× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 68aadcf93a28f2427cf27fb70b457d70ec3fed48b34df06c429cd1f530102f67
File name: vti-rescan
Detection ratio: 33 / 57
Analysis date: 2015-04-15 19:42:08 UTC ( 4 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.2295794 20150415
AhnLab-V3 Trojan/Win32.Drixed 20150415
Antiy-AVL VCS/Instruction.PEEPOCheck 20150415
Avast Win32:Malware-gen 20150415
AVG Inject2.BYFB 20150415
Avira (no cloud) TR/Crypt.Xpack.186510 20150415
AVware Win32.Malware!Drop 20150415
Baidu-International Worm.Win32.Cridex.qcd 20150415
BitDefender Trojan.GenericKD.2295794 20150415
DrWeb Trojan.Dridex.92 20150415
Emsisoft Trojan.GenericKD.2295794 (B) 20150415
ESET-NOD32 Win32/Exploit.CVE-2013-3660.N 20150415
F-Secure Trojan.GenericKD.2295794 20150415
GData Trojan.GenericKD.2295794 20150415
Ikarus Trojan.Win32.Dridex 20150415
K7AntiVirus Exploit ( 004bd5301 ) 20150415
K7GW Exploit ( 004bd5301 ) 20150415
Kaspersky Worm.Win32.Cridex.qcd 20150415
Malwarebytes Trojan.Agent.EDG 20150415
McAfee Downloader-FANV!E46DCC4A4954 20150415
McAfee-GW-Edition Downloader-FANV!E46DCC4A4954 20150415
eScan Trojan.GenericKD.2295794 20150415
nProtect Worm/W32.Cridex.149504 20150415
Panda Generic Suspicious 20150415
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20150415
Rising PE:Malware.XPACK-LNR/Heur!1.5594 20150415
Sophos AV Troj/Agent-AMLZ 20150415
Symantec Trojan.Gen.SMH 20150415
Tencent Trojan.Win32.YY.Gen.4 20150415
TrendMicro TROJ_INJECTOR.YYVT 20150415
TrendMicro-HouseCall TROJ_INJECTOR.YYVT 20150415
VIPRE Win32.Malware!Drop 20150415
ViRobot Trojan.Win32.Injector.149504[h] 20150415
AegisLab 20150415
Yandex 20150414
Alibaba 20150415
ALYac 20150415
Bkav 20150415
ByteHero 20150415
CAT-QuickHeal 20150415
ClamAV 20150415
CMC 20150413
Comodo 20150415
Cyren 20150415
F-Prot 20150415
Fortinet 20150415
Jiangmin 20150414
Kingsoft 20150415
Microsoft 20150415
NANO-Antivirus 20150415
Norman 20150415
SUPERAntiSpyware 20150415
TheHacker 20150415
TotalDefense 20150415
VBA32 20150415
Zillya 20150415
Zoner 20150413
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Корпорация Майкрософт. Все права защищены.

Product Операционная система Microsoft® Windows®
Original name MMFUtil.exe
Internal name MMFUtil.exe
File version 5.1.2601.5512 (xpsp.080413-2108)
Description WMI Snapin Helpers
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-04-14 06:50:31
Entry Point 0x00001078
Number of sections 11
PE sections
PE imports
JetRestore2
ExitThread
SetupGetLineTextW
isalpha
sin
Number of PE resources by type
RT_STRING 3
RT_DIALOG 1
AVI 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 6
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
115712

ImageVersion
0.0

ProductName
Microsoft Windows

FileVersionNumber
5.1.2601.5512

LanguageCode
Russian

FileFlagsMask
0x003f

FileDescription
WMI Snapin Helpers

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
MMFUtil.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
5.1.2601.5512 (xpsp.080413-2108)

TimeStamp
2015:04:14 07:50:31+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
MMFUtil.exe

ProductVersion
5.1.2601.5512

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
. .

MachineType
Intel 386 or later, and compatibles

CodeSize
52224

FileSubtype
0

ProductVersionNumber
5.1.2601.5512

EntryPoint
0x1078

ObjectFileType
Dynamic link library

PCAP parents
File identification
MD5 e46dcc4a49547b547f357a948337b929
SHA1 a3886bc1ce84a6842be114ff553809dcc0368648
SHA256 68aadcf93a28f2427cf27fb70b457d70ec3fed48b34df06c429cd1f530102f67
ssdeep
1536:Ib+uQfrz2v69QsVCB7a2Kyqjz0Q67c8hPJtJ8GQS9+uzHDiohwI8HXaFis:IYCsMB2WVQ67Bp8nS9+upeI8HXa8s

authentihash f2535df38acd5358871655a8d9caefa44eabc20ed8fe0b9e82b0a3009cb608d4
imphash 6384d6d488c18982af7e30e62ca0af0d
File size 146.0 KB ( 149504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe cve-2013-3660 exploit via-tor

VirusTotal metadata
First submission 2015-04-14 07:41:11 UTC ( 4 years, 1 month ago )
Last submission 2015-11-09 21:40:33 UTC ( 3 years, 6 months ago )
File names stepk1.6a.exe
e46dcc4a49547b547f357a948337b929.bin
053.exe
VirusShare_e46dcc4a49547b547f357a948337b929
stepk1.3a.exe
e46dcc4a49547b547f357a948337b929
MMFUtil.exe
_mvbtD.png
053_exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications