× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 05515a78d5d59a24c37075f7fcb0d1554b7f0208047fa0b1a8cfcb2d741ef099
File name: avesvc.dll
Detection ratio: 0 / 56
Analysis date: 2015-03-15 16:05:33 UTC ( 3 years, 11 months ago )
Antivirus Result Update
Ad-Aware 20150315
AegisLab 20150315
Yandex 20150314
AhnLab-V3 20150315
Alibaba 20150315
ALYac 20150315
Avast 20150315
AVG 20150315
Avira (no cloud) 20150315
AVware 20150315
Baidu-International 20150315
BitDefender 20150315
Bkav 20150314
ByteHero 20150315
CAT-QuickHeal 20150314
ClamAV 20150314
CMC 20150313
Comodo 20150315
Cyren 20150315
DrWeb 20150315
Emsisoft 20150315
ESET-NOD32 20150315
F-Prot 20150315
F-Secure 20150315
Fortinet 20150315
GData 20150315
Ikarus 20150315
Jiangmin 20150314
K7AntiVirus 20150315
K7GW 20150315
Kaspersky 20150315
Kingsoft 20150315
Malwarebytes 20150315
McAfee 20150315
McAfee-GW-Edition 20150315
Microsoft 20150315
eScan 20150315
NANO-Antivirus 20150315
Norman 20150315
nProtect 20150313
Panda 20150311
Qihoo-360 20150315
Rising 20150315
Sophos AV 20150315
SUPERAntiSpyware 20150315
Symantec 20150315
Tencent 20150315
TheHacker 20150313
TotalDefense 20150315
TrendMicro 20150315
TrendMicro-HouseCall 20150315
VBA32 20150314
VIPRE 20150315
ViRobot 20150315
Zillya 20150315
Zoner 20150313
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© 2000 - 2013 ???????? Avira Operations GmbH & Co. KG ? ?? ?????????

Publisher Avira Operations GmbH & Co. KG
Product Avira Antivirus Premium
File version 13.6.0.400
Description Avira Engine Service Library
Signature verification Signed file, verified signature
Signing date 12:04 PM 12/4/2012
Signers
[+] Avira Operations GmbH & Co. KG
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 7/20/2011
Valid to 12:59 AM 7/20/2014
Valid usage Code Signing
Algorithm SHA1
Thumbprint 579E1917CA0EDFEDE3642646A474C28C1E8B48B1
Serial number 54 97 1F F2 38 D2 B8 66 F2 7F C3 FE 6C 9A D5 77
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer None
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer None
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer None
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-04 10:14:39
Entry Point 0x00018059
Number of sections 5
PE sections
PE imports
DuplicateTokenEx
RegEnumValueW
RevertToSelf
RegCloseKey
OpenProcessToken
RegOpenKeyExW
ImpersonateLoggedOnUser
SetThreadToken
RegDisablePredefinedCache
RegQueryValueExW
GetSystemTime
GetLastError
InterlockedDecrement
HeapFree
LoadLibraryExW
SystemTimeToFileTime
lstrcpynW
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
SetEvent
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
lstrlenW
GetLocalTime
HeapAlloc
GetCurrentProcess
EnterCriticalSection
OpenFileMappingW
SetThreadPriority
GetFileSize
OpenProcess
UnhandledExceptionFilter
GetDateFormatW
SetErrorMode
HeapSize
CreateDirectoryW
DeleteFileW
lstrcatW
GetPrivateProfileIntW
InterlockedCompareExchange
GetPrivateProfileStringW
GetProcessHeap
LeaveCriticalSection
GetTimeFormatW
lstrcpyW
InterlockedExchangeAdd
CreateThread
MapViewOfFile
DeleteCriticalSection
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
GetTempPathW
CreateMutexW
CloseHandle
GetSystemTimeAsFileTime
FindFirstFileW
HeapReAlloc
DecodePointer
GetModuleHandleW
FreeLibrary
LocalFree
FormatMessageW
TerminateProcess
LoadLibraryW
CreateEventW
ResetEvent
InitializeCriticalSection
UnmapViewOfFile
CreateFileW
WaitForMultipleObjects
FindClose
HeapDestroy
Sleep
MoveFileW
EncodePointer
GetCurrentThreadId
GetProcAddress
GetCurrentProcessId
SetLastError
InterlockedIncrement
?_Pninc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEPA_WXZ
?setbuf@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEPAV12@PA_W_J@Z
?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAE_JPB_W_J@Z
?showmanyc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JXZ
?_BADOFF@std@@3_JB
?setg@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEXPA_W00@Z
?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV12@XZ
??1?$basic_iostream@_WU?$char_traits@_W@std@@@std@@UAE@XZ
?_Lock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ
?imbue@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEXABVlocale@2@@Z
??0?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAE@XZ
?_Xlength_error@std@@YAXPBD@Z
?setp@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@IAEXPA_W0@Z
?_Xout_of_range@std@@YAXPBD@Z
?_Ios_base_dtor@ios_base@std@@CAXPAV12@@Z
?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEXXZ
??0?$basic_iostream@_WU?$char_traits@_W@std@@@std@@QAE@PAV?$basic_streambuf@_WU?$char_traits@_W@std@@@1@@Z
?sync@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEHXZ
?xsgetn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JPA_W_J@Z
?uncaught_exception@std@@YA_NXZ
??1?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAE@XZ
?xsputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAE_JPB_W_J@Z
?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QAEXH_N@Z
?_Unlock@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@UAEXXZ
??_7?$basic_ios@_WU?$char_traits@_W@std@@@std@@6B@
?uflow@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@MAEGXZ
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QAEG_W@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QAEAAV01@K@Z
??1?$basic_ios@_WU?$char_traits@_W@std@@@std@@UAE@XZ
??_7ios_base@std@@6B@
_malloc_crt
malloc
_lock
strtoul
?what@exception@std@@UBEPBDXZ
realloc
memset
fread
__dllonexit
strtok_s
_waccess
calloc
wcsncpy_s
_wcsicmp
fprintf
swscanf
_vsnwprintf_s
wcscpy_s
fflush
feof
__clean_type_info_names_internal
_amsg_exit
?terminate@@YAXXZ
_initterm_e
?_type_info_dtor_internal_method@type_info@@QAEXXZ
memcpy_s
_errno
??2@YAPAXI@Z
fwrite
fseek
_vswprintf
_onexit
_unlock
_snprintf
strncpy_s
_itow
wcsncat
_filelength
wcsncpy
wcsrchr
_wsopen
_close
strncat
_CxxThrowException
_snwprintf
memmove_s
_lseek
fclose
_crt_debugger_hook
??3@YAXPAX@Z
free
__CxxFrameHandler3
_except_handler4_common
atoi
wcsncmp
_wfopen
fwprintf
memcpy
??0exception@std@@QAE@ABV01@@Z
_swprintf
??1exception@std@@UAE@XZ
memmove
wcsncat_s
mbstowcs
wcstombs
??0exception@std@@QAE@ABQBD@Z
wcschr
_beginthreadex
_encoded_null
wcsnlen
__CppXcptFilter
wcsstr
_initterm
_read
_wtoi
LoadStringW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
PE exports
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 1
ENGLISH US 1
PE resources
ExifTool file metadata
LegalTrademarks
AntiVir Avira GmbH.

UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
13.6.0.400

LanguageCode
Neutral 2

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
33792

MIMEType
application/octet-stream

LegalCopyright
2000 - 2013 Avira Operations GmbH & Co. KG

FileVersion
13.6.0.400

TimeStamp
2012:12:04 11:14:39+01:00

FileType
Win32 DLL

PEType
PE32

SubsystemVersion
5.1

ProductVersion
13.6.0.400

FileDescription
Avira Engine Service Library

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Avira Operations GmbH & Co. KG

CodeSize
97280

ProductName
Avira Antivirus Premium

ProductVersionNumber
13.6.0.400

EntryPoint
0x18059

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 67291a1464dca120033821d8a80bf0c9
SHA1 9d2e9d0eba9ff1539b174c4b24fe5815f4fc5136
SHA256 05515a78d5d59a24c37075f7fcb0d1554b7f0208047fa0b1a8cfcb2d741ef099
ssdeep
3072:MOv+CcqJiJkHh13vKV69BOV7UOTWkZMmpnnOBsvC6nQp:Fvqq4chRw69BOVQORZzlOBsSp

authentihash 050f8194859582fc18e8ea79d48b066754a4609dc0877739b3905c8bc61d0266
imphash 2a8293cbb70aefc0252e7ac4f82483a3
File size 135.3 KB ( 138528 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
pedll signed

VirusTotal metadata
First submission 2015-02-14 18:53:52 UTC ( 4 years ago )
Last submission 2015-02-14 18:53:52 UTC ( 4 years ago )
File names avesvc.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!