× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 14c6558cbb4a1707acba448e9270940c78da6a96fc86e2ccc4bad5bfb88215a0
File name: Launcher.exe
Detection ratio: 0 / 43
Analysis date: 2012-01-17 09:24:33 UTC ( 7 years ago ) View latest
Antivirus Result Update
AhnLab-V3 20120116
AntiVir 20120117
Antiy-AVL 20120117
Avast 20120116
AVG 20120116
BitDefender 20120117
ByteHero 20120111
CAT-QuickHeal 20120117
ClamAV 20120117
Commtouch 20120117
Comodo 20120117
DrWeb 20120117
Emsisoft 20120117
eSafe 20120115
eTrust-Vet 20120117
F-Prot 20120116
F-Secure 20120117
Fortinet 20120117
GData 20120117
Ikarus 20120117
Jiangmin 20120116
K7AntiVirus 20120113
Kaspersky 20120117
McAfee 20120117
McAfee-GW-Edition 20120116
Microsoft 20120117
NOD32 20120117
Norman 20120116
nProtect 20120117
Panda 20120116
PCTools 20120117
Prevx 20120117
Rising 20120116
Sophos AV 20120117
SUPERAntiSpyware 20120114
Symantec 20120117
TheHacker 20120116
TrendMicro 20120117
TrendMicro-HouseCall 20120117
VBA32 20120117
VIPRE 20120117
ViRobot 20120117
VirusBuster 20120116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x000182F4
Number of sections 8
PE sections
PE imports
RegOpenKeyExA
GetUserNameA
RegQueryValueExA
RegCloseKey
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
GetLocalTime
DeleteCriticalSection
GetLocaleInfoA
LocalAlloc
GetCPInfo
WriteFile
GetCommandLineA
GetThreadTimes
GetDiskFreeSpaceA
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
InitAtomTable
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
SetLastError
GetModuleFileNameW
SetConsoleActiveScreenBuffer
ExitProcess
CreateMailslotA
GetModuleFileNameA
SetProcessWorkingSetSize
LoadLibraryExA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
_lclose
GlobalAddAtomW
CreateSemaphoreA
CreateSemaphoreW
GetDateFormatA
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SleepEx
EnterCriticalSection
SetCommBreak
lstrcmpiA
EndUpdateResourceW
FreeLibrary
CallNamedPipeA
VirtualProtect
GetVersionExA
RtlUnwind
GetStartupInfoA
UnlockFile
GetProcAddress
CompareStringW
GetBinaryTypeW
FindFirstFileA
ResetEvent
EscapeCommFunction
GetPrivateProfileSectionW
LocalSize
GetCurrencyFormatA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
FlushConsoleInputBuffer
lstrlenA
OpenSemaphoreA
LCMapStringA
GetThreadLocale
DefineDosDeviceW
EnumTimeFormatsW
WideCharToMultiByte
SetThreadAffinityMask
OpenMutexA
EnumResourceTypesA
RaiseException
SetFilePointer
ReadFile
GlobalFlags
EnumCalendarInfoA
CloseHandle
lstrcpynA
GetACP
GetVersion
SetConsoleMode
GetTempPathW
VirtualFree
Sleep
IsBadReadPtr
IsBadStringPtrA
GetProcessVersion
FindResourceA
VirtualAlloc
CompareStringA
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetMessageA
GetSystemMetrics
CreateWindowExA
LoadStringA
DispatchMessageA
CharLowerA
CharNextA
MessageBoxA
SetTimer
TranslateMessage
FindWindowA
CharUpperA
GetKeyboardType
CharToOemA
Number of PE resources by type
RT_RCDATA 11
RT_STRING 7
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 18
TURKISH DEFAULT 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
95232

LinkerVersion
2.25

EntryPoint
0x182f4

InitializedDataSize
65536

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 f8c97166f7a8a58c65f4977c0da86f75
SHA1 ed8a74a6df73314f2bc1d2ed48c1bbafaab29a73
SHA256 14c6558cbb4a1707acba448e9270940c78da6a96fc86e2ccc4bad5bfb88215a0
ssdeep
3072:kIkA6GmW9IKW2O11zFVaQ4D757YEKk5WfD1yrh5/9uT2GsjM:kIkrGP3W2bD+2O

authentihash 38ab1b26d392b3a722c2c8737c05d5003490af65587d2e8c883c2be1125c7312
imphash 7fbf6057e4c9fa17ab02cb3182a79668
File size 158.0 KB ( 161792 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (45.2%)
Win32 Dynamic Link Library (generic) (20.9%)
Win32 Executable (generic) (14.3%)
Win16/32 Executable Delphi generic (6.6%)
Generic Win/DOS Executable (6.3%)
Tags
peexe

VirusTotal metadata
First submission 2012-01-17 09:24:33 UTC ( 7 years ago )
Last submission 2012-01-22 18:08:11 UTC ( 7 years ago )
File names Launcher.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.