× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: d0a8a4b97a9fe053f5d9e9e724820bbe910a4e63eba0a5cd5f4d46d464b6d531
Dateiname: jinx.exe
Erkennungsrate: 2 / 47
Analyse-Datum: 2014-01-16 12:01:05 UTC ( vor 5 Jahre, 4 Monate ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.J!89 20140116
Symantec Suspicious.AD 20140116
Ad-Aware 20140116
Yandex 20140115
AntiVir 20140116
Antiy-AVL 20140116
Avast 20140116
AVG 20140116
Baidu-International 20131213
BitDefender 20140116
Bkav 20140116
ByteHero 20140114
CAT-QuickHeal 20140116
ClamAV 20140116
CMC 20140115
Commtouch 20140116
Comodo 20140116
DrWeb 20140116
Emsisoft 20140116
ESET-NOD32 20140116
F-Prot 20140116
Fortinet 20140116
GData 20140116
Ikarus 20140116
Jiangmin 20140116
K7AntiVirus 20140115
K7GW 20140115
Kaspersky 20140116
Kingsoft 20130829
Malwarebytes 20140116
McAfee 20140116
Microsoft 20140116
eScan 20140116
NANO-Antivirus 20140116
Norman 20140116
nProtect 20140116
Panda 20140115
Rising 20140116
Sophos AV 20140116
SUPERAntiSpyware 20140116
TheHacker 20140115
TotalDefense 20140116
TrendMicro 20140116
TrendMicro-HouseCall 20140116
VBA32 20140115
VIPRE 20140116
ViRobot 20140116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Sven Karschewski

Product Jinx!
Original name jinx.exe
Internal name Jinx!
File version 0.99a
Description Jinx!
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-01-13 10:17:55
Entry Point 0x00001284
Number of sections 9
PE sections
Overlays
MD5 ec2ee17380374b4cfa0d7eadc17519cf
File type ASCII text
Offset 289792
Size 14
Entropy 3.09
PE imports
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
GetOpenFileNameA
GetSaveFileNameA
SetDIBits
CreatePen
TextOutA
CreateFontIndirectA
GetTextMetricsA
SetStretchBltMode
GetObjectA
DeleteDC
SetBkMode
BitBlt
SetTextColor
CreateFontA
GetStockObject
ExtTextOutA
GetDIBits
SetTextAlign
CreateCompatibleDC
StretchBlt
SelectObject
GetTextExtentPoint32A
CreateSolidBrush
SetBkColor
DeleteObject
CreateCompatibleBitmap
GdiplusShutdown
GdipImageGetFrameDimensionsCount
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipGetImageWidth
GdipDisposeImage
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageHeight
GdipImageGetFrameDimensionsList
GetLastError
SetCommState
EnterCriticalSection
FreeLibrary
ExitProcess
VirtualProtect
LoadLibraryA
VirtualQuery
GetModuleFileNameA
DeleteCriticalSection
GetStartupInfoA
MultiByteToWideChar
GetCommandLineA
GetProcAddress
GetModuleHandleA
ReadFile
SetUnhandledExceptionFilter
WriteFile
FindFirstFileA
FindNextFileA
ClearCommError
SetCommTimeouts
InitializeCriticalSection
GetCommState
FindClose
TlsGetValue
Sleep
CreateFileA
LeaveCriticalSection
CloseHandle
SHGetPathFromIDListA
SHBrowseForFolderA
SetFocus
GetMessageA
GetForegroundWindow
GetParent
ReleaseDC
EndDialog
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
SendDlgItemMessageA
GetSystemMetrics
GetWindowRect
DispatchMessageA
EnableWindow
SetMenu
SetDlgItemTextA
PostMessageA
MoveWindow
ShowWindowAsync
GetDlgItemTextA
ScreenToClient
WindowFromPoint
MessageBoxA
AppendMenuW
SetWindowLongA
TranslateMessage
DialogBoxParamA
SetTimer
UpdateWindow
GetDlgItemInt
GetDC
RegisterClassExA
MapDialogRect
SystemParametersInfoA
GetDlgCtrlID
CreatePopupMenu
CheckMenuItem
IsWindowVisible
SendMessageA
CreateWindowExA
GetDlgItem
CreateDialogParamA
EnableMenuItem
ClientToScreen
InvalidateRect
CreateMenu
LoadCursorA
LoadIconA
TrackPopupMenu
FillRect
GetDesktopWindow
GetMenuItemInfoA
SetForegroundWindow
IsDialogMessageA
DestroyWindow
timeKillEvent
waveInOpen
waveInPrepareHeader
waveInAddBuffer
timeEndPeriod
waveInClose
timeSetEvent
waveInStop
waveInStart
timeGetDevCaps
timeBeginPeriod
recv
gethostname
socket
setsockopt
bind
inet_addr
WSACleanup
WSAStartup
gethostbyname
ioctlsocket
sendto
htons
closesocket
__p__fmode
malloc
rand
realloc
__p__environ
pow
fread
fclose
atexit
abort
_setmode
printf
fopen
strncpy
_cexit
puts
clock
fwrite
sqrt
_onexit
sprintf
vfprintf
memcmp
log10
sin
localtime
strchr
tolower
__p___argc
atoi
free
__getmainargs
calloc
strstr
__p___argv
atof
cos
putchar
memmove
signal
atan2
strcpy
time
__set_app_type
strcmp
_iob
Number of PE resources by type
RT_DIALOG 29
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 33
PE resources
ExifTool file metadata
UninitializedDataSize
3072

InitializedDataSize
288768

ImageVersion
1.0

ProductName
Jinx!

FileVersionNumber
0.9.9.1

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Jinx!

CharacterSet
Windows, Latin1

LinkerVersion
2.22

FileTypeExtension
exe

OriginalFileName
jinx.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
0.99a

TimeStamp
2014:01:13 11:17:55+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Jinx!

ProductVersion
0.99a

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Unknown (0)

LegalCopyright
Sven Karschewski

MachineType
Intel 386 or later, and compatibles

CompanyName
Hardware Express GmbH

CodeSize
223232

FileSubtype
0

ProductVersionNumber
0.9.9.1

EntryPoint
0x1284

ObjectFileType
Unknown

Compressed bundles
File identification
MD5 157684a09714e463126fdb394418532b
SHA1 d11e64998787c5641fd0d10a5f712d94e10f6a7c
SHA256 d0a8a4b97a9fe053f5d9e9e724820bbe910a4e63eba0a5cd5f4d46d464b6d531
ssdeep
6144:0gLzduWwnmKKZVrMM3mGdrBBZtDoVaO107dr23/bA3E9Av8Lg8t2rLGmz27FNqjT:0g3duZKZVrMM3mGdrBBZpoVaO107dr6w

authentihash 76496bb609931261b4b4726fd7cbf2da5974feaa525d46d60c714e932ce45ba8
imphash f29f83a3591cf7772e7a15545e8d8303
File size 283.0 KB ( 289806 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2014-01-16 12:00:07 UTC ( vor 5 Jahre, 4 Monate )
Last submission 2014-01-16 12:01:05 UTC ( vor 5 Jahre, 4 Monate )
Dateinamen jinx.exe
Jinx!
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created mutexes
Opened service managers
Opened services
Runtime DLLs