× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: eccd4113d5980802ff4c407f97ffca9a6280f09d680bd3b76f7ad22d8fc734c5
File name: vti-rescan
Detection ratio: 13 / 55
Analysis date: 2015-07-27 08:45:16 UTC ( 3 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware Gen:Variant.Kazy.692793 20150727
Arcabit Trojan.Kazy.DA9239 20150727
BitDefender Gen:Variant.Kazy.692793 20150727
Emsisoft Gen:Variant.Kazy.692793 (B) 20150727
ESET-NOD32 a variant of Win32/Kryptik.DRHI 20150727
F-Secure Gen:Variant.Kazy.692793 20150727
Fortinet W32/Kryptik.DRHI!tr 20150727
GData Gen:Variant.Kazy.692793 20150727
Kaspersky Trojan-Spy.Win32.Zbot.vthb 20150727
McAfee-GW-Edition BehavesLike.Win32.Fujacks.dm 20150726
eScan Gen:Variant.Kazy.692793 20150727
Qihoo-360 HEUR/QVM19.1.Malware.Gen 20150727
Tencent Win32.Trojan.Kazy.Pefr 20150727
AegisLab 20150727
Yandex 20150726
AhnLab-V3 20150726
Alibaba 20150724
ALYac 20150727
Antiy-AVL 20150727
Avast 20150727
AVG 20150727
Avira (no cloud) 20150726
AVware 20150727
Baidu-International 20150727
Bkav 20150727
ByteHero 20150727
CAT-QuickHeal 20150727
ClamAV 20150726
Comodo 20150727
Cyren 20150727
DrWeb 20150727
F-Prot 20150727
Ikarus 20150727
Jiangmin 20150726
K7AntiVirus 20150727
K7GW 20150727
Kingsoft 20150727
Malwarebytes 20150727
McAfee 20150727
Microsoft 20150727
NANO-Antivirus 20150727
nProtect 20150723
Panda 20150726
Rising 20150722
Sophos AV 20150727
SUPERAntiSpyware 20150727
Symantec 20150727
TheHacker 20150723
TrendMicro 20150727
TrendMicro-HouseCall 20150727
VBA32 20150725
VIPRE 20150727
ViRobot 20150727
Zillya 20150727
Zoner 20150727
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-04-03 03:51:26
Entry Point 0x00001000
Number of sections 14
PE sections
Overlays
MD5 bf619eac0cdf3f68d496ea9344137e8b
File type ASCII text
Offset 260608
Size 512
Entropy 0.00
PE imports
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueExW
SetSecurityDescriptorDacl
CloseServiceHandle
OpenProcessToken
AddAccessAllowedAce
RegOpenKeyExW
RegOpenKeyW
GetTokenInformation
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
RegDeleteValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
RegSetValueExA
GetForegroundWindow
GetMenuInfo
SetCaretPos
GetCapture
GetClassInfoExA
SetMenuContextHelpId
FindWindowA
EnumPropsExW
wvsprintfW
EnumDisplaySettingsExA
GetTabbedTextExtentA
RegisterClipboardFormatA
VkKeyScanA
DrawIcon
RegisterDeviceNotificationW
DestroyCaret
SetActiveWindow
DrawCaption
GetCursorPos
RemovePropA
GetMenu
GetWindowLongW
GetSystemMetrics
IsZoomed
CreateMDIWindowA
SetTimer
GetDlgItem
ClientToScreen
MonitorFromRect
GetWindowTextLengthA
GetSysColor
LoadIconA
InvalidateRect
GetKeyboardLayout
GetTopWindow
IsDlgButtonChecked
CheckDlgButton
CallWindowProcA
FindWindowExW
ScrollWindow
ReplyMessage
Number of PE resources by type
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
CHINESE SIMPLIFIED 1
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2005:04:03 04:51:26+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
205312

LinkerVersion
0.0

EntryPoint
0x1000

InitializedDataSize
32256

SubsystemVersion
4.1

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 b28b8b5626fcda15edf3fe4fa5997052
SHA1 270c088ddc93ef543da5d77e2843697ee8cef8e1
SHA256 eccd4113d5980802ff4c407f97ffca9a6280f09d680bd3b76f7ad22d8fc734c5
ssdeep
1536:q6ByHAoLJboyeSyUtvyfoBGUSVi78IyE+RVYmTTWiHmOYg:LBqAoFFeSmo9785RVYmTTWiHmOYg

authentihash 078606e72ae49b599e5dd58fbfefeded6541ae96add53cf9953e0cf141fd0d56
imphash 8022eb7c204e9dd799fa9ec0de6982b9
File size 255.0 KB ( 261120 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.7%)
Generic Win/DOS Executable (23.4%)
DOS Executable Generic (23.4%)
VXD Driver (0.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-07-26 20:19:38 UTC ( 3 years, 8 months ago )
Last submission 2015-08-10 03:11:05 UTC ( 3 years, 7 months ago )
File names 627f7dbda4661a83c0a8a2186d7941bdcd708f4d
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R01TC0DGV15.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs