× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 00f97e3e228853a1c0006d002d67013748a5d1423c31a562a91a35a5ee6bc2f0
File name: 00f97e3e228853a1c0006d002d67013748a5d1423c31a562a91a35a5ee6bc2f0
Detection ratio: 13 / 70
Analysis date: 2018-12-22 22:08:14 UTC ( 3 months ago ) View latest
Antivirus Result Update
Acronis malware 20180726
AegisLab Trojan.Win32.Buzus.kZ0o 20181222
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181222
eGambit Unsafe.AI_Score_80% 20181222
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Microsoft Trojan:Win32/Cloxer.D!cl 20181222
Qihoo-360 HEUR/QVM20.1.0B2B.Malware.Gen 20181222
Rising Malware.Heuristic!ET#85% (RDM+:cmRtazoEAcCFbjD2FWvhna9G6u1y) 20181222
SentinelOne (Static ML) static engine - malicious 20181011
Symantec ML.Attribute.HighConfidence 20181222
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181222
AhnLab-V3 20181222
Alibaba 20180921
Antiy-AVL 20181222
Arcabit 20181222
Avast 20181222
Avast-Mobile 20181222
AVG 20181222
Avira (no cloud) 20181222
Babable 20180918
Baidu 20181207
BitDefender 20181222
Bkav 20181221
CAT-QuickHeal 20181222
ClamAV 20181222
CMC 20181221
Comodo 20181222
Cybereason 20180225
Cyren 20181222
DrWeb 20181222
Emsisoft 20181222
ESET-NOD32 20181222
F-Prot 20181222
F-Secure 20181222
Fortinet 20181222
GData 20181222
Ikarus 20181222
Jiangmin 20181222
K7AntiVirus 20181222
K7GW 20181222
Kaspersky 20181222
Kingsoft 20181222
Malwarebytes 20181222
MAX 20181222
McAfee 20181222
McAfee-GW-Edition 20181222
eScan 20181222
NANO-Antivirus 20181222
Palo Alto Networks (Known Signatures) 20181222
Panda 20181222
Sophos AV 20181222
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TACHYON 20181222
Tencent 20181222
TheHacker 20181220
TotalDefense 20181222
TrendMicro 20181222
TrendMicro-HouseCall 20181222
Trustlook 20181222
VBA32 20181222
VIPRE 20181222
ViRobot 20181222
Webroot 20181222
Yandex 20181221
Zillya 20181222
ZoneAlarm by Check Point 20181222
Zoner 20181222
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c)1996 AOL/Johnson-Grace Company

Product JGMP
Original name jgmp500.dll
Internal name JGMP
File version 5010
Description JG MIDI player DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-08-04 07:56:09
Entry Point 0x00008F3F
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
IsTokenRestricted
RegOpenKeyExW
QueryServiceLockStatusW
DuplicateEncryptionInfoFile
RegCreateKeyExA
LookupAccountNameW
OpenBackupEventLogA
CryptGetDefaultProviderW
GetWindowsAccountDomainSid
ImageList_GetImageCount
ImageList_SetIconSize
CryptSIPAddProvider
CertAddEncodedCertificateToStore
JetIntersectIndexes
PaintRgn
GetColorAdjustment
CopyMetaFileW
EndPath
GetCharacterPlacementA
GetRandomRgn
ImmSetCompositionStringW
ImmReleaseContext
GetIpForwardTable
FlushProcessWriteBuffers
FindCloseChangeNotification
GetWindowsDirectoryW
GlobalReAlloc
VerifyScripts
ReadDirectoryChangesW
VirtualUnlock
GetConsoleCP
GetEnvironmentVariableW
WriteFile
Process32First
FindNextFileA
GetDynamicTimeZoneInformation
FlsFree
GetModuleHandleW
LocalLock
LZSeek
DrawDibGetPalette
VarDateFromBool
VarUI2FromStr
SafeArrayCreateEx
IsPwrHibernateAllowed
RasEnumConnectionsW
RpcMgmtStopServerListening
RpcErrorEndEnumeration
NdrInterfacePointerFree
I_RpcMapWin32Status
SetupPromptForDiskA
SetupFindNextMatchLineW
CMP_WaitNoPendingInstallEvents
SHAddToRecentDocs
PathCompactPathW
PathCreateFromUrlA
SHQueryInfoKeyW
PathRemoveExtensionA
AssocCreate
PathAddBackslashW
StrRChrIA
StrPBrkW
CharToOemW
DlgDirListComboBoxW
SetMenuItemInfoA
SetUserObjectInformationA
MessageBoxA
GetClipboardOwner
CreateWindowStationW
LoadKeyboardLayoutA
GetCaretPos
LockSetForegroundWindow
GetMenuContextHelpId
HttpOpenRequestA
HttpQueryInfoA
midiOutMessage
CryptCATPersistStore
WintrustRemoveActionID
g_rgSCardRawPci
Ord(30)
iswalpha
towupper
OleDoAutoConvert
RegisterDragDrop
OleSetClipboard
CreateAntiMoniker
PdhCloseQuery
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
7.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5010.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
JG MIDI player DLL

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
62976

EntryPoint
0x8f3f

OriginalFileName
jgmp500.dll

MIMEType
application/octet-stream

LegalCopyright
(c)1996 AOL/Johnson-Grace Company

FileVersion
5010

TimeStamp
2004:08:04 09:56:09+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
JGMP

ProductVersion
5010

SubsystemVersion
5.1

OSVersion
5.0

FileOS
Windows 16-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Johnson-Grace Company

CodeSize
46592

ProductName
JGMP

ProductVersionNumber
5010.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 97b8a3f0d479cd890f64536182d0e5d9
SHA1 32607490862f2c5bc91bbaeaf7e577d17f81b1aa
SHA256 00f97e3e228853a1c0006d002d67013748a5d1423c31a562a91a35a5ee6bc2f0
ssdeep
3072:P2EOUXtL7TZ9kgDWASTJiEfjlfM3uydSMnGqi4:P2EOMtjtPuFjlMaMn

authentihash b7f02ab09eab9d85f713cb49c9b84b3f51fcd7a1fc447e09640cbe59f9151fc8
imphash 7bfd0e869a482793bf2dfdfa99ac43ae
File size 199.0 KB ( 203776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-22 22:08:14 UTC ( 3 months ago )
Last submission 2018-12-22 22:08:14 UTC ( 3 months ago )
File names jgmp500.dll
JGMP
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!