× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 32ae210118e1a8d89909d104f76b5ff6cf6f3b39231cdb2476b6bc6862bbd121
File name: rfd14.exe
Detection ratio: 0 / 55
Analysis date: 2016-02-18 17:08:02 UTC ( 3 years, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160218
AegisLab 20160218
Yandex 20160217
AhnLab-V3 20160218
Alibaba 20160218
Antiy-AVL 20160218
Arcabit 20160218
Avast 20160218
AVG 20160218
Avira (no cloud) 20160218
AVware 20160218
Baidu-International 20160218
BitDefender 20160218
Bkav 20160218
ByteHero 20160218
CAT-QuickHeal 20160218
ClamAV 20160217
CMC 20160216
Comodo 20160218
Cyren 20160218
DrWeb 20160218
Emsisoft 20160218
ESET-NOD32 20160218
F-Prot 20160218
F-Secure 20160218
Fortinet 20160218
GData 20160218
Ikarus 20160218
Jiangmin 20160218
K7AntiVirus 20160218
K7GW 20160218
Kaspersky 20160218
Malwarebytes 20160218
McAfee 20160218
McAfee-GW-Edition 20160218
Microsoft 20160218
eScan 20160218
NANO-Antivirus 20160218
nProtect 20160218
Panda 20160218
Qihoo-360 20160218
Rising 20160218
Sophos AV 20160218
SUPERAntiSpyware 20160218
Symantec 20160217
Tencent 20160218
TheHacker 20160217
TotalDefense 20160218
TrendMicro 20160218
TrendMicro-HouseCall 20160218
VBA32 20160218
VIPRE 20160218
ViRobot 20160218
Zillya 20160218
Zoner 20160218
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT ZIP
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0000815C
Number of sections 8
PE sections
Overlays
MD5 84d3c16ec41ee4f35e9a3ab72a30c7b7
File type data
Offset 39936
Size 99367
Entropy 8.00
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetLastError
GetStdHandle
EnterCriticalSection
lstrlenA
GetFileAttributesA
FreeLibrary
SetCurrentDirectoryA
ExitProcess
GetThreadLocale
GetVersionExA
GetModuleFileNameA
RtlUnwind
WinExec
DeleteCriticalSection
GetStartupInfoA
LoadLibraryExA
GetLocaleInfoA
LocalAlloc
CreateDirectoryA
GetCurrentDirectoryA
GetShortPathNameA
GetCommandLineA
GetModuleHandleA
GetTempPathA
RaiseException
DosDateTimeToFileTime
SetFilePointer
SetFileTime
ReadFile
lstrcpyA
FindFirstFileA
CloseHandle
LocalFree
InitializeCriticalSection
WriteFile
VirtualQuery
VirtualFree
LocalFileTimeToFileTime
FindClose
TlsGetValue
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetCurrentThreadId
VirtualAlloc
GetFileSize
LeaveCriticalSection
VariantClear
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SetFocus
EndDialog
ShowWindow
SetClassLongA
SetWindowPos
GetSystemMetrics
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
PostMessageA
EnumChildWindows
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
IsWindowEnabled
SetWindowTextA
IsWindowVisible
SendMessageA
DialogBoxParamA
GetDlgItem
ScreenToClient
CreateWindowExA
LoadIconA
DefDlgProcA
GetClassNameA
GetKeyboardType
DestroyWindow
Number of PE resources by type
RT_DIALOG 4
RT_RCDATA 2
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 6
CHINESE TRADITIONAL 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
29696

LinkerVersion
2.25

EntryPoint
0x815c

InitializedDataSize
9216

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
1.0

UninitializedDataSize
0

File identification
MD5 e7b917020d4e396f30d2e4733874c150
SHA1 dd462a7d1967b453456b63e91fd15d05c30d0b6d
SHA256 32ae210118e1a8d89909d104f76b5ff6cf6f3b39231cdb2476b6bc6862bbd121
ssdeep
3072:7a9a9HTf/0qzoDoD70h5I4r6+Ur7WREPdO7rQ1yqoZm5WH8:fzf/0qzoDeJ4O+w8EP47rdqosm8

authentihash 7bd2b9ae63f59970ef37309154c639a941430e3d375b01ca1c1aef115634ecef
imphash 7a887a03512cebd1be4357d995173f40
File size 136.0 KB ( 139303 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Borland Delphi 5 (61.7%)
Win32 Executable Borland Delphi 3 (35.9%)
Win32 Dynamic Link Library (generic) (0.8%)
Win32 Executable (generic) (0.6%)
Win16/32 Executable Delphi generic (0.2%)
Tags
peexe overlay

VirusTotal metadata
First submission 2009-08-31 19:47:36 UTC ( 9 years, 7 months ago )
Last submission 2013-12-07 15:57:50 UTC ( 5 years, 4 months ago )
File names 32AE210118E1A8D89909D104F76B5FF6CF6F3B39231CDB2476B6BC6862BBD121.exe
rfd14.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!