× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 70475d6316fef7415a435effbab92951fb41fd09dbdbf287c298b7e0fe6e6c7f
File name: rtg101.exe
Detection ratio: 23 / 47
Analysis date: 2013-11-03 11:31:14 UTC ( 4 years, 6 months ago )
Antivirus Result Update
Yandex Trojan.Xtrat!RShOFrM0TYE 20131102
AhnLab-V3 Spyware/Win32.Zbot 20131102
AntiVir TR/Graftor.120461.1 20131103
AVG PSW.Generic12.HBQ 20131102
BitDefender Gen:Variant.Graftor.120461 20131103
Emsisoft Gen:Variant.Graftor.120461 (B) 20131103
ESET-NOD32 a variant of Win32/Injector.APXD 20131103
F-Secure Gen:Variant.Graftor.120461 20131103
Fortinet W32/Zbot.GMG!tr 20131103
GData Gen:Variant.Graftor.120461 20131103
Kaspersky Trojan.Win32.Xtrat.eix 20131101
Kingsoft Win32.Troj.Xtrat.e.(kcloud) 20130829
Malwarebytes Trojan.Zbot 20131103
McAfee PWSZbot-FKQ!B51149B3F2B8 20131103
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.B 20131103
Microsoft VirTool:Win32/CeeInject.gen!KK 20131103
Norman Suspicious_Gen4.FGDIG 20131103
Panda Suspicious file 20131102
Sophos AV Troj/Zbot-GMG 20131103
Symantec Suspicious.Cloud.5 20131103
TrendMicro TSPY_ZBOT.SMZ5 20131103
TrendMicro-HouseCall TSPY_ZBOT.SMZ5 20131103
VIPRE Trojan.Win32.Generic!BT 20131103
Antiy-AVL 20131101
Avast 20131103
Baidu-International 20131103
Bkav 20131102
ByteHero 20131028
CAT-QuickHeal 20131103
ClamAV 20131103
Commtouch 20131103
Comodo 20131103
DrWeb 20131103
F-Prot 20131103
Ikarus 20131103
Jiangmin 20131103
K7AntiVirus 20131101
K7GW 20131101
eScan 20131028
NANO-Antivirus 20131103
nProtect 20131101
Rising 20131101
SUPERAntiSpyware 20131102
TheHacker 20131029
TotalDefense 20131101
VBA32 20131102
ViRobot 20131102
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
PEiD InstallShield 2000
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-10-29 14:24:01
Entry Point 0x000068D0
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
CreateFontIndirectW
GetCPInfo
GetModuleFileNameW
GetCurrentProcessId
GetSystemDirectoryW
CreateFileW
Beep
LCMapStringA
GetEnvironmentStringsW
GetTickCount
GetStartupInfoW
FreeEnvironmentStringsW
FindNextFileA
GetModuleFileNameA
GetModuleHandleW
Ord(3820)
Ord(4525)
Ord(2112)
Ord(6113)
Ord(4621)
Ord(3917)
Ord(6332)
Ord(354)
Ord(2980)
Ord(6371)
Ord(1971)
Ord(2438)
Ord(5237)
Ord(665)
Ord(4073)
Ord(6048)
Ord(5996)
Ord(5278)
Ord(5257)
Ord(3733)
Ord(5736)
Ord(4589)
Ord(5236)
Ord(4523)
Ord(5727)
Ord(3744)
Ord(4420)
Ord(4616)
Ord(3167)
Ord(5298)
Ord(2873)
Ord(4718)
Ord(4717)
Ord(4852)
Ord(1569)
Ord(4539)
Ord(6370)
Ord(815)
Ord(366)
Ord(3257)
Ord(2717)
Ord(641)
Ord(5233)
Ord(3449)
Ord(2388)
Ord(4532)
Ord(5256)
Ord(338)
Ord(4343)
Ord(2502)
Ord(3076)
Ord(3345)
Ord(4233)
Ord(1739)
Ord(4430)
Ord(3142)
Ord(3060)
Ord(3193)
Ord(5285)
Ord(4617)
Ord(1165)
Ord(2486)
Ord(617)
Ord(4154)
Ord(4604)
Ord(5710)
Ord(5276)
Ord(4146)
Ord(4401)
Ord(2874)
Ord(4440)
Ord(4480)
Ord(4335)
Ord(4692)
Ord(2619)
Ord(1767)
Ord(2371)
Ord(975)
Ord(4607)
Ord(4229)
Ord(823)
Ord(2047)
Ord(4537)
Ord(4958)
Ord(5286)
Ord(813)
Ord(2504)
Ord(4677)
Ord(5867)
Ord(5006)
Ord(800)
Ord(5157)
Ord(4298)
Ord(6051)
Ord(5261)
Ord(3074)
Ord(2613)
Ord(3592)
Ord(4609)
Ord(4884)
Ord(4459)
Ord(554)
Ord(4381)
Ord(4585)
Ord(2977)
Ord(2116)
Ord(4418)
Ord(2641)
Ord(1834)
Ord(4268)
Ord(3053)
Ord(796)
Ord(674)
Ord(4831)
Ord(5070)
Ord(2618)
Ord(1089)
Ord(2527)
Ord(5573)
Ord(6076)
Ord(2715)
Ord(4426)
Ord(3398)
Ord(4955)
Ord(4688)
Ord(4414)
Ord(4269)
Ord(4992)
Ord(5297)
Ord(4608)
Ord(4461)
Ord(520)
Ord(4817)
Ord(3743)
Ord(986)
Ord(2377)
Ord(4893)
Ord(3825)
Ord(4419)
Ord(4606)
Ord(4074)
Ord(1719)
Ord(2640)
Ord(2109)
Ord(5180)
Ord(4421)
Ord(807)
Ord(4520)
Ord(3254)
Ord(2506)
Ord(4947)
Ord(3341)
Ord(4237)
Ord(4451)
Ord(5273)
Ord(2971)
Ord(2534)
Ord(1817)
Ord(4347)
Ord(5248)
Ord(1658)
Ord(324)
Ord(560)
Ord(2391)
Ord(1937)
Ord(4158)
Ord(1768)
Ord(4704)
Ord(3793)
Ord(5097)
Ord(3826)
Ord(5193)
Ord(4847)
Ord(5468)
Ord(1720)
Ord(4075)
Ord(652)
Ord(5094)
Ord(3313)
Ord(1131)
Ord(4768)
Ord(2546)
Ord(4435)
Ord(5303)
Ord(4518)
Ord(6171)
Ord(5208)
Ord(4583)
Ord(561)
Ord(3054)
Ord(5296)
Ord(6372)
Ord(3131)
Ord(825)
Ord(5059)
Ord(6211)
Ord(4072)
Ord(4103)
Ord(529)
Ord(4370)
Ord(296)
Ord(5649)
Ord(5239)
Ord(4458)
Ord(2382)
Ord(4690)
_except_handler3
__p__fmode
__CxxFrameHandler
__wgetmainargs
_exit
__p__commode
__setusermatherr
__dllonexit
_onexit
exit
_XcptFilter
__p__wcmdln
_initterm
_controlfp
_adjust_fdiv
__set_app_type
MessageBoxW
UpdateWindow
EnableWindow
IsWindow
GetDlgItemTextA
GetDlgItemTextW
GetWindowPlacement
DestroyWindow
Number of PE resources by type
RT_STRING 13
RT_DIALOG 1
Struct(241) 1
RT_MENU 1
AVI 1
RT_ACCELERATOR 1
RT_BITMAP 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2013:10:29 15:24:01+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24064

LinkerVersion
5.0

EntryPoint
0x68d0

InitializedDataSize
439808

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 b51149b3f2b8a9ce3b7e3ee67c784055
SHA1 e767319834e6ddfe5a5ec4a99a51b69273ef6ac4
SHA256 70475d6316fef7415a435effbab92951fb41fd09dbdbf287c298b7e0fe6e6c7f
ssdeep
12288:Gz+PFD7ZGmigJlQSPO6/qIWwLkDrBSAthtg6AF7uMotoWRzaWxY:5dZHXQMWwLkDVthC6AOtLJY

File size 454.0 KB ( 464896 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 4.x (88.6%)
Win32 Dynamic Link Library (generic) (4.3%)
Win32 Executable (generic) (2.9%)
Win16/32 Executable Delphi generic (1.3%)
Generic Win/DOS Executable (1.3%)
Tags
peexe installshield

VirusTotal metadata
First submission 2013-10-31 07:45:49 UTC ( 4 years, 6 months ago )
Last submission 2013-11-03 11:31:14 UTC ( 4 years, 6 months ago )
File names 70475d6316fef7415a435effbab92951fb41fd09dbdbf287c298b7e0fe6e6c7f
aa
Qk4uJY3g.vbs
rtg101.exe
output.16630289.txt
pZJ4UPzf.lnk
16630289
30276
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.