× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 30e125a33f0043d7174c9cdf958a4b6be6eeed289156c47a95cd94d8a89afc31
File name: 108370
Detection ratio: 1 / 57
Analysis date: 2016-04-03 03:43:06 UTC ( 2 years, 2 months ago ) View latest
Antivirus Result Update
Baidu Multi.Threats.InArchive 20160402
Ad-Aware 20160403
AegisLab 20160403
AhnLab-V3 20160402
Alibaba 20160401
ALYac 20160403
Antiy-AVL 20160403
Arcabit 20160403
Avast 20160403
AVG 20160403
Avira (no cloud) 20160402
AVware 20160403
Baidu-International 20160402
BitDefender 20160403
Bkav 20160402
CAT-QuickHeal 20160402
ClamAV 20160402
CMC 20160401
Comodo 20160402
Cyren 20160403
DrWeb 20160403
Emsisoft 20160403
ESET-NOD32 20160402
F-Prot 20160403
F-Secure 20160403
Fortinet 20160402
GData 20160403
Ikarus 20160402
Jiangmin 20160403
K7AntiVirus 20160402
K7GW 20160403
Kaspersky 20160402
Kingsoft 20160403
Malwarebytes 20160403
McAfee 20160403
McAfee-GW-Edition 20160403
Microsoft 20160402
eScan 20160403
NANO-Antivirus 20160403
nProtect 20160401
Panda 20160402
Qihoo-360 20160403
Rising 20160403
Sophos AV 20160403
SUPERAntiSpyware 20160403
Symantec 20160331
Tencent 20160403
TheHacker 20160330
TotalDefense 20160402
TrendMicro 20160403
TrendMicro-HouseCall 20160403
VBA32 20160401
VIPRE 20160403
ViRobot 20160402
Yandex 20160316
Zillya 20160402
Zoner 20160403
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2009 J.C. Kessels

Product MyDefrag v4.3.1
File version 4.0.0.0
Description MyDefrag Installer
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-04-10 16:57:59
Entry Point 0x000163C4
Number of sections 9
PE sections
Overlays
MD5 b92a40766afb524068df8bdc3ae63335
File type data
Offset 458752
Size 1623878
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_ICON 13
RT_STRING 6
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 17
NEUTRAL 9
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
4.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
370688

EntryPoint
0x163c4

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2009 J.C. Kessels

FileVersion
4.0.0.0

TimeStamp
2010:04:10 17:57:59+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

ProductVersion
4.0.0.0

FileDescription
MyDefrag Installer

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
J.C. Kessels

CodeSize
87040

ProductName
MyDefrag v4.3.1

ProductVersionNumber
4.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
Execution parents
PE resource-wise parents
Compressed bundles
PCAP parents
File identification
MD5 8f860c4136f998c05b26fdcaa42699c0
SHA1 fa7db4626f9e7a534df9226cdcdab4dc6d289350
SHA256 30e125a33f0043d7174c9cdf958a4b6be6eeed289156c47a95cd94d8a89afc31
ssdeep
24576:v7h0fEgf7H+akUGd4eyOG1RU+66EGfcNLrV3NBmpleUuKIn/+Z:Thkd+XdP2MQmFlNBvU/In/+Z

authentihash d2ca95a4159ccda05c875766e81d64b4673437ff04af8818a7a5c3d8999f36df
imphash 483f0c4259a9148c34961abbda6146c1
File size 2.0 MB ( 2082630 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (80.3%)
Win32 Executable Delphi generic (10.3%)
Win32 Executable (generic) (3.3%)
Win16/32 Executable Delphi generic (1.5%)
OS/2 Executable (generic) (1.4%)
Tags
software-collection via-tor peexe overlay

VirusTotal metadata
First submission 2010-05-21 11:46:52 UTC ( 8 years, 1 month ago )
Last submission 2018-06-18 18:07:47 UTC ( 2 days, 6 hours ago )
File names test.exe
30e125a33f0043d7_8627.tmp.exe
mydefrag-v...exe
MyDefrag_4.3.1_8328.exe
Download.php
MyDefrag_V4.3.1.exe
download-MyDefrag-v4.3.1.exe
MyDefrag.exe
My Defrag v4.3.1 free mydefrag.com 290612.exe
MyDefrag 4.3.1 [32, 64-bit] Setup.exe
8f860c4136f998c05b26fdcaa42699c0.fa7db4626f9e7a534df9226cdcdab4dc6d289350
MyDefrag-v4.3.1.exe
MyDefrag 4.3.1 (kaldata.com).exe
Download.php?File=MyDefrag-v4.3.1.exe
My Defrag.exe
1324378950-Download.exe
MyDefrag-v4.3.1(2).exe
7j63iytptz5fgtpzejwnzwvu3rwsre2q.exe
MyDefrag-4.3.1-Setup.exe
yDefrag-v4.3.1.ex
jkdefrag-mydefrag_mydefrag_4.3.1_francais_29383.exe
MyDefrag 4.3.1 (2010-05-20).exe
8f860c4136f998c05b26fdcaa42699c0
MyDefrag-v4.3.1 (1).exe
jkdefrag.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!