× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7e0b3be81b5c0b4542e015e160bd151151d42e689cd69d0a1ec1e684497cbf80
File name: rdasrv.exe.ViR
Detection ratio: 20 / 41
Analysis date: 2012-07-11 19:38:02 UTC ( 6 years, 8 months ago ) View latest
Antivirus Result Update
AntiVir TR/Agent.117248.3 20120705
Avast Win32:Trojan-gen 20120705
BitDefender DeepScan:Generic.Malware.P!.DDD1FA69 20120705
Comodo UnclassifiedMalware 20120705
Emsisoft Trojan-Banker.Win32.Agent!IK 20120705
F-Secure DeepScan:Generic.Malware.P!.DDD1FA69 20120706
Fortinet PossibleThreat 20120705
GData DeepScan:Generic.Malware.P!.DDD1FA69 20120705
Ikarus Trojan-Banker.Win32.Agent 20120705
Jiangmin Trojan/Banker.Agent.bhj 20120705
K7AntiVirus Trojan 20120705
Kaspersky Trojan-Banker.Win32.Agent.fyn 20120705
McAfee Artemis!D9A3FB2BFAC8 20120706
McAfee-GW-Edition Artemis!D9A3FB2BFAC8 20120705
Norman W32/Suspicious_Gen.CJXH 20120705
Panda Trj/CI.A 20120705
Sophos AV Troj/Trackr-A 20120705
VBA32 TrojanBanker.Agent.fyn 20120705
VIPRE Trojan.Win32.Generic!BT 20120705
VirusBuster Trojan.Agent!iyvs6F+nLw8 20120705
Antiy-AVL 20120705
AVG 20120705
ByteHero 20120704
CAT-QuickHeal 20120705
ClamAV 20120705
Commtouch 20120705
DrWeb 20120706
eSafe 20120705
F-Prot 20120705
Microsoft 20120705
NOD32 20120705
nProtect 20120706
PCTools 20120705
Rising 20120705
SUPERAntiSpyware 20120705
Symantec 20120706
TheHacker 20120704
TotalDefense 20120705
TrendMicro 20120706
TrendMicro-HouseCall 20120705
ViRobot 20120705
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00018C28
Number of sections 8
PE sections
PE imports
CloseServiceHandle
RegCloseKey
StartServiceCtrlDispatcherA
OpenServiceA
SetServiceStatus
CreateServiceA
QueryServiceStatus
RegQueryValueExA
ControlService
DeleteService
RegOpenKeyExA
OpenSCManagerA
RegisterServiceCtrlHandlerA
GetLastError
EnumCalendarInfoA
GetStdHandle
EnterCriticalSection
lstrlenA
WaitForSingleObject
FreeLibrary
ExitProcess
GetThreadLocale
GetVersionExA
GetModuleFileNameA
RtlUnwind
DuplicateHandle
GetLocalTime
DeleteCriticalSection
GetStartupInfoA
GetDateFormatA
LoadLibraryExA
GetLocaleInfoA
LocalAlloc
OpenProcess
VirtualQueryEx
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
ReadProcessMemory
GetCommandLineA
GetProcAddress
GetCurrentThread
SuspendThread
SetFilePointer
RaiseException
CompareStringA
CloseHandle
WideCharToMultiByte
GetModuleHandleA
FindFirstFileA
FormatMessageA
WriteFile
GetCurrentProcess
ReadFile
ResetEvent
lstrcpynA
GetACP
GetDiskFreeSpaceA
GetCurrentThreadId
GetFullPathNameA
SetEvent
LocalFree
ResumeThread
InitializeCriticalSection
VirtualQuery
VirtualFree
CreateEventA
FindClose
InterlockedDecrement
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetStringTypeExA
GetVersion
LeaveCriticalSection
VirtualAlloc
GetFileSize
InterlockedIncrement
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
LoadStringA
CharLowerA
CharNextA
MessageBoxA
CharUpperA
GetKeyboardType
CharToOemA
Number of PE resources by type
RT_STRING 7
RT_RCDATA 2
Number of PE resources by language
NEUTRAL 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
98304

LinkerVersion
2.25

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x18c28

InitializedDataSize
17920

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 d9a3fb2bfac89fea2772c7a73a8422f2
SHA1 06a0f4ed13f31a4d291040ae09d0d136d6bb46c3
SHA256 7e0b3be81b5c0b4542e015e160bd151151d42e689cd69d0a1ec1e684497cbf80
ssdeep
3072:M28d4ti9UzpOBN9Hogg5LUSm4z2i4DQFu/U3buRKlemZ9DnGAekEBgtdecG/bGYi:dGj8ez+Ci4DQFu/U3buRKlemZ9DnGAeZ

authentihash 47737c3328139d61010e5d99b8ed3bef540d961f82e8d7ca18c529de6cdd3f60
imphash d98380415a9e01bc213802830c18c1ec
File size 114.5 KB ( 117248 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable Borland Delphi 7 (95.2%)
Win32 Executable Delphi generic (2.0%)
Win32 Dynamic Link Library (generic) (0.9%)
Win32 Executable (generic) (0.6%)
Win16/32 Executable Delphi generic (0.2%)
Tags
peexe

VirusTotal metadata
First submission 2009-04-07 07:05:04 UTC ( 9 years, 11 months ago )
Last submission 2017-05-11 02:43:22 UTC ( 1 year, 10 months ago )
File names aa
tu00eIuz.xltm
1342124457.rdasrv.exe.ViR
7e0b3be81b5c0b4542e015e160bd151151d42e689cd69d0a1ec1e684497cbf80.exe
7e0b3be81b5c0b4542e015e160bd151151d42e689cd69d0a1ec1e684497cbf80
vti-rescan
rdasrv.exe
rdasrv.exe.ViR
d9a3fb2bfac89fea2772c7a73a8422f2.virus
file-4242711_exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!