× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0d5715128d88916be6db0e7c12b3405fb4a6b4b13fe7341c33f519f124631bae
File name: registrycleaner.exe
Detection ratio: 2 / 46
Analysis date: 2013-02-20 04:22:43 UTC ( 1 year, 1 month ago ) View latest
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
Kingsoft VIRUS_UNKNOWN 20130204
TrendMicro-HouseCall TROJ_GEN.F47V1205 20130220
AVG 20130220
Agnitum 20130219
AhnLab-V3 20130219
AntiVir 20130220
Antiy-AVL 20130219
Avast 20130220
BitDefender 20130220
ByteHero 20130218
CAT-QuickHeal 20130220
ClamAV 20130220
Commtouch 20130220
Comodo 20130220
DrWeb 20130220
ESET-NOD32 20130219
Emsisoft 20130220
F-Prot 20130220
F-Secure 20130220
Fortinet 20130220
GData 20130220
Ikarus 20130220
Jiangmin 20130219
K7AntiVirus 20130219
Kaspersky 20130220
Malwarebytes 20130219
McAfee 20130220
McAfee-GW-Edition 20130220
MicroWorld-eScan 20130220
Microsoft 20130220
NANO-Antivirus 20130220
Norman 20130219
PCTools 20130219
Panda 20130219
Rising 20130205
SUPERAntiSpyware 20130220
Sophos 20130220
Symantec 20130220
TheHacker 20130219
TotalDefense 20130219
TrendMicro 20130220
VBA32 20130219
VIPRE 20130220
ViRobot 20130220
eSafe 20130211
nProtect 20130219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright

Publisher AthTek Software
Product AthTek RegistryCleaner
File version
Description AthTek RegistryCleaner Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, UPX, INNO, INNO, INNO, UPX, INNO, INNO, INNO, INNO, INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-03-17 10:22:54
Link date 11:22 AM 3/17/2011
Entry Point 0x00016478
Number of sections 8
PE sections
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 4
DUTCH 4
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
53760

MIMEType
application/octet-stream

TimeStamp
2011:03:17 11:22:54+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

FileAccessDate
2014:04:16 09:33:32+01:00

FileDescription
AthTek RegistryCleaner Setup

OSVersion
5.0

FileCreateDate
2014:04:16 09:33:32+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AthTek Software

CodeSize
86016

ProductName
AthTek RegistryCleaner

ProductVersionNumber
0.0.0.0

EntryPoint
0x16478

ObjectFileType
Executable application

File identification
MD5 42709d7b323169494c1f23e6a0fda82a
SHA1 d1aad745b37b08db4c2534f4b3421b64daa87b02
SHA256 0d5715128d88916be6db0e7c12b3405fb4a6b4b13fe7341c33f519f124631bae
ssdeep
98304:gMiTxJPjuQ/djNyF4u7GKFVUsBT2vTuGBfRh8htCKk1Zn2CWl6yeUqjPFZbO3S5:grgydj0yu7GK5BiruGBvYwKk1uAy9S5

imphash 483f0c4259a9148c34961abbda6146c1
File size 6.1 MB ( 6357132 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (86.4%)
Win32 Dynamic Link Library (generic) (5.1%)
Win32 Executable (generic) (3.5%)
Win16/32 Executable Delphi generic (1.6%)
Generic Win/DOS Executable (1.5%)
Tags
peexe upx

VirusTotal metadata
First submission 2012-11-23 06:26:39 UTC ( 1 year, 4 months ago )
Last submission 2014-04-16 08:31:13 UTC ( 2 days, 4 hours ago )
File names output.11741613.txt
file
registrycleaner.exe
registrycleaner_chip_full.exe
11741613
file-4849676_exe
42709d7b323169494c1f23e6a0fda82a.d1aad745b37b08db4c2534f4b3421b64daa87b02
myfile
registrycleaner.exe
registrycleaner_r594095.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications