetUnhandledExceptionFilter
SetEnvironmentVariableA
TerminateProcess
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
GetExitCodeProcess
GetTickCount
IsBadWritePtr
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
DeleteFileA
GetWindowsDirectoryA
GetProcAddress
CompareStringW
FindFirstFileA
CompareStringA
GetTempFileNameA
FindNextFileA
WaitForMultipleObjects
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
SizeofResource
LockResource
WideCharToMultiByte
GetCommandLineA
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetVersion
GetEnvironmentStrings
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
SHGetSpecialFolderPathA
PathFindExtensionA
StrStrIA
PathCombineA
PathAppendA
Number of PE resources by type
HTML_DATA 5
Number of PE resources by language
KOREAN 5
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:03:20 00:57:06+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
40960

LinkerVersion
6.0

FileAccessDate
2014:03:06 11:29:52+01:00

EntryPoint
0x3ddd

InitializedDataSize
466944

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

FileCreateDate
2014:03:06 11:29:52+01:00

UninitializedDataSize
0

File identification
MD5 e823221609b37e99fbbce5b493a02f68
SHA1 5161018dc06b4129d095f10760aaa4a90565c134
SHA256 4be99fdcc05ad6d74160505b5fd1f62def038569fd1bb4ec09f6c2caba1bd074
ssdeep
6144:jtsAv00nSOqoWBfEC43LZINuOB/+S1sQClPtdCQ+L1EEtdCQ:CAbVqoEfP4b7NsC5dENd

imphash 7d20c1f12b38a54c6f3b13a9d9800c16
File size 236.0 KB ( 241664 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2013-03-20 18:44:00 UTC ( 1 year ago )
Last submission 2013-03-26 16:53:58 UTC ( 1 year ago )
File names vti-rescan
cmsvrts.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files