× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 15884e212fba3977a15653d8d65d3f876b616a031675a7582e317ef3b8eff24a
File name: 9a08edd31ca17e2630a63696db068326ff81a378
Detection ratio: 4 / 56
Analysis date: 2015-07-11 01:12:47 UTC ( 3 years, 8 months ago ) View latest
Antivirus Result Update
Avira (no cloud) TR/Crypt.Xpack.257410 20150711
Kaspersky UDS:DangerousObject.Multi.Generic 20150711
Qihoo-360 HEUR/QVM10.1.Malware.Gen 20150711
Symantec Suspicious.Cloud.5 20150711
Ad-Aware 20150710
AegisLab 20150710
Yandex 20150710
AhnLab-V3 20150710
Alibaba 20150710
ALYac 20150710
Antiy-AVL 20150711
Arcabit 20150710
Avast 20150711
AVG 20150710
AVware 20150711
Baidu-International 20150710
BitDefender 20150711
Bkav 20150708
ByteHero 20150711
CAT-QuickHeal 20150710
ClamAV 20150711
Comodo 20150711
Cyren 20150711
DrWeb 20150711
Emsisoft 20150711
ESET-NOD32 20150710
F-Prot 20150710
F-Secure 20150711
Fortinet 20150711
GData 20150711
Ikarus 20150710
Jiangmin 20150710
K7AntiVirus 20150710
K7GW 20150710
Kingsoft 20150711
Malwarebytes 20150710
McAfee 20150711
McAfee-GW-Edition 20150710
Microsoft 20150710
eScan 20150710
NANO-Antivirus 20150710
nProtect 20150710
Panda 20150710
Rising 20150709
Sophos AV 20150711
SUPERAntiSpyware 20150711
Tencent 20150711
TheHacker 20150709
TotalDefense 20150710
TrendMicro 20150711
TrendMicro-HouseCall 20150711
VBA32 20150710
VIPRE 20150711
ViRobot 20150711
Zillya 20150710
Zoner 20150711
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2015 DivX, LLC. All rights reserved. DivX and associated logos are trademarks of DivX, LLC or its affiliates.

Publisher DivX, LLC
Product DivX Player
Original name DivX Player
Internal name DolbyDigital
File version 11. 3. 9. 28
Description DivX Player
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-07-09 23:09:51
Entry Point 0x00004608
Number of sections 5
PE sections
PE imports
EnumerateTraceGuids
Ord(334)
Ord(413)
Ord(17)
GetFileTitleW
GetDIBColorTable
PatBlt
SaveDC
CombineRgn
EnumFontsA
GetDeviceCaps
LineTo
DeleteDC
CreateDIBSection
SetTextColor
GetObjectA
MoveToEx
CreateEllipticRgn
CreateBitmap
CreateFontA
GetStockObject
SetViewportOrgEx
SelectClipRgn
CreateCompatibleDC
CreateRectRgn
SelectObject
SetDIBColorTable
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetUserDefaultUILanguage
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
MulDiv
IsDebuggerPresent
GetTickCount
TlsAlloc
GetVersionExA
GetEnvironmentStringsW
FlushFileBuffers
GetModuleFileNameA
RtlUnwind
LoadLibraryA
GetStdHandle
DeleteCriticalSection
GetCurrentProcess
GetDateFormatA
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
SetLastError
lstrcatA
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoW
SetStdHandle
FreeEnvironmentStringsW
GetConsoleTitleA
GetCommandLineA
GetProcAddress
GetConsoleScreenBufferInfo
HeapSize
ExitProcess
RaiseException
WideCharToMultiByte
LoadLibraryW
TlsFree
SetFilePointer
HeapSetInformation
SetUnhandledExceptionFilter
WriteFile
SetConsoleTitleA
CloseHandle
GetSystemTimeAsFileTime
EnumResourceLanguagesA
FillConsoleOutputCharacterA
GetACP
HeapReAlloc
DecodePointer
GetModuleHandleW
HeapAlloc
TerminateProcess
IsValidCodePage
HeapCreate
lstrcpyA
CreateFileW
TlsGetValue
Sleep
GetFileType
TlsSetValue
EncodePointer
GetCurrentThreadId
InterlockedIncrement
LocalAlloc
WriteConsoleW
LeaveCriticalSection
Ord(12)
Ord(24)
Ord(75)
Ord(39)
Ord(7)
Ord(72)
Ord(19)
VariantChangeType
SafeArrayAccessData
SafeArrayUnaccessData
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayCreate
SafeArrayPutElement
VariantInit
UuidCreate
Ord(727)
SHGetFileInfoW
EnumerateSecurityPackagesA
MapWindowPoints
EmptyClipboard
GetParent
UpdateWindow
EndDialog
LoadMenuA
CheckRadioButton
GetIconInfo
ShowWindow
DefWindowProcA
FindWindowA
LoadBitmapA
SetWindowPos
GetWindowRect
EndPaint
DrawIcon
GetWindow
GetDC
CopyImage
SystemParametersInfoA
BeginPaint
SetWindowTextA
SetClipboardData
SendMessageA
GetClientRect
GetDlgItem
EnableMenuItem
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
FillRect
ReleaseDC
CloseClipboard
RegisterClassExA
SetCursor
socket
bind
WSACleanup
WSAStartup
closesocket
getsockopt
ReadClassStg
CoUninitialize
CoInitialize
CreateBindCtx
CoCreateGuid
WriteClassStg
StgOpenStorage
StringFromCLSID
StgCreateDocfile
CoTaskMemFree
CoGetClassObject
IsValidURL
Number of PE resources by type
RT_GROUP_CURSOR 19
RT_DIALOG 13
RT_STRING 8
RT_ICON 7
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 54
PE resources
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.3.9.28

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
339456

EntryPoint
0x4608

OriginalFileName
DivX Player

MIMEType
application/octet-stream

LegalCopyright
2015 DivX, LLC. All rights reserved. DivX and associated logos are trademarks of DivX, LLC or its affiliates.

FileVersion
11. 3. 9. 28

TimeStamp
2015:07:10 00:09:51+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DolbyDigital

ProductVersion
11. 3. 9. 28

FileDescription
DivX Player

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
DivX, LLC

CodeSize
62976

ProductName
DivX Player

ProductVersionNumber
11.3.9.28

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2ada71fba3dc1fc9155c776b523b76b4
SHA1 7e47aa912d05241f0ce56f6ced12d036f6f41be3
SHA256 15884e212fba3977a15653d8d65d3f876b616a031675a7582e317ef3b8eff24a
ssdeep
6144:2SAvRLe3aqQwIy7YSF5/cTNvkMPM9X6/BeMnOQfLI1XFxXRqpPCPZx:mvRLe3a080x4NbMSBvnOQDOFxhMPCPZ

authentihash 6f84091628067d04844a9d061d6052b8fe1ecae13ba647d241c0c6dba59975f0
imphash 6963233dc77b8ca511410b64bf5532d4
File size 394.0 KB ( 403456 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit system file

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2015-07-10 22:21:52 UTC ( 3 years, 8 months ago )
Last submission 2015-07-11 01:12:47 UTC ( 3 years, 8 months ago )
File names 9a08edd31ca17e2630a63696db068326ff81a378
DolbyDigital
DivX Player
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs