× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c5fb777ced8426d80b272779a8d5347b8626a411affa5aba4a9782b0ef2d5a72
File name: vt-upload-ZArhI
Detection ratio: 16 / 54
Analysis date: 2014-07-06 09:55:02 UTC ( 4 years, 8 months ago )
Antivirus Result Update
Ad-Aware Gen:Variant.Zusy.98046 20140706
AntiVir TR/Crypt.ZPACK.90764 20140706
AVG Zbot.LDD 20140706
BitDefender Gen:Variant.Zusy.98046 20140706
Emsisoft Gen:Variant.Zusy.98046 (B) 20140706
ESET-NOD32 Win32/Spy.Zbot.YW 20140706
F-Secure Gen:Variant.Zusy.98046 20140706
Fortinet W32/Zbot.TKPJ!tr 20140705
GData Gen:Variant.Zusy.98046 20140706
Kaspersky Trojan-Spy.Win32.Zbot.tkpj 20140706
Malwarebytes Spyware.Zbot.VXGen 20140706
eScan Gen:Variant.Zusy.98046 20140706
Panda Trj/Chgt.C 20140706
Sophos AV Mal/Generic-S 20140706
Tencent Win32.Trojan.Bp-qqthief.Iqpl 20140706
VIPRE Trojan.Win32.Generic!BT 20140706
AegisLab 20140706
Yandex 20140706
AhnLab-V3 20140706
Antiy-AVL 20140703
Avast 20140706
Baidu-International 20140706
Bkav 20140702
ByteHero 20140706
CAT-QuickHeal 20140706
ClamAV 20140706
CMC 20140706
Commtouch 20140706
Comodo 20140706
DrWeb 20140706
F-Prot 20140706
Ikarus 20140706
Jiangmin 20140706
K7AntiVirus 20140704
K7GW 20140704
Kingsoft 20140706
McAfee 20140706
McAfee-GW-Edition 20140706
Microsoft 20140706
NANO-Antivirus 20140706
Norman 20140706
nProtect 20140706
Qihoo-360 20140706
Rising 20140706
SUPERAntiSpyware 20140706
Symantec 20140706
TheHacker 20140704
TotalDefense 20140706
TrendMicro 20140706
TrendMicro-HouseCall 20140706
VBA32 20140706
ViRobot 20140706
Zillya 20140706
Zoner 20140704
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
MetaQuotes Software Corp. All rights reserved.

Publisher MetaQuotes Software Corp.
Product graphics terminal
Original name MT Tick Graphics Terminal
Internal name MT Tick
File version 1.0.6.3
Description MT Tick Graphics Terminal
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-07-01 15:46:14
Entry Point 0x00003F0B
Number of sections 4
PE sections
PE imports
InitializeAcl
GetSecurityInfo
LookupAccountSidA
CreateToolbarEx
InitCommonControlsEx
GetSaveFileNameW
GetDeviceCaps
GetCharWidth32A
SelectObject
GetStockObject
CreateCompatibleDC
GetBkColor
GetLastError
TlsGetValue
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
lstrlenA
LoadLibraryW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
IsProcessorFeaturePresent
HeapAlloc
GetCurrentProcess
GetStartupInfoW
GetFileType
GetConsoleMode
DecodePointer
LocalAlloc
UnhandledExceptionFilter
IsValidCodePage
GetCPInfo
GetSystemDefaultLCID
GetCPInfoExA
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
CreateDirectoryW
GetCommandLineA
GetProcAddress
EncodePointer
GetProcessHeap
SetStdHandle
GetModuleFileNameW
CompareStringW
RaiseException
WideCharToMultiByte
MapViewOfFile
TlsFree
SetFilePointer
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteFile
HeapSetInformation
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
LocalFree
TerminateProcess
GetLogicalDriveStringsA
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapCreate
CreateFileW
GlobalAlloc
InterlockedDecrement
Sleep
SetLastError
EnumDateFormatsA
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
InterlockedIncrement
GetCurrentProcessId
WriteConsoleW
LeaveCriticalSection
WNetGetUniversalNameA
GetErrorInfo
SysFreeString
SysAllocString
GetMappedFileNameA
UuidCreate
SHBrowseForFolderW
SHGetPathFromIDListW
Ord(16)
SHGetDesktopFolder
SHGetMalloc
SHFileOperationA
GetMessagePos
GetParent
UpdateWindow
HideCaret
TrackMouseEvent
IsWindow
AppendMenuA
GetWindowRect
MoveWindow
MessageBoxA
GetWindowDC
SetWindowLongA
ChildWindowFromPoint
GetSysColor
GetDC
ReleaseDC
CreatePopupMenu
SendMessageW
GetWindowLongA
IsWindowVisible
SendMessageA
GetClientRect
CreateWindowExA
GetDlgItem
MessageBoxW
GetSubMenu
CreateMenu
GetClassNameW
FillRect
SetWindowTextW
LoadImageA
LoadIconW
GetMenuItemInfoA
Number of PE resources by type
RT_MANIFEST 1
RT_DIALOG 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 2
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
171008

ImageVersion
0.0

ProductName
graphics terminal

FileVersionNumber
1.0.6.3

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
MT Tick Graphics Terminal

CharacterSet
Unicode

LinkerVersion
10.0

OriginalFilename
MT Tick Graphics Terminal

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.6.3

TimeStamp
2014:07:01 16:46:14+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
MT Tick

FileAccessDate
2014:07:06 10:55:58+01:00

ProductVersion
1.0.6.3

SubsystemVersion
5.1

OSVersion
5.1

FileCreateDate
2014:07:06 10:55:58+01:00

FileOS
Windows NT 32-bit

LegalCopyright
MetaQuotes Software Corp. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
MetaQuotes Software Corp.

CodeSize
88064

FileSubtype
0

ProductVersionNumber
1.0.6.3

EntryPoint
0x3f0b

ObjectFileType
Executable application

File identification
MD5 dbc3c4a5b8efc3b4dec110296ed8723b
SHA1 bdff7a3e0e70592b0b2e51466cb800316af4da8a
SHA256 c5fb777ced8426d80b272779a8d5347b8626a411affa5aba4a9782b0ef2d5a72
ssdeep
6144:AQFoDdJ2p7+UQjHrtJrQJyqLPrknWYpYLZgDBJBc6OM:AvDdsp7+BjHrt1oy+QWYp2Zu5

imphash cf34d4a0012880ef0aa9a2d3450f7e78
File size 254.0 KB ( 260096 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2014-07-06 09:55:02 UTC ( 4 years, 8 months ago )
Last submission 2014-07-06 09:55:02 UTC ( 4 years, 8 months ago )
File names MT Tick
vt-upload-ZArhI
MT Tick Graphics Terminal
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.