× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2e3263fa904729c3c4d416b7ee8d7cec21500a4c50f33a348140003aeef988e7
File name: spi_dump.bin
Detection ratio: 0 / 55
Analysis date: 2016-02-24 18:01:10 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160224
AegisLab 20160224
Yandex 20160221
AhnLab-V3 20160224
Alibaba 20160224
ALYac 20160224
Antiy-AVL 20160224
Arcabit 20160224
Avast 20160224
AVG 20160224
Avira (no cloud) 20160224
AVware 20160224
Baidu-International 20160224
BitDefender 20160224
Bkav 20160224
ByteHero 20160224
CAT-QuickHeal 20160224
ClamAV 20160224
CMC 20160223
Comodo 20160224
Cyren 20160224
DrWeb 20160224
Emsisoft 20160224
ESET-NOD32 20160224
F-Prot 20160224
F-Secure 20160224
Fortinet 20160224
GData 20160224
Ikarus 20160224
Jiangmin 20160224
K7AntiVirus 20160224
K7GW 20160224
Kaspersky 20160224
Malwarebytes 20160224
McAfee 20160224
McAfee-GW-Edition 20160224
Microsoft 20160224
eScan 20160224
NANO-Antivirus 20160224
nProtect 20160224
Panda 20160223
Qihoo-360 20160224
Rising 20160224
Sophos AV 20160224
SUPERAntiSpyware 20160224
Symantec 20160224
Tencent 20160224
TheHacker 20160222
TrendMicro 20160224
TrendMicro-HouseCall 20160224
VBA32 20160224
VIPRE 20160224
ViRobot 20160224
Zillya 20160223
Zoner 20160224
The file being studied is a ROM BIOS image! More specifically, it follows the ROMFLASH HEADER format.
Manufacturer strings
Lenovo 25
Intel 10
BIOS basic properties
Section count
1006

Firmware volume count
4

Raw objects count
3

Executable files count
278

Contained windows executables
ROM BIOS contained files
Contained certificates
SMBIOS data
Version
2.7

NVAR variable names
000000000000
50AF735ED726
AcpiGlobalVariable
AdministerSecureBoot
AuthVarKeyDatabase
BackupPlatformLang
Boot0000
Boot0001
Boot0002
Boot0003
Boot0004
Boot0005
Boot0006
Boot2001
Boot2002
Boot2003
BootNext
BootOrder
BootState
ClientId
ConIn
ConOut
CurrentFD
CurrentPolicy
Custom
CustomSecurity
DDR3LVoltageVariable
KEK
Kernel_CopyOfUSN
Kernel_USN
L05OkrData
LegacyDevOrder
LegacyToEfi
MTC
MrcS3RestoreVariable
MsdmAddress
OldBootOrder
PBRDevicePath
PK
PchInit
PhysicalBootOrder
PlatformConfigurationVariable
PlatformLang
RestoreFactoryDefault
RevocationList
RtkNvData
S3RestoreDataVariable
SaPegData
SaveHddPassword
SecureBoot
SecureBootEnforce
SecureBootUpdate
SecureFlashInfo
Setup
SetupMode
SmbiosPolicy
SpdData
SystemStatusData
TargetHddDevPath
Timeout
VBiosInfo
WindowsBootChainSvn
certdb
db
dbx
lvar
ACPI Tables
APIC
BOOT
DBGP
DMAR
DSDT
FACP
FACS
HPET
MCFG
SLIC
SSDT
WDAT
File identification
MD5 2572ad67f33e02398c5cb5a4576b77f0
SHA1 359faae3d4a6d7567c7c355126b9025d51db5bc1
SHA256 2e3263fa904729c3c4d416b7ee8d7cec21500a4c50f33a348140003aeef988e7
ssdeep
49152:bPDO40fjC/kOAneLm3178h+EgrzW/2TC/qqDGcWuImka8j4Aa4pS:1ajekfbFgh+Egu/kUbDGcW/mka8EAaV

File size 4.0 MB ( 4194304 bytes )
File type ROM BIOS
Magic literal
DOS executable (device driver)

TrID Atari XE Executable (66.6%)
MP3 audio (33.3%)
Tags
contains-pe flash rom

Source details
VirusTotal metadata
First submission 2016-02-24 18:01:10 UTC ( 2 years, 6 months ago )
Last submission 2018-04-29 01:14:36 UTC ( 4 months, 3 weeks ago )
File names spi_dump.bin
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!