× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 056e7e3ee8955de4aeb0d2e7a3aac047139a6ab7425e0425aa8dee1c2a863a2d
File name: ICQ 8.4 build 7786.exe
Detection ratio: 0 / 57
Analysis date: 2016-03-31 07:27:58 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160331
AegisLab 20160331
AhnLab-V3 20160330
Alibaba 20160323
ALYac 20160331
Antiy-AVL 20160331
Arcabit 20160331
Avast 20160331
AVG 20160331
Avira (no cloud) 20160331
AVware 20160331
Baidu 20160331
Baidu-International 20160330
BitDefender 20160331
Bkav 20160330
CAT-QuickHeal 20160330
ClamAV 20160331
CMC 20160322
Comodo 20160331
Cyren 20160331
DrWeb 20160331
Emsisoft 20160331
ESET-NOD32 20160331
F-Prot 20160331
F-Secure 20160331
Fortinet 20160330
GData 20160331
Ikarus 20160331
Jiangmin 20160331
K7AntiVirus 20160330
K7GW 20160331
Kaspersky 20160331
Kingsoft 20160331
Malwarebytes 20160331
McAfee 20160331
McAfee-GW-Edition 20160331
Microsoft 20160330
eScan 20160331
NANO-Antivirus 20160331
nProtect 20160330
Panda 20160330
Qihoo-360 20160331
Rising 20160331
Sophos AV 20160331
SUPERAntiSpyware 20160331
Symantec 20160331
Tencent 20160331
TheHacker 20160330
TotalDefense 20160330
TrendMicro 20160331
TrendMicro-HouseCall 20160331
VBA32 20160331
VIPRE 20160331
ViRobot 20160331
Yandex 20160316
Zillya 20160331
Zoner 20160331
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2001 - 2014

Product ICQ
Original name icqsetup.exe
Internal name icq
File version 8, 4, 7786, 0
Description ICQ
Signature verification Signed file, verified signature
Signing date 11:30 AM 9/11/2015
Signers
[+] ICQ LTD
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 8/13/2013
Valid to 12:59 AM 8/13/2016
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 7902AAEE0CA9DF28957519AB432AF1808BF29EC8
Serial number 3C D0 B6 2D DB 9C 53 5F D0 3D 4E F0 A7 5D 7C E4
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-09-11 09:27:11
Entry Point 0x002CC3F7
Number of sections 5
PE sections
Overlays
MD5 78e4b845b924c3470a575f990813362b
File type data
Offset 37250560
Size 7688
Entropy 7.34
PE imports
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
ConvertSidToStringSidW
RegCreateKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueW
RegQueryValueExW
GetFileSecurityW
ConvertStringSidToSidW
OpenProcessToken
DeregisterEventSource
RegEnumKeyW
SetFileSecurityW
RegisterEventSourceA
SetTokenInformation
RegOpenKeyW
LookupAccountNameW
RegQueryValueW
GetTokenInformation
DuplicateTokenEx
GetUserNameW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
CreateProcessAsUserW
RegEnumValueW
RegSetValueExW
EqualSid
ReportEventA
SetDIBits
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetNearestColor
SetICMMode
CombineRgn
PlayMetaFile
GetROP2
GetClipRgn
GetViewportOrgEx
GetObjectType
CreateMetaFileW
SetColorAdjustment
GetBoundsRect
SetLayout
SetPixel
EndDoc
DeleteObject
SetPaletteEntries
OffsetWindowOrgEx
CreateEllipticRgn
GetColorSpace
GetTextFaceW
CreatePalette
CreateDIBitmap
GetPolyFillMode
GetDIBits
SetTextAlign
StretchBlt
StretchDIBits
ScaleViewportExtEx
ArcTo
GetPaletteEntries
SetWindowExtEx
CreateDIBSection
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
CreateRectRgnIndirect
LPtoDP
GetBitmapBits
GetLayout
PolyDraw
CloseMetaFile
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
CreateBitmap
PtInRegion
OffsetClipRgn
BitBlt
GetDeviceCaps
FillRgn
SetAbortProc
FrameRgn
ScaleWindowExtEx
PtVisible
GetLogColorSpaceW
ExtSelectClipRgn
SelectPalette
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
SetGraphicsMode
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
EnumMetaFile
SetStretchBltMode
Rectangle
Polygon
GetObjectA
CreateDCA
LineTo
DeleteDC
SetWorldTransform
GetMapMode
CreateFontIndirectW
GetCharWidthW
StartPage
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
IntersectClipRect
SelectClipPath
RectVisible
GetStockObject
GetBkMode
GdiFlush
SelectClipRgn
RoundRect
GetTextAlign
SetWindowOrgEx
SelectObject
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
CreatePolygonRgn
PolylineTo
GetRgnBox
SaveDC
ModifyWorldTransform
RestoreDC
GetPixel
SetMapperFlags
CreateSolidBrush
SetDIBitsToDevice
GdiAlphaBlend
SetTextColor
ExtFloodFill
GetCurrentObject
ExcludeClipRect
GetClipBox
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetBrushOrgEx
CreateRectRgn
Escape
StartDocW
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
SetTextJustification
GetStretchBltMode
Polyline
DPtoLP
AbortDoc
Ellipse
DeleteMetaFile
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetProfileIntW
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
SetEvent
FindFirstFileW
HeapDestroy
EncodePointer
ReplaceFileW
GetFileAttributesW
lstrcmpW
VerifyVersionInfoW
CreatePipe
GetCurrentProcess
GetConsoleMode
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
_llseek
FreeEnvironmentStringsW
HeapSize
SetStdHandle
GetFileTime
GetCPInfo
GetDiskFreeSpaceW
InterlockedExchange
GetTempPathW
GetTimeZoneInformation
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
GlobalHandle
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
GetPrivateProfileSectionNamesW
OutputDebugStringA
GetCurrentThread
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
PeekNamedPipe
ReadConsoleInputA
LocalLock
LoadResource
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
HeapAlloc
GetSystemDefaultLCID
GetStringTypeExW
GetVersionExA
LoadLibraryA
GetSystemDefaultLangID
VerSetConditionMask
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesW
InterlockedDecrement
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
GlobalMemoryStatus
GetPrivateProfileStringW
SetFilePointer
_lclose
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
MoveFileExW
GetSystemDirectoryW
DeleteCriticalSection
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
GetNumberOfConsoleInputEvents
TerminateProcess
SearchPathW
GetModuleHandleExW
SetCurrentDirectoryW
VirtualQuery
CopyFileW
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
ReadConsoleW
GetVersion
GetProcAddress
WriteConsoleW
CreateToolhelp32Snapshot
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetSystemTime
TerminateThread
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
GlobalFindAtomW
GlobalSize
LeaveCriticalSection
UnlockFile
FlushConsoleInputBuffer
GetWindowsDirectoryW
SetHandleInformation
GetFileSize
GlobalDeleteAtom
OpenProcess
GetModuleHandleW
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
_lread
GetProcessHeap
GetTempFileNameW
WriteFile
GetTimeFormatW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
GetModuleFileNameW
GetFileInformationByHandle
lstrcmpA
FindFirstFileExA
FindNextFileW
CompareStringA
FindNextFileA
IsValidLocale
DuplicateHandle
FindFirstFileExW
GlobalLock
GlobalAlloc
GetPrivateProfileIntW
CreateEventW
CreateFileW
CopyFileA
GetFileType
TlsSetValue
ExitProcess
LocalUnlock
GetLocaleInfoW
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
CompareStringW
GetThreadLocale
GetVolumeInformationW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
Process32NextW
OpenFile
Module32FirstW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
GetAtomNameW
CreateSemaphoreW
InterlockedCompareExchange
Process32FirstW
WritePrivateProfileStringW
SuspendThread
ExpandEnvironmentStringsW
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetEndOfFile
GlobalFlags
LoadLibraryExW
FindFirstFileA
CloseHandle
PeekConsoleInputA
GetACP
GetCurrentThreadId
FreeResource
_lwrite
GetFileAttributesExW
GetLocalTime
IsValidCodePage
SetConsoleMode
FindResourceExW
CreateProcessW
Sleep
SetThreadPriority
SystemTimeToTzSpecificLocalTime
OpenSemaphoreW
VirtualAlloc
ResetEvent
TransparentBlt
AlphaBlend
NetUserEnum
NetUserGetInfo
NetApiBufferFree
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
SysStringLen
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SafeArrayDestroyData
OleCreateFontIndirect
SysAllocString
SafeArrayCreate
SafeArrayAllocDescriptor
VariantCopy
SafeArrayGetElemsize
VariantInit
SafeArrayAllocData
CreateErrorInfo
SafeArrayAccessData
SafeArrayGetLBound
VarBstrFromDate
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayGetUBound
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SafeArrayLock
LoadRegTypeLib
VariantChangeType
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayDestroyDescriptor
VarBstrFromCy
VarCyFromStr
SafeArrayRedim
SafeArrayCopy
SetErrorInfo
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
RegisterTypeLib
VariantClear
SysReAllocStringLen
OleLoadPicture
VarDateFromStr
GetErrorInfo
SafeArrayGetDim
SafeArrayPutElement
EnumProcesses
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
GetModuleFileNameExW
RpcBindingFree
NdrClientCall2
RpcBindingFromStringBindingW
RpcStringBindingComposeW
UuidCreate
RpcBindingSetOption
RpcStringFreeW
SHGetFolderPathW
SHCreateDirectoryExW
SHBrowseForFolderW
DragQueryFileW
Ord(680)
SHGetDesktopFolder
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
FindExecutableW
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
ExtractIconW
SHAddToRecentDocs
SHGetSpecialFolderPathW
SHGetMalloc
CommandLineToArgvW
DragFinish
PathIsRelativeW
SHDeleteKeyW
PathFindFileNameW
SHStrDupW
PathRemoveFileSpecW
PathIsUNCW
PathFindExtensionW
StrFormatKBSizeW
SHDeleteValueW
PathStripToRootW
AssocQueryStringW
PathIsRootW
PathIsDirectoryW
PathRemoveExtensionW
RedrawWindow
GetMessagePos
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
SetTimer
ScreenToClient
ScrollWindowEx
WindowFromPoint
IntersectRect
GetMessageTime
SetMenuItemInfoW
SendMessageW
SetActiveWindow
DispatchMessageW
GetAsyncKeyState
MapDialogRect
GetMenuStringW
GetMenu
UnregisterClassW
GetClassInfoW
CreateAcceleratorTableW
DefWindowProcW
GetDlgItemTextW
SetScrollPos
InSendMessage
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
GetKeyboardState
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
CopyAcceleratorTableW
GetWindowTextLengthW
GetMenuBarInfo
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
DrawTextW
CopyImage
PtInRect
DrawEdge
GetUserObjectInformationW
GetClassInfoExW
UpdateWindow
EnumDisplayMonitors
EqualRect
SetClassLongW
EnumWindows
CheckRadioButton
MapVirtualKeyExW
GetMessageW
GetDoubleClickTime
DrawFrameControl
GetNextDlgGroupItem
SetPropW
SetDlgItemInt
DefMDIChildProcW
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
GetDC
CharUpperW
MapWindowPoints
GetSystemMenu
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
GetDlgItemInt
SetClipboardData
GetTabbedTextExtentW
GetIconInfo
SetParent
RegisterClassW
IsZoomed
IsWindowVisible
DestroyWindow
WindowFromDC
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
TrackPopupMenuEx
DrawFocusRect
OpenClipboard
LoadStringW
ShowOwnedPopups
FillRect
MonitorFromPoint
SetWindowContextHelpId
DeferWindowPos
GetDialogBaseUnits
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
EndPaint
GetUpdateRect
CharNextW
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
ReleaseCapture
EmptyClipboard
BeginPaint
OffsetRect
EndDialog
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
GetComboBoxInfo
SendNotifyMessageW
TranslateAcceleratorW
GetClipboardData
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetMenuDefaultItem
SetCapture
DrawIcon
EnumChildWindows
DrawTextExW
CharLowerW
SendDlgItemMessageW
PostMessageW
MonitorFromRect
GetPropW
CharToOemW
CreateDialogParamW
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
GetDCEx
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
GetWindowPlacement
ClientToScreen
GetProcessWindowStation
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
IsDlgButtonChecked
DestroyAcceleratorTable
CheckDlgButton
ValidateRect
IsDialogMessageW
LoadCursorW
LoadIconW
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
NotifyWinEvent
GetMenuItemInfoW
GetCursorPos
CreateDialogIndirectParamW
ReleaseDC
GetScrollRange
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
HideCaret
GetKeyboardLayout
CopyRect
GetCapture
GetDlgCtrlID
ShowWindow
GetShellWindow
SetWindowLongW
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
MessageBoxW
DefFrameProcW
LockWindowUpdate
GetMenuState
RegisterClassExW
SetMenu
SetRectEmpty
DialogBoxParamW
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetFocus
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
TrackMouseEvent
DestroyIcon
GetTopWindow
GetWindowLongW
BeginDeferWindowPos
WinHelpW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CallWindowProcW
GetClassNameW
InvalidateRect
TranslateMDISysAccel
GetClientRect
IsRectEmpty
IsMenu
SendMessageTimeoutW
CreateMenu
InsertMenuItemW
CloseClipboard
SetCursor
UnhookWindowsHookEx
RemovePropW
IsAppThemed
GetThemeSysColor
GetWindowTheme
GetCurrentThemeName
DrawThemeText
OpenThemeData
DrawThemeParentBackground
CloseThemeData
DrawThemeBackground
GetThemeColor
IsThemeBackgroundPartiallyTransparent
GetThemePartSize
WinHttpGetIEProxyConfigForCurrentUser
FindCloseUrlCache
InternetQueryOptionW
DeleteUrlCacheEntryA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
InternetSetCookieExW
InternetGetCookieExW
PlaySoundW
ClosePrinter
GetJobW
DocumentPropertiesW
OpenPrinterW
setsockopt
htons
htonl
socket
gethostbyname
closesocket
ntohl
inet_addr
send
WSAEventSelect
ioctlsocket
WSAEnumNetworkEvents
ntohs
select
inet_ntoa
WSACreateEvent
recv
getnameinfo
WSAGetLastError
connect
recvfrom
getsockname
bind
accept
WSAAsyncSelect
WSAStartup
shutdown
sendto
WSASetLastError
WSACleanup
getpeername
GdipBitmapLockBits
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCreateBitmapFromFileICM
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleLockRunning
CoUninitialize
OleCreateLinkFromData
OleCreate
OleTranslateAccelerator
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
StgCreateDocfile
OleDuplicateData
CoInitialize
OleCreateLinkToFile
StringFromGUID2
OleSaveToStream
ReadClassStg
CreateStreamOnHGlobal
CreateItemMoniker
OleFlushClipboard
ReleaseStgMedium
CoTreatAsClass
SetConvertStg
OleCreateFromData
GetHGlobalFromILockBytes
OleCreateFromFile
OleRegGetMiscStatus
StringFromCLSID
OleSave
CoRegisterMessageFilter
RevokeDragDrop
ReadFmtUserTypeStg
OleGetClipboard
OleLoad
CLSIDFromString
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
CoGetClassObject
CoGetMalloc
CoRegisterClassObject
OleRegGetUserType
OleInitialize
CoLockObjectExternal
OleCreateStaticFromData
CoCreateInstance
OleRegEnumVerbs
StgOpenStorage
CreateGenericComposite
OleGetIconOfClass
OleRun
WriteClassStm
PropVariantCopy
OleQueryCreateFromData
OleSetContainedObject
StgIsStorageFile
CoInitializeEx
OleQueryLinkFromData
OleSetClipboard
CreateDataAdviseHolder
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
IsAccelerator
GetRunningObjectTable
CLSIDFromProgID
WriteClassStg
CoRevokeClassObject
CoFreeUnusedLibraries
OleIsRunning
CreateBindCtx
CreateFileMoniker
CoDisconnectObject
OleSetMenuDescriptor
OleCreateMenuDescriptor
CoCreateGuid
OleIsCurrentClipboard
PropVariantClear
CoTaskMemFree
RegisterDragDrop
WriteFmtUserTypeStg
OleUIBusyW
UrlMkGetSessionOption
Number of PE resources by type
RT_ICON 42
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 15
RT_DIALOG 9
GIF 9
RT_GROUP_ICON 4
RT_BITMAP 3
RT_MANIFEST 2
TOKEN 2
FILES 1
XML 1
BMP 1
RT_VERSION 1
LANG 1
Number of PE resources by language
RUSSIAN 121
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

InitializedDataSize
33064448

ImageVersion
0.0

ProductName
ICQ

FileVersionNumber
8.4.7786.0

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
11.0

FileTypeExtension
exe

OriginalFileName
icqsetup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
8, 4, 7786, 0

TimeStamp
2015:09:11 10:27:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
icq

ProductVersion
8, 4, 7786, 0

FileDescription
ICQ

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright (C) 2001 - 2014

MachineType
Intel 386 or later, and compatibles

CompanyName
ICQ

CodeSize
4313088

FileSubtype
0

ProductVersionNumber
8.4.7786.0

EntryPoint
0x2cc3f7

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 5a1edef853eb4123a4b6b85c1f185523
SHA1 fc657fb56d64db8ccd0c11f5794cd11378b4f625
SHA256 056e7e3ee8955de4aeb0d2e7a3aac047139a6ab7425e0425aa8dee1c2a863a2d
ssdeep
786432:Rn2cZm2VBrEM/pcZef8SqIdTwlfzA2kzSk5S/lL:RndlrtnrqIeoLwL

authentihash bac1783d6db65714ca54a12425b7d74cffd89fb58dfe76118f1264f4b9f579bb
imphash 47958813ba02f786eb469d292c54ba36
File size 35.5 MB ( 37258248 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe overlay signed via-tor

VirusTotal metadata
First submission 2015-09-11 17:41:20 UTC ( 3 years, 2 months ago )
Last submission 2018-10-30 08:47:48 UTC ( 2 weeks, 6 days ago )
File names icq_rfrset.exe
ICQ 8.4 build 7786.exe
icq_8-4_fr_35432.exe
aircrack ultra edition
icq_rfrset_1415.exe
ICQ 8.4.exe
icq_rfrset_ICQ7install_icq7.exe
icq.exe
ICQ 8.4 Build 7786.exe
icq_rfrset.exe
icq_rfrset.exe
icq_rfrset_8.4.7786.exe
ICQ 8.4 Build 7786.exe
1
icq_8.4.exe
icqsetup.exe
icq_847786.exe
icq_rfrset (3).exe
icq_rfrset (1).exe
icqsetup.exe
mmm
ICQ 8.4.7786.exe
icq_rfrset.exe
icq
icqsetup.exe
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!