× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1329b9d1a5028df56e65dfae0c9bd9860d1d1ab2f15db80e2c850fa051eda9cf
File name: 1329b9d1a5028df56e65dfae0c9bd9860d1d1ab2f15db80e2c850fa051eda9cf
Detection ratio: 9 / 70
Analysis date: 2018-12-23 08:07:54 UTC ( 2 months, 4 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181222
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181223
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Microsoft Trojan:Win32/Ludicrouz.O 20181223
Rising Malware.Heuristic!ET#92% (RDM+:cmRtazrEOvP+JbuPvAspeOXGuHBe) 20181223
Symantec ML.Attribute.HighConfidence 20181222
Trapmine malicious.high.ml.score 20181205
Ad-Aware 20181223
AegisLab 20181223
AhnLab-V3 20181222
Alibaba 20180921
ALYac 20181223
Antiy-AVL 20181222
Arcabit 20181222
Avast 20181223
Avast-Mobile 20181222
AVG 20181223
Avira (no cloud) 20181222
Babable 20180918
Baidu 20181207
BitDefender 20181223
Bkav 20181221
CAT-QuickHeal 20181222
ClamAV 20181223
CMC 20181223
Comodo 20181223
Cybereason 20180225
Cyren 20181223
DrWeb 20181223
eGambit 20181223
Emsisoft 20181223
ESET-NOD32 20181223
F-Prot 20181223
F-Secure 20181223
Fortinet 20181223
GData 20181223
Ikarus 20181223
Jiangmin 20181223
K7AntiVirus 20181222
K7GW 20181222
Kaspersky 20181223
Kingsoft 20181223
Malwarebytes 20181223
MAX 20181223
McAfee 20181223
McAfee-GW-Edition 20181223
eScan 20181223
NANO-Antivirus 20181223
Palo Alto Networks (Known Signatures) 20181223
Panda 20181222
Qihoo-360 20181223
SentinelOne (Static ML) 20181011
Sophos AV 20181223
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TACHYON 20181223
Tencent 20181223
TheHacker 20181220
TotalDefense 20181223
TrendMicro 20181223
TrendMicro-HouseCall 20181223
Trustlook 20181223
VBA32 20181222
ViRobot 20181222
Webroot 20181223
Yandex 20181221
Zillya 20181222
ZoneAlarm by Check Point 20181223
Zoner 20181223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c)1996 AOL/Johnson-Grace Company

Product JGMP
Original name jgmp500.dll
Internal name JGMP
File version 2
Description JG MIDI player DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-08-04 07:56:09
Entry Point 0x000094A4
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
IsTokenRestricted
RegOpenKeyExW
QueryServiceLockStatusW
DuplicateEncryptionInfoFile
RegCreateKeyExA
LookupAccountNameW
OpenBackupEventLogA
CryptGetDefaultProviderW
GetWindowsAccountDomainSid
ImageList_GetImageCount
ImageList_SetIconSize
CryptSIPAddProvider
CertAddEncodedCertificateToStore
JetIntersectIndexes
PaintRgn
GetColorAdjustment
CopyMetaFileW
EndPath
GetCharacterPlacementA
GetRandomRgn
ImmSetCompositionStringW
ImmReleaseContext
GetIpForwardTable
FlushProcessWriteBuffers
FindCloseChangeNotification
GetWindowsDirectoryW
GlobalReAlloc
FlsFree
ReadDirectoryChangesW
VirtualUnlock
GetConsoleCP
GetModuleHandleW
WriteFile
Process32First
FindNextFileA
GetDynamicTimeZoneInformation
VerifyScripts
GetEnvironmentVariableW
LocalLock
LZSeek
DrawDibGetPalette
VarDateFromBool
VarUI2FromStr
SafeArrayCreateEx
IsPwrHibernateAllowed
RasEnumConnectionsW
RpcMgmtStopServerListening
RpcErrorEndEnumeration
NdrInterfacePointerFree
I_RpcMapWin32Status
SetupPromptForDiskA
SetupFindNextMatchLineW
CMP_WaitNoPendingInstallEvents
SHAddToRecentDocs
PathCompactPathW
PathCreateFromUrlA
SHQueryInfoKeyW
PathRemoveExtensionA
AssocCreate
PathAddBackslashW
StrRChrIA
StrPBrkW
CharToOemW
DlgDirListComboBoxW
SetMenuItemInfoA
SetUserObjectInformationA
MessageBoxA
GetClipboardOwner
CreateWindowStationW
LoadKeyboardLayoutA
GetCaretPos
LockSetForegroundWindow
GetMenuContextHelpId
HttpOpenRequestA
HttpQueryInfoA
midiOutMessage
CryptCATPersistStore
WintrustRemoveActionID
g_rgSCardRawPci
Ord(30)
iswalpha
towupper
OleDoAutoConvert
RegisterDragDrop
OleSetClipboard
CreateAntiMoniker
PdhCloseQuery
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
7.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5010.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
JG MIDI player DLL

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
62976

EntryPoint
0x94a4

OriginalFileName
jgmp500.dll

MIMEType
application/octet-stream

LegalCopyright
(c)1996 AOL/Johnson-Grace Company

FileVersion
2

TimeStamp
2004:08:04 09:56:09+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
JGMP

ProductVersion
2

SubsystemVersion
5.1

OSVersion
5.0

FileOS
Windows 16-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Johnson-Grace Company

CodeSize
46592

ProductName
JGMP

ProductVersionNumber
5010.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 e467ce081e0bb764cd0b9a5757d1e0d4
SHA1 d5779d03e0f2c4284f1983a14f2c83c59d9c2bde
SHA256 1329b9d1a5028df56e65dfae0c9bd9860d1d1ab2f15db80e2c850fa051eda9cf
ssdeep
3072:KEqdMD0NSKfAkcEBknjMmpOV/anksPcNBtQ6TMEn+WXq+m97CnSxp:fVD0NSKfGEBIJcK2tQAMEn+slmd

authentihash 7a4731dd9bfb7f47e22733253cf22e8b5c70b1a57f00317717a2b65aaf38c3a7
imphash 923d105322368e0256288c82f9bb7370
File size 199.0 KB ( 203776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (34.2%)
Win32 Executable (generic) (23.4%)
Win16/32 Executable Delphi generic (10.7%)
OS/2 Executable (generic) (10.5%)
Generic Win/DOS Executable (10.4%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-23 08:07:54 UTC ( 2 months, 4 weeks ago )
Last submission 2018-12-23 08:07:54 UTC ( 2 months, 4 weeks ago )
File names 19655040.exe
jgmp500.dll
19655040.exe
JGMP
721.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!