× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 09e8c22849671880e018b80c698725aa5dd194ab6f0801a2128769f91fc23314
File name: crcutil.exe
Detection ratio: 0 / 41
Analysis date: 2012-08-30 02:53:53 UTC ( 4 years, 10 months ago )
Antivirus Result Update
AhnLab-V3 20120829
AntiVir 20120829
Antiy-AVL 20120830
Avast 20120829
AVG 20120830
BitDefender 20120830
ByteHero 20120827
CAT-QuickHeal 20120829
ClamAV 20120828
Commtouch 20120830
Comodo 20120830
DrWeb 20120830
Emsisoft 20120830
eSafe 20120828
ESET-NOD32 20120829
F-Prot 20120829
F-Secure 20120830
Fortinet 20120830
GData 20120830
Ikarus 20120830
Jiangmin 20120829
K7AntiVirus 20120829
Kaspersky 20120830
McAfee 20120830
McAfee-GW-Edition 20120829
Microsoft 20120830
Norman 20120829
nProtect 20120829
Panda 20120829
PCTools 20120830
Rising 20120829
Sophos 20120830
SUPERAntiSpyware 20120829
Symantec 20120830
TheHacker 20120829
TotalDefense 20120829
TrendMicro 20120830
TrendMicro-HouseCall 20120830
VBA32 20120829
VIPRE 20120829
ViRobot 20120829
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Calwell Inc.

Publisher Calwell Inc.
Original name crcutil.exe
Internal name CRCutil
File version 2.2.0.2
Description CRCutil
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0005EC20
Number of sections 8
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
GetOpenFileNameA
GetDIBColorTable
GetWindowOrgEx
PatBlt
GetClipBox
GetCurrentPositionEx
SaveDC
CreateFontIndirectA
GetTextMetricsA
MaskBlt
SetStretchBltMode
GetPixel
GetObjectA
ExcludeClipRect
LineTo
DeleteDC
RestoreDC
SetBkMode
GetSystemPaletteEntries
SetPixel
CreateSolidBrush
IntersectClipRect
CreateHalftonePalette
CreateDIBSection
RealizePalette
SetTextColor
GetDeviceCaps
MoveToEx
BitBlt
CreateBitmap
RectVisible
CreatePalette
GetStockObject
CreateDIBitmap
SetViewportOrgEx
SelectPalette
ExtTextOutA
UnrealizeObject
GetDIBits
SetBrushOrgEx
GetDCOrgEx
GetBrushOrgEx
StretchBlt
GetBitmapBits
CreateCompatibleDC
SetROP2
SelectObject
GetTextExtentPoint32A
GetPaletteEntries
SetDIBColorTable
CreateBrushIndirect
SetWindowOrgEx
SetBkColor
DeleteObject
CreateCompatibleBitmap
CreatePenIndirect
SetThreadLocale
GetLastError
GetStdHandle
EnterCriticalSection
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
MulDiv
ExitProcess
GetThreadLocale
GetVersionExA
VirtualProtect
GlobalUnlock
GetModuleFileNameA
GlobalHandle
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetStartupInfoA
LoadLibraryExA
SizeofResource
GetSystemTime
GetLocaleInfoA
LocalAlloc
GlobalAddAtomA
LockResource
SetErrorMode
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetCPInfo
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
CompareStringA
CloseHandle
WideCharToMultiByte
GetModuleHandleA
FindFirstFileA
GetCurrentProcessId
GlobalReAlloc
lstrcpyA
EnumCalendarInfoA
ReadFile
lstrcpynA
GetDiskFreeSpaceA
CreateThread
GlobalLock
FreeResource
GlobalAlloc
SetEvent
LocalFree
FindResourceA
GetVersion
InitializeCriticalSection
LoadResource
WriteFile
VirtualQuery
VirtualFree
CreateEventA
FindClose
InterlockedDecrement
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
InterlockedIncrement
IsEqualGUID
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
SysReAllocStringLen
SysFreeString
VariantChangeTypeEx
MapWindowPoints
GetForegroundWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
SetMenuItemInfoA
WindowFromPoint
DrawIcon
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
SetScrollPos
CallNextHookEx
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
ScrollWindow
GetWindowTextA
GetKeyState
PtInRect
DrawEdge
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
DefMDIChildProcA
ShowWindow
SetClassLongA
GetPropA
GetDesktopWindow
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
CharLowerA
IsZoomed
GetWindowPlacement
GetKeyboardLayoutList
DrawMenuBar
IsIconic
RegisterClassA
GetMenuItemCount
GetWindowLongA
SetTimer
OemToCharA
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
CreateMenu
DestroyWindow
IsChild
IsDialogMessageA
SetFocus
CreateWindowExA
MapVirtualKeyA
SetCapture
BeginPaint
OffsetRect
GetScrollPos
KillTimer
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
DrawIconEx
GetDCEx
GetDlgItem
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
GetMenuState
GetKeyboardLayout
GetSystemMenu
GetDC
SetForegroundWindow
DrawTextA
IntersectRect
GetScrollInfo
GetCapture
WaitMessage
FindWindowA
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
CallWindowProcA
MessageBoxA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
LoadKeyboardLayoutA
GetSysColor
SetScrollInfo
GetMenuItemInfoA
SystemParametersInfoA
DestroyIcon
GetKeyNameTextA
IsWindowVisible
WinHelpA
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
CreateIcon
IsRectEmpty
GetCursor
GetFocus
GetKeyboardType
SetMenu
SetCursor
Number of PE resources by type
RT_STRING 12
RT_GROUP_CURSOR 7
RT_CURSOR 7
RT_RCDATA 3
RT_ICON 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 29
ENGLISH US 3
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
145408

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.2.0.2

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
CRCutil

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Calwell Inc.

FileVersion
2.2.0.2

TimeStamp
1992:06:19 15:22:17-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
CRCutil

ProductVersion
2.2

UninitializedDataSize
0

OSVersion
1.0

OriginalFilename
crcutil.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Calwell Inc.

CodeSize
384512

ProductVersionNumber
2.2.0.2

EntryPoint
0x5ec20

ObjectFileType
Executable application

File identification
MD5 4c878b19bbb8c9decfe8f235e61c811c
SHA1 93ed724b9f33207f8f4afea167a035e51f5e484f
SHA256 09e8c22849671880e018b80c698725aa5dd194ab6f0801a2128769f91fc23314
ssdeep
12288:b1mq6E/XwQvZVgW9Vaxhi6Lp8qOZoaEDfXKtoK:5mq6ExLe8neaEDaSK

File size 518.5 KB ( 530944 bytes )
File type Win32 EXE
Magic literal
MS-DOS executable PE for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (39.8%)
Win32 Executable Generic (23.1%)
Win32 Dynamic Link Library (generic) (20.5%)
Win16/32 Executable Delphi generic (5.6%)
Generic Win/DOS Executable (5.4%)
Tags
peexe

VirusTotal metadata
First submission 2012-08-30 02:53:53 UTC ( 4 years, 10 months ago )
Last submission 2012-08-30 02:53:53 UTC ( 4 years, 10 months ago )
File names CRCutil
crcutil.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!