× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: e73fd7317c99328db3ef9d3e40fde86dc70cd6994025b0ddc60452876bdb7d12
Dateiname: Q-Dir 7.22.0
Erkennungsrate: 0 / 68
Analyse-Datum: 2018-10-31 10:19:49 UTC ( vor 1 Woche, 5 Tage )
Antivirus Ergebnis Aktualisierung
Ad-Aware 20181031
AegisLab 20181031
AhnLab-V3 20181031
Alibaba 20180921
ALYac 20181031
Antiy-AVL 20181031
Arcabit 20181031
Avast 20181031
Avast-Mobile 20181031
AVG 20181031
Avira (no cloud) 20181031
Babable 20180918
Baidu 20181031
BitDefender 20181031
Bkav 20181030
CAT-QuickHeal 20181028
ClamAV 20181031
CMC 20181031
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181031
Cyren 20181031
DrWeb 20181031
eGambit 20181031
Emsisoft 20181031
Endgame 20180730
ESET-NOD32 20181031
F-Prot 20181031
F-Secure 20181031
Fortinet 20181031
GData 20181031
Ikarus 20181031
Sophos ML 20180717
Jiangmin 20181031
K7AntiVirus 20181031
K7GW 20181031
Kaspersky 20181031
Kingsoft 20181031
Malwarebytes 20181031
MAX 20181031
McAfee 20181031
McAfee-GW-Edition 20181031
Microsoft 20181031
eScan 20181031
NANO-Antivirus 20181031
Palo Alto Networks (Known Signatures) 20181031
Panda 20181030
Qihoo-360 20181031
Rising 20181031
SentinelOne (Static ML) 20181011
Sophos AV 20181031
SUPERAntiSpyware 20181031
Symantec 20181031
Symantec Mobile Insight 20181030
TACHYON 20181031
Tencent 20181031
TheHacker 20181025
TotalDefense 20181031
TrendMicro 20181031
TrendMicro-HouseCall 20181031
Trustlook 20181031
VBA32 20181031
VIPRE 20181031
ViRobot 20181031
Webroot 20181031
Yandex 20181030
Zillya 20181030
ZoneAlarm by Check Point 20181031
Zoner 20181031
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © Nenad Hrg (SoftwareOK.com) 2006-2018

Product Q-Dir SoftwareOK.com
Original name Q-Dir.exe
Internal name Q-Dir 7.22.0
File version 7, 2, 2, 0
Description Q-Dir
Signature verification Signed file, verified signature
Signing date 3:19 PM 10/3/2018
Signers
[+] Nenad Hrg
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 4/27/2018
Valid to 12:59 AM 4/27/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 25FF1BAC7A0D55A0A43B09604DEA47766A5F367B
Serial number 1B 4C 1F 56 FC AB 3E 44 8A 41 CC D6 69 B1 B7 5B
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO SHA-1 Time Stamping Signer
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 12/31/2015
Valid to 7:40 PM 7/9/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 03A5B14663EB12023091B84A6D6A68BC871DE66B
Serial number 16 88 F0 39 25 5E 63 8E 69 14 39 07 E6 33 0B
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-03 14:18:54
Entry Point 0x00083684
Number of sections 5
PE sections
Overlays
MD5 87f83a312aad49552592358054215e0e
File type data
Offset 942080
Size 11144
Entropy 7.42
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
OpenProcessToken
RegSetValueExW
GetUserNameW
RegEnumKeyExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
ImageList_GetImageCount
ImageList_GetImageInfo
InitCommonControlsEx
ImageList_Destroy
CreateStatusWindowW
_TrackMouseEvent
ImageList_SetBkColor
Ord(8)
ImageList_Draw
ImageList_AddMasked
CreatePropertySheetPageW
ImageList_Remove
DestroyPropertySheetPage
ImageList_ReplaceIcon
ImageList_Create
PropertySheetW
ImageList_GetIcon
ImageList_LoadImageW
StartDocW
GetWindowExtEx
SetMapMode
CreateFontIndirectW
PatBlt
GetClipBox
GetTextExtentPoint32W
SaveDC
LPtoDP
SetStretchBltMode
DeleteEnhMetaFile
GetPixel
Rectangle
BitBlt
GetDeviceCaps
ExcludeClipRect
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
EndDoc
CreateSolidBrush
StartPage
DeleteObject
IntersectClipRect
CreateDCW
CreateDIBSection
SetTextColor
OffsetWindowOrgEx
CreatePatternBrush
CreateEnhMetaFileW
ExtTextOutW
GetObjectW
CreateBitmap
MoveToEx
GetStockObject
SetViewportOrgEx
SetBkColor
LineTo
SelectClipRgn
CreateCompatibleDC
StretchBlt
GetBkColor
CloseEnhMetaFile
SetBrushOrgEx
EndPage
CreatePen
AbortDoc
SetWindowExtEx
GetEnhMetaFileHeader
SetWindowOrgEx
DPtoLP
SelectObject
GetViewportExtEx
ResetDCW
SetViewportExtEx
CreateCompatibleBitmap
GetDriveTypeW
HeapDestroy
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLogicalDrives
lstrcatW
GetLocaleInfoW
WriteFile
WideCharToMultiByte
GetProcAddress
GetDiskFreeSpaceW
InterlockedExchange
GetTempPathW
EnumDateFormatsW
InitializeCriticalSection
OutputDebugStringW
GlobalHandle
GetLogicalDriveStringsW
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
CopyFileW
GetUserDefaultLangID
LoadResource
GetModuleFileNameW
ExitProcess
WritePrivateProfileSectionW
MultiByteToWideChar
FlushInstructionCache
GetPrivateProfileStringW
GetFullPathNameW
CreateThread
GetSystemDirectoryW
CreateMutexW
MulDiv
TerminateProcess
GlobalAlloc
GetCurrentThreadId
InterlockedIncrement
GetNumberFormatW
EnterCriticalSection
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
lstrcmpiW
GlobalSize
GetWindowsDirectoryW
GetFileSize
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetTempFileNameW
GetProfileStringW
CompareStringW
lstrcpyW
RemoveDirectoryW
FindNextFileW
FindFirstFileW
lstrcmpW
GlobalLock
SetVolumeLabelW
GetPrivateProfileSectionW
CreateFileW
LeaveCriticalSection
GetLastError
GetShortPathNameW
lstrlenA
GlobalFree
GetTimeFormatW
GlobalUnlock
lstrlenW
EnumTimeFormatsW
SizeofResource
GetCurrentProcessId
LockResource
SetFileTime
WritePrivateProfileStringW
lstrcpynW
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetModuleHandleW
FreeResource
FindResourceW
Sleep
AlphaBlend
_purecall
__wgetmainargs
malloc
rand
realloc
fread
fclose
__dllonexit
_controlfp
swprintf
_wfullpath
_except_handler3
clock
??2@YAPAXI@Z
fwrite
__p__commode
_onexit
wcslen
wcscmp
exit
sprintf
_ftol
__setusermatherr
wcsrchr
_XcptFilter
_wcsicmp
__set_app_type
wcschr
_adjust_fdiv
iswspace
??3@YAXPAX@Z
free
ceil
wcscat
vswprintf
_wfopen
calloc
_initterm
memmove
wcscpy
iswdigit
_wchdir
__p__fmode
time
wcsstr
_exit
_wcmdln
_wtoi
LoadRegTypeLib
OleCreateFontIndirect
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
SHBrowseForFolderW
Shell_NotifyIconW
Ord(18)
Ord(68)
Ord(190)
SHGetPathFromIDListW
Ord(88)
Ord(17)
ShellExecuteExW
SHGetFileInfoW
SHGetDesktopFolder
SHGetMalloc
Ord(155)
DragAcceptFiles
Ord(4)
SHGetSpecialFolderPathW
Ord(2)
Ord(25)
DragFinish
SHFileOperationW
ShellExecuteW
SHGetSettings
Ord(21)
ExtractIconExW
SHGetSpecialFolderLocation
Ord(16)
SHAppBarMessage
PathRelativePathToW
StrCpyW
RedrawWindow
GetMessagePos
InsertMenuItemW
DestroyWindow
MoveWindow
DestroyMenu
PostQuitMessage
SetWindowPos
SetScrollPos
IsWindow
EndPaint
ScrollWindowEx
WindowFromPoint
SetMenuItemInfoW
SetActiveWindow
GetDC
GetAsyncKeyState
ReleaseDC
GetDlgCtrlID
SendMessageW
GetMenuStringW
SendMessageA
GetClientRect
GetMenuItemInfoW
DrawTextW
GetScrollPos
CallNextHookEx
LoadImageW
GetActiveWindow
GetWindowTextW
RegisterClipboardFormatW
GetWindowTextLengthW
LoadAcceleratorsW
InvalidateRgn
PtInRect
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
SetClassLongW
EnumWindows
GetMessageW
ShowWindow
DrawFrameControl
SetPropW
GetMenuState
PeekMessageW
EnableWindow
SetWindowPlacement
CharUpperW
GetSystemMenu
GetClipboardData
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetMenuDefaultItem
CreateCursor
LoadStringA
SetParent
SetClipboardData
IsZoomed
GetWindowPlacement
LoadStringW
EnableMenuItem
TrackPopupMenuEx
DrawFocusRect
SetTimer
IsDialogMessageW
FillRect
CopyRect
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetCursorPos
CharNextW
IsChild
SetFocus
RegisterWindowMessageW
DrawAnimatedRects
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
keybd_event
KillTimer
MapVirtualKeyW
MapWindowPoints
GetParent
LoadBitmapW
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
CharLowerW
PostMessageW
GetScrollInfo
CreateDialogParamW
CreatePopupMenu
ShowCaret
GetSubMenu
DrawIconEx
SetWindowTextW
GetDlgItem
RemovePropW
ClientToScreen
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
GetDesktopWindow
SetWindowsHookExW
LoadCursorW
LoadIconW
FindWindowExW
GetMenuItemID
InsertMenuW
SetForegroundWindow
OpenClipboard
EmptyClipboard
CreateDialogIndirectParamW
IntersectRect
EndDialog
CreateAcceleratorTableW
GetCapture
ScreenToClient
MessageBeep
LoadMenuW
CheckMenuItem
GetWindowThreadProcessId
MessageBoxW
GetMenu
RegisterClassExW
UnhookWindowsHookEx
RemoveMenu
SetRectEmpty
DialogBoxParamW
AppendMenuW
GetWindowDC
DestroyCursor
mouse_event
SendMessageTimeoutW
GetSysColor
SetDlgItemTextW
SetScrollInfo
GetKeyState
MenuItemFromPoint
GetDoubleClickTime
DestroyIcon
IsWindowVisible
SystemParametersInfoW
DispatchMessageW
FrameRect
SetRect
DeleteMenu
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
IsRectEmpty
IsMenu
GetFocus
wsprintfW
CloseClipboard
SetCursor
SetMenu
TranslateAcceleratorW
PlaySoundW
timeGetTime
GetPrinterW
ClosePrinter
OpenPrinterW
PageSetupDlgW
GetSaveFileNameW
GetOpenFileNameW
PrintDlgW
ChooseColorW
CreateStreamOnHGlobal
OleUninitialize
CLSIDFromProgID
CoInitialize
OleInitialize
RevokeDragDrop
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
OleLockRunning
DoDragDrop
StringFromCLSID
OleSetClipboard
CoUninitialize
OleGetClipboard
CoTaskMemFree
CLSIDFromString
CoSetProxyBlanket
CoTaskMemAlloc
Number of PE resources by type
RT_DIALOG 43
IMG 32
RT_BITMAP 29
RT_ICON 28
RT_GROUP_ICON 28
Struct(241) 26
RT_MENU 7
RT_ACCELERATOR 3
RT_HTML 2
Struct(240) 2
RT_STRING 2
WAVE 1
RT_MANIFEST 1
TEXTINCLUDE 1
RT_VERSION 1
PNG 1
Number of PE resources by language
GERMAN 205
GERMAN LIECHTENSTEIN 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.2.2.0

LanguageCode
German

FileFlagsMask
0x003f

FileDescription
Q-Dir

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

Company
Nenad Hrg (SoftwareOK.de)

CharacterSet
Unicode

InitializedDataSize
446464

EntryPoint
0x83684

OriginalFileName
Q-Dir.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright Nenad Hrg (SoftwareOK.com) 2006-2018

FileVersion
7, 2, 2, 0

TimeStamp
2018:10:03 15:18:54+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Q-Dir 7.22.0

ProductVersion
7, 2, 2, 0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nenad Hrg (SoftwareOK.com)

CodeSize
536576

ProductName
Q-Dir SoftwareOK.com

ProductVersionNumber
7.2.2.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 a31d9dd74b09be657225766fac62f499
SHA1 160f49a6a2dc9d93cda1708c5d721e89fb68b6eb
SHA256 e73fd7317c99328db3ef9d3e40fde86dc70cd6994025b0ddc60452876bdb7d12
ssdeep
12288:JC8KiuSoykNHwyJFaNymWrZG8JKPXrguKxT1Use0/rYnQ+r2tWk9OW:JC12yFaNybrZ6PXMHxT1Use08PoWs

authentihash dd5841740029092ea4b6ef288644d0ac521ef76e38e7b83264b5dbbf201a8e53
imphash 929a4d4f688b9a4347362633c41e28c6
File size 930.9 KB ( 953224 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-10-03 14:19:56 UTC ( vor 1 Monat, 1 Woche )
Last submission 2018-10-03 14:19:56 UTC ( vor 1 Monat, 1 Woche )
Dateinamen Q-Dir 7.22.0
Q-Dir_uc.exe
Q-Dir_Installer_UC.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
.
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Q-Dir.exe
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs