× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5d7ae00803c7897f75550629e52fe5500dc15f715b14968fa9b29bc8869f86e7
File name: vti-rescan
Detection ratio: 37 / 46
Analysis date: 2012-12-03 09:23:43 UTC ( 6 years, 3 months ago ) View latest
Antivirus Result Update
Yandex Trojan.PWS.Agent!oG9LUK+WC5E 20121202
AntiVir TR/Agent.117248.18 20121203
Avast Win32:Malware-gen 20121203
AVG Generic26.LDI 20121203
BitDefender DeepScan:Generic.Malware.P!.5936F6C7 20121203
CAT-QuickHeal TrojanBanker.Agent.fyn 20121203
Commtouch W32/Backdoor2.HMYA 20121203
Comodo UnclassifiedMalware 20121203
DrWeb Trojan.Click2.26269 20121203
Emsisoft DeepScan:Generic.Malware.P!.5936F6C7 (B) 20121203
eSafe Win32.TRAgent 20121202
ESET-NOD32 probably a variant of Win32/Spy.Banker.CPNRGDZ 20121202
F-Prot W32/Backdoor2.HMYA 20121202
F-Secure DeepScan:Generic.Malware.P!.5936F6C7 20121203
Fortinet W32/Trackr.HHO!tr 20121203
GData DeepScan:Generic.Malware.P!.5936F6C7 20121203
Ikarus Trojan-Banker.Win32.Agent 20121203
Jiangmin Trojan/Banker.Agent.bhj 20121203
K7AntiVirus Trojan 20121130
Kaspersky Trojan-Banker.Win32.Agent.fyn 20121203
Kingsoft VIRUS_UNKNOWN 20121119
McAfee Artemis!E0BB21EE1E84 20121203
McAfee-GW-Edition Artemis!E0BB21EE1E84 20121203
Microsoft Trojan:Win32/Bumat!rts 20121203
eScan DeepScan:Generic.Malware.P!.5936F6C7 20121203
NANO-Antivirus Trojan.Win32.Agent2.bbarfi 20121203
Norman W32/Suspicious_Gen2.TXWWC 20121203
Panda Trj/Banker.KRZ 20121202
PCTools Trojan.ADH 20121203
Sophos AV Troj/Trackr-Gen 20121203
SUPERAntiSpyware Trojan.Agent/Gen-Small 20121202
Symantec Infostealer.Bancos 20121203
TrendMicro TROJ_BANKER.QPA 20121203
TrendMicro-HouseCall TROJ_BANKER.QPA 20121203
VBA32 TrojanBanker.Agent.fyn 20121130
VIPRE Trojan.Win32.Generic!BT 20121203
ViRobot Trojan.Win32.A.Agent.152274 20121203
AhnLab-V3 20121203
Antiy-AVL 20121202
ByteHero 20121130
ClamAV 20121202
Malwarebytes 20121203
nProtect 20121203
Rising 20121203
TheHacker 20121202
TotalDefense 20121202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
Command RAR
F-PROT appended, RAR, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-03-02 07:40:24
Entry Point 0x0000B4B5
Number of sections 5
PE sections
Overlays
MD5 9fe89ae91a3229a5e75623802c7df9bb
File type application/x-rar
Offset 98816
Size 53458
Entropy 7.99
PE imports
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityA
RegQueryValueExW
Ord(17)
InitCommonControlsEx
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
SetFilePointer
GetSystemTime
GetLastError
HeapFree
GetStdHandle
SystemTimeToFileTime
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
FindNextFileA
CompareStringW
HeapAlloc
SetFileTime
IsDBCSLeadByte
GetCommandLineW
GetFileAttributesW
GetCurrentProcess
FileTimeToLocalFileTime
MoveFileW
OpenFileMappingW
SetFileAttributesA
GetDateFormatW
CreateDirectoryA
DeleteFileA
GetCPInfo
ExitProcess
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
WriteFile
SetFileAttributesW
DosDateTimeToFileTime
CloseHandle
WideCharToMultiByte
MapViewOfFile
MoveFileExW
ExpandEnvironmentStringsW
FindNextFileW
SetEndOfFile
GetFileAttributesA
GetTempPathW
FindFirstFileA
FindFirstFileW
HeapReAlloc
GetModuleHandleW
GetFullPathNameA
GetCurrentDirectoryW
LoadLibraryW
SetCurrentDirectoryW
UnmapViewOfFile
FindResourceW
CreateFileW
GlobalAlloc
LocalFileTimeToFileTime
FindClose
Sleep
GetFileType
GetFullPathNameW
CreateFileA
GetTickCount
GetLocaleInfoW
GetNumberFormatW
SetLastError
CompareStringA
VariantInit
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
SetFocus
MapWindowPoints
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
CopyRect
GetWindowTextW
GetMessageW
ShowWindow
GetSystemMetrics
SetWindowPos
wvsprintfW
CharToOemBuffA
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
CharToOemBuffW
wvsprintfA
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
SetWindowTextW
GetDlgItem
GetWindow
MessageBoxW
DispatchMessageW
GetClassNameW
PeekMessageW
CharUpperA
OemToCharA
EnableWindow
GetClientRect
WaitForInputIdle
OemToCharBuffA
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
OleUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
Number of PE resources by type
RT_DIALOG 6
RT_STRING 5
RT_ICON 4
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2011:03:02 08:40:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
72192

LinkerVersion
9.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0xb4b5

InitializedDataSize
90624

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 e0bb21ee1e846eab1ebbe901d6ce62a7
SHA1 57179a79c035405fd7be7cd95f60dafb94cc8b09
SHA256 5d7ae00803c7897f75550629e52fe5500dc15f715b14968fa9b29bc8869f86e7
ssdeep
3072:ptFw8wzBh6/WBUJ0T5mLUryke8lesZ4BpgzWc4VjbK7t:DFw8wzBhaEUJ45mnkrlgSkVjbK7t

authentihash ee47f04966a25df12c7eadebd06b6783ed082ff155b03e3fb3f8bfc0996b6ff3
imphash dbb1eb5c3476069287a73206929932fd
File size 148.7 KB ( 152274 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID WinRAR Self Extracting archive (4.x-5.x) (91.4%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win64 Executable (generic) (3.0%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Tags
peexe overlay

VirusTotal metadata
First submission 2011-12-04 09:41:42 UTC ( 7 years, 3 months ago )
Last submission 2016-08-18 12:51:09 UTC ( 2 years, 7 months ago )
File names MvIw.tar.bz2
57179a79c035405fd7be7cd95f60dafb94cc8b09.bin
DPE-000003.exe
5d7ae00803c7897f75550629e52fe5500dc15f715b14968fa9b29bc8869f86e7.exe
e0bb21ee1e846eab1ebbe901d6ce62a7
vti-rescan
file-3216549_exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspici.B0F0024D.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs
UDP communications