× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0a80926b048a7fe29dad42661f5387bfc025cb3f25b5d011a6320460a565aed0
File name: Local Importer
Detection ratio: 0 / 69
Analysis date: 2018-11-29 12:15:39 UTC ( 4 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20181129
AegisLab 20181129
AhnLab-V3 20181129
Alibaba 20180921
ALYac 20181129
Antiy-AVL 20181129
Arcabit 20181129
Avast 20181129
Avast-Mobile 20181129
AVG 20181129
Avira (no cloud) 20181129
Babable 20180918
Baidu 20181129
BitDefender 20181129
Bkav 20181129
CAT-QuickHeal 20181129
ClamAV 20181129
CMC 20181129
Comodo 20181129
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181129
Cyren 20181129
DrWeb 20181129
eGambit 20181129
Emsisoft 20181129
Endgame 20181108
ESET-NOD32 20181129
F-Prot 20181129
F-Secure 20181129
Fortinet 20181129
GData 20181129
Ikarus 20181129
Sophos ML 20181128
Jiangmin 20181129
K7AntiVirus 20181129
K7GW 20181129
Kaspersky 20181129
Kingsoft 20181129
Malwarebytes 20181129
MAX 20181129
McAfee 20181129
McAfee-GW-Edition 20181129
Microsoft 20181129
eScan 20181129
NANO-Antivirus 20181129
Palo Alto Networks (Known Signatures) 20181129
Panda 20181128
Qihoo-360 20181129
Rising 20181129
SentinelOne (Static ML) 20181011
Sophos AV 20181129
SUPERAntiSpyware 20181128
Symantec 20181129
Symantec Mobile Insight 20181121
TACHYON 20181129
Tencent 20181129
TheHacker 20181126
TotalDefense 20181129
Trapmine 20181128
TrendMicro 20181129
TrendMicro-HouseCall 20181129
Trustlook 20181129
VBA32 20181129
VIPRE 20181128
ViRobot 20181129
Webroot 20181129
Yandex 20181128
Zillya 20181128
ZoneAlarm by Check Point 20181129
Zoner 20181129
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 2008, 2009, 2010, 2011, 2012 Sony Corporation

Product Local Importer
Original name LocalImporter.dll
Internal name Local Importer
File version 3.0.1.13060
Description Local Importer DLL
Signature verification Signed file, verified signature
Signing date 8:08 AM 1/6/2012
Signers
[+] Sony Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 3/28/2011
Valid to 12:59 AM 3/28/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 08FF0D3EBD2CB8995D62BA1D28566F6329C0E1A9
Serial number 40 1D 53 63 BE F0 AF BF 01 73 32 12 30 3B D7 ED
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 1:00 AM 6/15/2007
Valid to 12:59 AM 6/15/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-01-05 09:29:28
Entry Point 0x0000FA95
Number of sections 5
PE sections
Overlays
MD5 664c6e949abd0ddaaa97145a065d959d
File type data
Offset 224256
Size 7320
Entropy 7.27
PE imports
SetSecurityDescriptorDacl
RegCreateKeyExW
RegDeleteValueW
RevertToSelf
RegCloseKey
RegSetValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
RegQueryValueExW
DeleteDC
SelectObject
SetDIBColorTable
GetObjectW
CreateDIBSection
CreateCompatibleDC
DeleteObject
GetUserDefaultUILanguage
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
TerminateThread
GetModuleFileNameW
WaitForSingleObject
SetEvent
QueryPerformanceCounter
HeapDestroy
HeapAlloc
FindResourceExW
lstrlenW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
SizeofResource
SetThreadPriority
GetCurrentProcessId
OpenProcess
LockResource
UnhandledExceptionFilter
HeapSize
IsDebuggerPresent
WaitForMultipleObjects
InterlockedCompareExchange
GetProcessHeap
RaiseException
CreateThread
WTSGetActiveConsoleSessionId
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
FindFirstFileW
HeapReAlloc
SetPriorityClass
InterlockedExchange
TerminateProcess
CreateEventW
InitializeCriticalSection
LoadResource
FindResourceW
FindClose
InterlockedDecrement
Sleep
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
InterlockedIncrement
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
_malloc_crt
_purecall
malloc
?what@exception@std@@UBEPBDXZ
wcscpy_s
fclose
__dllonexit
_CxxThrowException
wcstol
_invalid_parameter_noinfo
wcstok_s
strlen
__clean_type_info_names_internal
_recalloc
_amsg_exit
?terminate@@YAXXZ
memset
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??2@YAPAXI@Z
_lock
_wcsicmp
_onexit
wcslen
wcscmp
abs
_encode_pointer
??_V@YAXPAX@Z
memcmp
_resetstkoflw
_decode_pointer
_crt_debugger_hook
_i64tow_s
rand_s
memmove_s
_unlock
wcschr
_adjust_fdiv
_wfopen_s
??3@YAXPAX@Z
free
__CxxFrameHandler3
_except_handler4_common
calloc
_initterm
??0exception@std@@QAE@ABV01@@Z
vswprintf_s
sprintf_s
??1exception@std@@UAE@XZ
memcpy_s
_initterm_e
??0exception@std@@QAE@ABQBD@Z
_wtof
_vscwprintf
swprintf_s
_encoded_null
__CppXcptFilter
wcsstr
??0exception@std@@QAE@XZ
_wtol
fgetws
_wtoi
LoadRegTypeLib
VarBstrCat
SafeArrayAccessData
SysStringLen
SysAllocStringLen
SysStringByteLen
SafeArrayUnaccessData
VarBstrCmp
VariantClear
SysAllocString
SafeArrayDestroy
DispCallFunc
SysReAllocString
LoadTypeLib
SysFreeString
SysAllocStringByteLen
VariantInit
SafeArrayGetElement
PathIsUNCW
PathFileExistsW
PathRemoveFileSpecW
PathFindFileNameW
?GetFilePathByItemID@SOHDBSpecRelationMgr@@QAEJPB_WPAPA_W@Z
?ImportRelation@SOHDBSpecRelationMgr@@QAEJPAVISOHDBImportSpecRelation@@@Z
?End@SOHDBSpecRelationMgr@@QAEJXZ
?DeleteNotUpdatedAllContents@SOHDBContentImportMgr@@QAEJXZ
?DeleteRelationByItemIDAndSpecID@SOHDBSpecRelationMgr@@QAEJPB_W0@Z
??0SOHDBSpecRelationMgr@@QAE@XZ
?DeleteNotUpdatedRelations@SOHDBSpecRelationMgr@@QAEJXZ
?GetItemIDByOrgID@SOHDBSpecRelationMgr@@QAEJPA_WPAPA_WJ@Z
??1SOHDBContentImportMgr@@QAE@XZ
?GetUserIDbyPlaylistID@SOHDBPlaylistImportMgr@@QAEJPB_WPAPA_W@Z
??0SOHDBContentImportMgr@@QAE@XZ
?Start@SOHDBSpecRelationMgr@@QAEJW4tagRelationTypeEnum@@PB_W_N@Z
?End@SOHDBOmakaseChannelImportMgr@@QAEJXZ
?DeleteNotUpdatedPlaylists@SOHDBPlaylistImportMgr@@QAEJXZ
?Start@SOHDBOmakaseChannelImportMgr@@QAEJJPB_W_N@Z
??1SOHDBSpecRelationMgr@@UAE@XZ
?Commit@SOHDBOmakaseChannelImportMgr@@QAEJXZ
??1SOHDBOmakaseChannelImportMgr@@UAE@XZ
??0SOHDBOmakaseChannelImportMgr@@QAE@XZ
?GetRelationByItemIDandUserID@SOHDBPlaylistImportMgr@@QAEJPB_W0@Z
?DeleteContent@SOHDBContentImportMgr@@QAEJPB_W@Z
?UpdateMusicToChannels@SOHDBOmakaseChannelImportMgr@@QAEJPB_WPAPB_WK_N@Z
?GetRelationByItemID@SOHDBSpecRelationMgr@@QAEJPB_WPAPA_W@Z
?DeleteNotUpdatedMusic@SOHDBOmakaseChannelImportMgr@@QAEJXZ
?DeleteRelation2@SOHDBSpecRelationMgr@@QAEJPB_W00@Z
?DeleteRelation@SOHDBPlaylistImportMgr@@QAEJPB_W@Z
?End@SOHDBContentImportMgr@@QAEJXZ
?GetItemIDByOrignalID@SOHDBPlaylistImportMgr@@QAEJPB_WPAPA_W@Z
?ImportContent@SOHDBContentImportMgr@@QAEJPAVISOHDBImportContent@@@Z
?InsertChannel@SOHDBOmakaseChannelImportMgr@@QAEJPAVISOHDBImportChannel@@@Z
?DeletePlaylist@SOHDBPlaylistImportMgr@@QAEJPB_W@Z
?DeleteMusicFromAllChannels@SOHDBOmakaseChannelImportMgr@@QAEJPB_W@Z
??1SOHDBPlaylistImportMgr@@UAE@XZ
?Commit@SOHDBContentImportMgr@@QAEJXZ
??0SOHDBPlaylistImportMgr@@QAE@XZ
?GetPlaylistIDByOrignalID@SOHDBPlaylistImportMgr@@QAEJPB_WPAPA_W@Z
?DeleteRelation@SOHDBSpecRelationMgr@@QAEJPB_W00@Z
?DeleteRelation@SOHDBSpecRelationMgr@@QAEJPB_W@Z
?ImportRelation@SOHDBPlaylistImportMgr@@QAEJPAVISOHDBImportPlaylistItemRelation@@@Z
?DeleteRelationByItemIDAndOwner@SOHDBSpecRelationMgr@@QAEJPB_W0@Z
?SearchItem@SOHDBSpecRelationMgr@@QAEJPB_W0PAPA_W@Z
?Start@SOHDBContentImportMgr@@QAEJJPB_W_N@Z
?Commit@SOHDBSpecRelationMgr@@QAEJXZ
?Commit@SOHDBPlaylistImportMgr@@QAEJXZ
?End@SOHDBPlaylistImportMgr@@QAEJXZ
?ImportPlaylist@SOHDBPlaylistImportMgr@@QAEJPAVISOHDBImportPlaylist@@@Z
?Start@SOHDBPlaylistImportMgr@@QAEJJPB_W_N@Z
?DeleteNotUpdatedRelations@SOHDBPlaylistImportMgr@@QAEJXZ
PostThreadMessageW
GetMessageW
DispatchMessageW
TranslateMessage
WTSEnumerateSessionsW
WTSFreeMemory
WTSQueryUserToken
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipFree
GdipCreateBitmapFromFile
GdipBitmapUnlockBits
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePaletteSize
GdipBitmapLockBits
GdipAlloc
GdipCreateBitmapFromFileICM
GdipCloneImage
GdiplusStartup
GdipGetImagePixelFormat
GdipDrawImageI
GdipDisposeImage
GdipGetImageGraphicsContext
GdipDeleteGraphics
CoUninitialize
CoInitializeEx
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
PE exports
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 1
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.0.1.13060

LanguageCode
Neutral

FileFlagsMask
0x0017

FileDescription
Local Importer DLL

ImageFileCharacteristics
Executable, 32-bit, DLL

CharacterSet
Unicode

InitializedDataSize
48128

EntryPoint
0xfa95

OriginalFileName
LocalImporter.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright 2008, 2009, 2010, 2011, 2012 Sony Corporation

FileVersion
3.0.1.13060

TimeStamp
2012:01:05 10:29:28+01:00

FileType
Win32 DLL

PEType
PE32

InternalName
Local Importer

ProductVersion
3.0.1.13060

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Sony Corporation

CodeSize
175104

ProductName
Local Importer

ProductVersionNumber
3.0.1.13060

FileTypeExtension
dll

ObjectFileType
Dynamic link library

File identification
MD5 b33f9ff9e983bfcad82943af39acfc57
SHA1 a55807414fd3eb6760761429c4cd455bc28e5e00
SHA256 0a80926b048a7fe29dad42661f5387bfc025cb3f25b5d011a6320460a565aed0
ssdeep
3072:SXLSX0VfDMfUkzkqJhpHv77P3/VM9II3uuxfadgOtWP/z2b:+3VfDMfUe0fCdgOtWXz2b

authentihash 0b0f05e6fc27d56b9893ddb47fb675488648215da83a22b030562187d7141613
imphash 25f92ee4bcaa6bdfc9d99cb7899a6587
File size 226.1 KB ( 231576 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
pedll signed overlay

VirusTotal metadata
First submission 2013-03-03 09:46:37 UTC ( 6 years, 1 month ago )
Last submission 2017-02-09 16:41:12 UTC ( 2 years, 2 months ago )
File names LocalImporter.dll
Local Importer
LocalImporter.dll
LocalImporter.dll
b33f9ff9e983bfcad82943af39acfc57
LocalImporter.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!