× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7ebf5572e51fe7d5ba9969c77b3fa093b159c55b24d1b9963cf7187e9338678
File name: vti-rescan
Detection ratio: 51 / 55
Analysis date: 2014-11-14 12:32:15 UTC ( 5 months, 1 week ago )
Antivirus Result Update
AVG Agent_r.BVF 20141114
AVware Trojan-Downloader.Win32.Dofoil 20141114
Ad-Aware Trojan.GenericKD.1013158 20141114
Agnitum Backdoor.Androm!bkprNnc7ELM 20141113
AhnLab-V3 Trojan/Win32.CProtection 20141113
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20141114
Avast Win32:Carberp-AQI [Cryp] 20141114
Avira TR/Spy.ZBot.HJ 20141114
Baidu-International Backdoor.Win32.Androm.APgs 20141107
BitDefender Trojan.GenericKD.1013158 20141114
Bkav W32.Clod4fa.Trojan.5a9b 20141114
CAT-QuickHeal Backdoor.Androm.ra 20141114
CMC Backdoor.Win32.Androm!O 20141114
Comodo TrojWare.Win32.Kryptik.BCBX 20141114
Cyren W32/Trojan.DRKD-6365 20141114
DrWeb BackDoor.Tishop.52 20141114
ESET-NOD32 Win32/TrojanDownloader.Zurgop.AW 20141114
Emsisoft Trojan.GenericKD.1013158 (B) 20141114
F-Prot W32/Trojan3.FIG 20141114
F-Secure Trojan.GenericKD.1013158 20141114
Fortinet W32/Zbot.LP 20141114
GData Trojan.GenericKD.1013158 20141114
Ikarus Trojan.Injector 20141114
Jiangmin Backdoor/Androm.oi 20141113
K7AntiVirus Trojan ( 0001140e1 ) 20141113
K7GW Trojan ( 0001140e1 ) 20141113
Kaspersky Backdoor.Win32.Androm.sed 20141114
Kingsoft Win32.Hack.Androm.s.(kcloud) 20141114
Malwarebytes Rootkit.0Access.ED 20141114
McAfee Generic.pn 20141114
McAfee-GW-Edition BehavesLike.Win32.ZeroAccess.kc 20141114
MicroWorld-eScan Trojan.GenericKD.1013158 20141114
Microsoft TrojanDownloader:Win32/Dofoil.R 20141114
NANO-Antivirus Trojan.Win32.Androm.bstmeq 20141114
Norman Dorkbot.HFC 20141114
Panda Trj/Agent.IVN 20141114
Qihoo-360 HEUR/Malware.QVM20.Gen 20141114
Rising PE:Trojan.Win32.Generic.14AB5706!346773254 20141113
Sophos Mal/Zbot-LP 20141114
Symantec Trojan Horse 20141114
Tencent Win32.Backdoor.Androm.Pdmi 20141114
TheHacker Trojan/Downloader.Zurgop.aw 20141111
TotalDefense Win32/Dofoil.MQ 20141114
TrendMicro BKDR_ANDROM.AF 20141114
TrendMicro-HouseCall BKDR_ANDROM.AF 20141114
VBA32 BScope.Trojan.Skipe.3013 20141114
VIPRE Trojan-Downloader.Win32.Dofoil 20141114
ViRobot Trojan.Win32.Agent.62464.X 20141114
Zillya Backdoor.Androm.Win32.756 20141113
Zoner Trojan.Zurgop.AW 20141112
nProtect Backdoor/W32.Androm.62464.B 20141114
AegisLab 20141114
ByteHero 20141114
ClamAV 20141114
SUPERAntiSpyware 20141114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-23 20:24:24
Link date 9:24 PM 12/23/2012
Entry Point 0x000043A9
Number of sections 10
PE sections
PE imports
CreatePatternBrush
GetTickCount
IsDBCSLeadByte
GetTempPathA
lstrcmpiA
PathIsNetworkPathW
PathIsFileSpecW
UrlCompareA
StrChrIW
StrStrW
PathIsRelativeW
PE exports
Number of PE resources by type
RT_ACCELERATOR 5
WEVT_TEMPLATE 1
Number of PE resources by language
ENGLISH US 6
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:12:23 21:24:24+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
29184

LinkerVersion
40.31

FileAccessDate
2014:11:14 13:28:24+01:00

EntryPoint
0x43a9

InitializedDataSize
32256

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
13.6

FileCreateDate
2014:11:14 13:28:24+01:00

UninitializedDataSize
0

File identification
MD5 4e148480749937acef8a7d9bc0b3c8b5
SHA1 f275e0e78c32992ba0ab5f25b15a887404be1848
SHA256 a7ebf5572e51fe7d5ba9969c77b3fa093b159c55b24d1b9963cf7187e9338678
ssdeep
1536:qFHZt2hESlZlV1spIM1GENghGoEzibJwErqlVYntL:QqNlZDG2M1GEbzzAJfrL

authentihash c0c5820e11198cc38a0381fe3befecbb2e92e0b1d02997ad11263eed8308e3d4
imphash 857ceb81eb0db2fc35661940b0942f45
File size 61.0 KB ( 62464 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-28 09:30:13 UTC ( 1 year, 11 months ago )
Last submission 2013-09-18 07:12:03 UTC ( 1 year, 7 months ago )
File names IMG 9857648740.JPEG.exe
vt-upload-2QRTf
vti-rescan
file-5529420_
IMG.JPEG.exe
effdec4d00acd6cc3db029775badafd63dbcdfd6
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created processes
Opened mutexes
Runtime DLLs
UDP communications