× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 4a1bd4c2416555a9750a29e091b10020d48c7502bc986ab812037ade2287e3c9
Dateiname: Q-Dir_Installer_UC.exe
Erkennungsrate: 0 / 68
Analyse-Datum: 2018-10-24 10:16:30 UTC ( vor 3 Wochen, 2 Tage )
Antivirus Ergebnis Aktualisierung
Ad-Aware 20181024
AegisLab 20181024
AhnLab-V3 20181024
Alibaba 20180921
ALYac 20181024
Antiy-AVL 20181023
Arcabit 20181024
Avast 20181024
Avast-Mobile 20181023
AVG 20181024
Avira (no cloud) 20181024
Babable 20180918
Baidu 20181024
BitDefender 20181024
Bkav 20181023
CAT-QuickHeal 20181022
ClamAV 20181024
CMC 20181024
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181024
Cyren 20181024
DrWeb 20181024
eGambit 20181024
Emsisoft 20181024
Endgame 20180730
ESET-NOD32 20181024
F-Prot 20181024
F-Secure 20181024
Fortinet 20181024
GData 20181024
Ikarus 20181024
Sophos ML 20180717
Jiangmin 20181024
K7AntiVirus 20181024
K7GW 20181024
Kaspersky 20181024
Kingsoft 20181024
Malwarebytes 20181024
MAX 20181024
McAfee 20181024
McAfee-GW-Edition 20181024
Microsoft 20181024
eScan 20181024
NANO-Antivirus 20181024
Palo Alto Networks (Known Signatures) 20181024
Panda 20181023
Qihoo-360 20181024
Rising 20181024
SentinelOne (Static ML) 20181011
Sophos AV 20181024
SUPERAntiSpyware 20181022
Symantec 20181024
Symantec Mobile Insight 20181001
TACHYON 20181024
Tencent 20181024
TheHacker 20181023
TotalDefense 20181024
TrendMicro 20181024
TrendMicro-HouseCall 20181024
Trustlook 20181024
VBA32 20181024
VIPRE 20181024
ViRobot 20181024
Webroot 20181024
Yandex 20181024
Zillya 20181023
ZoneAlarm by Check Point 20181024
Zoner 20181023
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © Nenad Hrg (SoftwareOK.com) 2006-2018

Product Q-Dir SoftwareOK.com
Original name Q-Dir.exe
Internal name Q-Dir 7.12.0
File version 7, 1, 2, 0
Description Q-Dir
Signature verification Signed file, verified signature
Signing date 8:19 AM 7/30/2018
Signers
[+] Nenad Hrg
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 4/27/2018
Valid to 12:59 AM 4/27/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 25FF1BAC7A0D55A0A43B09604DEA47766A5F367B
Serial number 1B 4C 1F 56 FC AB 3E 44 8A 41 CC D6 69 B1 B7 5B
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO SHA-1 Time Stamping Signer
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 12/31/2015
Valid to 7:40 PM 7/9/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 03A5B14663EB12023091B84A6D6A68BC871DE66B
Serial number 16 88 F0 39 25 5E 63 8E 69 14 39 07 E6 33 0B
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-07-30 07:18:01
Entry Point 0x000830B6
Number of sections 5
PE sections
Overlays
MD5 5428df8e20fb32b7fba3d3d657daaeb7
File type data
Offset 1007616
Size 11144
Entropy 7.41
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
OpenProcessToken
RegSetValueExW
GetUserNameW
RegEnumKeyExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
ImageList_GetImageCount
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_Destroy
CreateStatusWindowW
_TrackMouseEvent
ImageList_SetBkColor
Ord(8)
ImageList_Draw
ImageList_AddMasked
CreatePropertySheetPageW
ImageList_Remove
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_Create
PropertySheetW
ImageList_GetIcon
ImageList_LoadImageW
StartDocW
GetWindowExtEx
SetMapMode
CreateFontIndirectW
PatBlt
GetClipBox
GetTextExtentPoint32W
SaveDC
LPtoDP
SetStretchBltMode
DeleteEnhMetaFile
GetPixel
Rectangle
BitBlt
GetDeviceCaps
ExcludeClipRect
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
EndDoc
CreateSolidBrush
StartPage
DeleteObject
IntersectClipRect
CreateDCW
CreateDIBSection
SetTextColor
OffsetWindowOrgEx
CreatePatternBrush
CreateEnhMetaFileW
ExtTextOutW
GetObjectW
CreateBitmap
MoveToEx
GetStockObject
SetViewportOrgEx
SetBkColor
LineTo
SelectClipRgn
CreateCompatibleDC
StretchBlt
GetBkColor
CloseEnhMetaFile
SetBrushOrgEx
EndPage
CreatePen
AbortDoc
SetWindowExtEx
GetEnhMetaFileHeader
SetWindowOrgEx
DPtoLP
SelectObject
GetViewportExtEx
ResetDCW
SetViewportExtEx
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
GetDriveTypeA
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLogicalDrives
FreeEnvironmentStringsW
lstrcatW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetProcAddress
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
EnumDateFormatsW
FreeLibrary
GetEnvironmentVariableA
LoadResource
GlobalHandle
GetLogicalDriveStringsW
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
GetEnvironmentVariableW
SetLastError
GetSystemTime
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
OutputDebugStringW
GetModuleFileNameW
HeapAlloc
GetVersionExA
GetModuleFileNameA
lstrcmpiW
WritePrivateProfileSectionW
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetPrivateProfileStringW
GetModuleHandleA
SetFileAttributesW
CreateThread
SetEnvironmentVariableW
GetSystemDirectoryW
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
SetEnvironmentVariableA
TerminateProcess
SetCurrentDirectoryW
GlobalAlloc
SetEndOfFile
GetVersion
InterlockedIncrement
GetNumberFormatW
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
GetOEMCP
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GlobalSize
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetTempFileNameW
GetProfileStringW
GetTimeFormatW
lstrcpyW
RemoveDirectoryW
FindNextFileW
GetCurrentThreadId
CompareStringA
FindFirstFileW
lstrcmpW
GlobalLock
SetVolumeLabelW
GetPrivateProfileSectionW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
GetShortPathNameW
lstrlenA
GlobalFree
FindResourceW
LCMapStringA
CompareStringW
GetEnvironmentStringsW
GlobalUnlock
lstrlenW
EnumTimeFormatsW
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
WritePrivateProfileStringW
lstrcpynW
RaiseException
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetModuleHandleW
FreeResource
SizeofResource
HeapCreate
WriteFile
VirtualFree
Sleep
IsBadCodePtr
VirtualAlloc
AlphaBlend
LoadRegTypeLib
OleCreateFontIndirect
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
SHBrowseForFolderW
SHFileOperationW
Ord(18)
Ord(68)
Ord(190)
SHGetPathFromIDListW
Ord(88)
Ord(17)
ShellExecuteExW
SHGetFileInfoW
Shell_NotifyIconW
SHGetMalloc
Ord(155)
DragAcceptFiles
SHGetDesktopFolder
Ord(4)
SHGetSpecialFolderPathW
Ord(2)
Ord(25)
DragFinish
ShellExecuteW
SHGetSettings
Ord(21)
ExtractIconExW
SHGetSpecialFolderLocation
Ord(16)
SHAppBarMessage
PathRelativePathToW
StrCpyW
SetFocus
GetMessagePos
RedrawWindow
LoadBitmapW
SetRectEmpty
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
EndPaint
ScrollWindowEx
WindowFromPoint
SetMenuItemInfoW
ShowCaret
SetActiveWindow
DispatchMessageW
GetAsyncKeyState
ReleaseDC
GetDlgCtrlID
SendMessageW
SendMessageA
GetClientRect
GetMenuItemInfoW
SetMenuDefaultItem
SetScrollPos
CallNextHookEx
LoadImageW
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
GetWindowTextLengthW
LoadAcceleratorsW
InvalidateRgn
DrawTextW
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
SetClassLongW
EnumWindows
GetMessageW
ShowWindow
DrawFrameControl
SetPropW
GetDesktopWindow
PeekMessageW
InsertMenuItemW
SetWindowPlacement
CharUpperW
GetSystemMenu
EnableWindow
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
CreateCursor
LoadStringA
SetParent
SetClipboardData
IsZoomed
GetWindowPlacement
LoadStringW
EnableMenuItem
TrackPopupMenuEx
DrawFocusRect
SetTimer
IsDialogMessageW
FillRect
CopyRect
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetCursorPos
OpenClipboard
IsChild
MapWindowPoints
RegisterWindowMessageW
DrawAnimatedRects
ReleaseCapture
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
keybd_event
KillTimer
MapVirtualKeyW
GetClipboardData
GetClassInfoExW
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
DrawIcon
EnumChildWindows
CharLowerW
PostMessageW
GetScrollInfo
CreateDialogParamW
CreatePopupMenu
CheckMenuItem
GetSubMenu
DrawIconEx
SetWindowTextW
GetDlgItem
RemovePropW
ClientToScreen
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
GetMenuState
SetWindowsHookExW
LoadCursorW
LoadIconW
FindWindowExW
GetMenuItemID
InsertMenuW
SetForegroundWindow
GetMenuStringW
EmptyClipboard
CreateDialogIndirectParamW
IntersectRect
EndDialog
CreateAcceleratorTableW
GetCapture
ScreenToClient
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
MessageBoxW
GetMenu
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
DialogBoxParamW
AppendMenuW
GetWindowDC
DestroyCursor
mouse_event
GetFocus
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
MenuItemFromPoint
GetDoubleClickTime
DestroyIcon
IsWindowVisible
SystemParametersInfoW
GetDC
FrameRect
SetRect
DeleteMenu
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
DestroyWindow
ModifyMenuW
IsRectEmpty
IsMenu
SendMessageTimeoutW
wsprintfW
CloseClipboard
SetCursor
SetMenu
TranslateAcceleratorW
PlaySoundW
timeGetTime
GetPrinterW
ClosePrinter
OpenPrinterW
GetSaveFileNameW
PageSetupDlgW
GetOpenFileNameW
PrintDlgW
ChooseColorW
CreateStreamOnHGlobal
OleLockRunning
CLSIDFromString
CoInitialize
CoTaskMemAlloc
RevokeDragDrop
ReleaseStgMedium
CoCreateInstance
CLSIDFromProgID
OleUninitialize
DoDragDrop
StringFromCLSID
OleSetClipboard
CoUninitialize
OleGetClipboard
CoTaskMemFree
RegisterDragDrop
CoSetProxyBlanket
OleInitialize
Number of PE resources by type
RT_DIALOG 43
IMG 32
RT_BITMAP 29
RT_ICON 28
RT_GROUP_ICON 28
Struct(241) 26
RT_MENU 7
RT_ACCELERATOR 3
RT_HTML 2
Struct(240) 2
RT_STRING 2
WAVE 1
RT_MANIFEST 1
TEXTINCLUDE 1
RT_VERSION 1
PNG 1
Number of PE resources by language
GERMAN 205
GERMAN LIECHTENSTEIN 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
466944

ImageVersion
0.0

ProductName
Q-Dir SoftwareOK.com

FileVersionNumber
7.1.2.0

LanguageCode
German

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

Company
Nenad Hrg (SoftwareOK.de)

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
Q-Dir.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
7, 1, 2, 0

TimeStamp
2018:07:30 08:18:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Q-Dir 7.12.0

SubsystemVersion
4.0

ProductVersion
7, 1, 2, 0

FileDescription
Q-Dir

OSVersion
4.0

FileOS
Windows NT 32-bit

LegalCopyright
Copyright Nenad Hrg (SoftwareOK.com) 2006-2018

MachineType
Intel 386 or later, and compatibles

CompanyName
Nenad Hrg (SoftwareOK.com)

CodeSize
585728

FileSubtype
0

ProductVersionNumber
7.1.2.0

EntryPoint
0x830b6

ObjectFileType
Dynamic link library

File identification
MD5 ac0b51d5c358ed76254c94f407b540a3
SHA1 04518f072d1c074d1885392a6d3455d58c247cb9
SHA256 4a1bd4c2416555a9750a29e091b10020d48c7502bc986ab812037ade2287e3c9
ssdeep
24576:e7UR2O8sGeahXURGkuZDweJnHxT1use08PoWs:0UR2IGeORQze

authentihash abc890b59f9a4326ead6bf240dbb5f9aab734ee28831c51aaed2c718fbdd4133
imphash 9be4e69c3536e9a08c0294e213160ffd
File size 994.9 KB ( 1018760 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (50.8%)
Windows screen saver (21.3%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-07-30 07:20:05 UTC ( vor 3 Monate, 2 Wochen )
Last submission 2018-08-06 19:51:29 UTC ( vor 3 Monate, 1 Woche )
Dateinamen Q-Dir_uc.exe
Q-Dir_Installer_UC.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir_Installer_UC.exe
Q-Dir 7.12.0
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir_Installer_UC.exe
Q-Dir.exe
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
UDP communications