× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1eebbcadf5b3f968a6aed36c51e2422fe1c2b1b682ce2e726239c975fcb08425
File name: DeviceManager.exe
Detection ratio: 0 / 67
Analysis date: 2019-04-10 08:11:29 UTC ( 1 month, 1 week ago )
Antivirus Result Update
Acronis 20190409
Ad-Aware 20190410
AegisLab 20190410
AhnLab-V3 20190410
Alibaba 20190402
ALYac 20190410
Antiy-AVL 20190410
Arcabit 20190410
Avast 20190410
Avast-Mobile 20190410
AVG 20190410
Avira (no cloud) 20190410
Babable 20180918
Baidu 20190318
BitDefender 20190410
Bkav 20190409
CAT-QuickHeal 20190409
ClamAV 20190409
CMC 20190321
Comodo 20190410
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190410
DrWeb 20190410
eGambit 20190410
Emsisoft 20190410
Endgame 20190403
ESET-NOD32 20190410
F-Secure 20190410
FireEye 20190410
Fortinet 20190410
GData 20190410
Ikarus 20190409
Sophos ML 20190313
Jiangmin 20190410
K7AntiVirus 20190410
K7GW 20190410
Kaspersky 20190410
Kingsoft 20190410
Malwarebytes 20190410
MAX 20190410
McAfee 20190410
McAfee-GW-Edition 20190409
Microsoft 20190410
eScan 20190410
NANO-Antivirus 20190410
Palo Alto Networks (Known Signatures) 20190410
Panda 20190409
Qihoo-360 20190410
Rising 20190410
SentinelOne (Static ML) 20190407
Sophos AV 20190410
SUPERAntiSpyware 20190404
Symantec Mobile Insight 20190408
TACHYON 20190410
Tencent 20190410
TheHacker 20190405
TotalDefense 20190410
Trapmine 20190325
TrendMicro-HouseCall 20190410
Trustlook 20190410
VBA32 20190409
VIPRE 20190409
ViRobot 20190410
Yandex 20190408
Zillya 20190409
ZoneAlarm by Check Point 20190410
Zoner 20190410
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c) Mobileleader Co., Ltd. All rights reserved.

Product Device Services
Original name DeviceManager.exe
Internal name DeviceManager.exe
File version 1.0.0.229
Description DeviceManager.exe
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-28 09:18:56
Entry Point 0x0007516B
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegDeleteKeyW
RegSetValueExW
RegQueryInfoKeyW
RegQueryValueExA
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExA
RegCreateKeyExA
RegQueryValueExW
Ord(68)
Ord(43)
Ord(49)
Ord(31)
Ord(44)
Ord(56)
Ord(61)
Ord(20)
Ord(67)
Ord(23)
Ord(17)
Ord(30)
Ord(64)
Ord(32)
Ord(58)
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
GetVolumeInformationW
FreeEnvironmentStringsW
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
FreeLibrary
LocalFree
FormatMessageW
InitializeCriticalSection
OutputDebugStringW
FindClose
InterlockedDecrement
MoveFileW
OutputDebugStringA
SetLastError
DeviceIoControl
CopyFileW
WriteProcessMemory
LoadResource
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
LoadLibraryA
UnhandledExceptionFilter
MultiByteToWideChar
FlushInstructionCache
GetPrivateProfileStringW
GlobalAddAtomW
CreateThread
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
GlobalMemoryStatus
VirtualQuery
GetCurrentThreadId
LeaveCriticalSection
CreateToolhelp32Snapshot
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
VirtualProtect
GetVersionExA
lstrcmpiW
GetFileSize
OpenProcess
GetStartupInfoW
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
lstrcpyW
FindNextFileW
lstrcpyA
ResetEvent
FindFirstFileW
TerminateProcess
lstrcmpW
GetProcAddress
SetEvent
CreateEventW
CreateFileW
CreateFileA
InterlockedIncrement
GetLastError
lstrlenA
GlobalFree
FindResourceW
GetEnvironmentStringsW
GlobalAlloc
lstrlenW
Process32NextW
VirtualFree
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
LockResource
GetCommandLineW
HeapSize
InterlockedCompareExchange
Process32FirstW
RaiseException
MapViewOfFile
ReadFile
CloseHandle
GetModuleHandleW
GetDiskFreeSpaceA
FindResourceExW
SizeofResource
UnmapViewOfFile
GetTempPathW
CreateProcessW
Sleep
VirtualAlloc
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@_W@Z
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Xran@_String_base@std@@SAXXZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?insert@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV12@IPB_W@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
__p__fmode
fseek
fclose
_snwprintf
wcsncpy_s
_invoke_watson
_except_handler3
_vswprintf
_XcptFilter
_wcsupr_s
??_V@YAXPAX@Z
_CxxThrowException
memmove_s
??3@YAXPAX@Z
_mbsinc
memcpy_s
memcpy
vswprintf_s
strstr
??0exception@std@@QAE@ABQBD@Z
wcsrchr
_vscwprintf
_wcslwr_s
iswspace
_configthreadlocale
??0exception@std@@QAE@XZ
?what@exception@std@@UBEPBDXZ
memset
wcschr
_stricmp
__RTDynamicCast
_vsnprintf_s
_invalid_parameter_noinfo
strchr
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??2@YAPAXI@Z
ftell
exit
sprintf
_initterm_e
_mbsspn
_crt_debugger_hook
free
__CxxFrameHandler3
_except_handler4_common
sprintf_s
??1exception@std@@UAE@XZ
wcsspn
_vswprintf_c_l
_exit
__dllonexit
wcstol
swscanf_s
wcscpy_s
_recalloc
_cexit
wcsnlen
isalnum
_mbscmp
_onexit
wcsncat
__setusermatherr
_mbsicmp
wcsncpy
wcscspn
atoi
??0exception@std@@QAE@ABV01@@Z
_vsnwprintf_s
_mktime64
swprintf_s
_wsplitpath_s
__wgetmainargs
malloc
sscanf
fread
_controlfp_s
_amsg_exit
?terminate@@YAXXZ
_vscprintf
_lock
vsprintf_s
_encode_pointer
_wfopen_s
_decode_pointer
__p__commode
_wcmdln
printf
_wcsicmp
_unlock
_adjust_fdiv
_mbsstr
calloc
_initterm
_mbschr
_wtof
wcsstr
_mbscspn
_wtol
_wtoi
__set_app_type
SafeArrayGetVartype
SysStringByteLen
SysAllocString
LPSAFEARRAY_UserUnmarshal
SafeArrayCreate
BSTR_UserFree
SafeArrayCreateVector
BSTR_UserMarshal
SafeArrayAccessData
SafeArrayGetLBound
UnRegisterTypeLib
LPSAFEARRAY_UserMarshal
LPSAFEARRAY_UserFree
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayGetUBound
VariantInit
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SafeArrayLock
LoadRegTypeLib
VariantChangeType
BSTR_UserUnmarshal
SafeArrayRedim
BSTR_UserSize
SafeArrayCopy
RegisterTypeLib
SysStringLen
SysAllocStringLen
VariantClear
GetErrorInfo
LPSAFEARRAY_UserSize
IUnknown_Release_Proxy
NdrOleAllocate
IUnknown_QueryInterface_Proxy
NdrStubCall2
NdrStubForwardingFunction
NdrOleFree
IUnknown_AddRef_Proxy
NdrCStdStubBuffer2_Release
SHGetFolderPathW
SHGetSpecialFolderPathW
ShellExecuteW
PathFileExistsW
SHCreateStreamOnFileW
StrToIntW
RegisterWindowMessageW
GetClassInfoExW
DefWindowProcW
KillTimer
GetMessageW
ShowWindow
SetWindowLongW
IsWindow
RegisterClassExW
CharUpperW
RegisterDeviceNotificationW
TranslateMessage
PostMessageW
DispatchMessageW
UnregisterClassA
GetWindowLongW
wsprintfA
SetTimer
CallWindowProcW
PostThreadMessageW
UnregisterDeviceNotification
LoadCursorW
CreateWindowExW
wsprintfW
CharNextW
DestroyWindow
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
inet_ntoa
CLSIDFromString
IIDFromString
CoTaskMemAlloc
GetRunningObjectTable
CoCreateInstance
CLSIDFromProgID
CreateClassMoniker
CoUninitialize
OleRun
PropVariantClear
CoTaskMemFree
CoInitialize
StringFromGUID2
PE exports
Number of PE resources by type
REGISTRY 4
TYPELIB 1
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
KOREAN 7
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.229

LanguageCode
Neutral 2

FileFlagsMask
0x003f

FileDescription
DeviceManager.exe

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
184832

EntryPoint
0x7516b

OriginalFileName
DeviceManager.exe

MIMEType
application/octet-stream

LegalCopyright
(c) Mobileleader Co., Ltd. All rights reserved.

FileVersion
1.0.0.229

TimeStamp
2013:03:28 10:18:56+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DeviceManager.exe

ProductVersion
1.0.0.229

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Mobileleader Co., Ltd.

CodeSize
510464

ProductName
Device Services

ProductVersionNumber
1.0.0.229

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 071ac12d1038091a8f4a94f22ccb41a4
SHA1 2356c215970c861bc123ab660bdf23abb69322ec
SHA256 1eebbcadf5b3f968a6aed36c51e2422fe1c2b1b682ce2e726239c975fcb08425
ssdeep
12288:ooOcIrVDNEzBX48nbrERulflvUcB1gdGrhv0KYOPvmO0W:ooOpr4BXGMlfNUeCYvHZ3

authentihash d319abd98e4d0897db73ee70b13fe3e0207c0d4a2b04c42950144effd7b5a45f
imphash db9a44c96c8dac4d1d6df396673c10ef
File size 674.5 KB ( 690688 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (50.5%)
Microsoft Visual C++ compiled executable (generic) (30.2%)
Win32 Executable (generic) (8.2%)
OS/2 Executable (generic) (3.7%)
Generic Win/DOS Executable (3.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-04-02 11:50:23 UTC ( 6 years, 1 month ago )
Last submission 2013-04-02 11:50:23 UTC ( 6 years, 1 month ago )
File names DeviceManager.exe
DeviceManager.exe
DeviceManager.exe
devicemanager.exe
DeviceManager.exe
DeviceManager.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!