× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 32f12b410146e22bb96e3f55f5d60ea55681959313cafb56cf99705d20c92e6c
File name: avgfws9
Detection ratio: 0 / 55
Analysis date: 2014-09-12 18:29:44 UTC ( 4 years, 6 months ago )
Antivirus Result Update
Ad-Aware 20140912
AegisLab 20140912
Yandex 20140912
AhnLab-V3 20140912
Antiy-AVL 20140912
Avast 20140912
AVG 20140912
Avira (no cloud) 20140912
AVware 20140912
Baidu-International 20140912
BitDefender 20140912
Bkav 20140912
ByteHero 20140912
CAT-QuickHeal 20140912
ClamAV 20140912
CMC 20140908
Comodo 20140912
Cyren 20140912
DrWeb 20140912
Emsisoft 20140912
ESET-NOD32 20140912
F-Prot 20140912
F-Secure 20140912
Fortinet 20140912
GData 20140912
Ikarus 20140912
Jiangmin 20140911
K7AntiVirus 20140912
K7GW 20140912
Kaspersky 20140912
Kingsoft 20140912
Malwarebytes 20140912
McAfee 20140912
McAfee-GW-Edition 20140912
Microsoft 20140912
eScan 20140912
NANO-Antivirus 20140912
Norman 20140912
nProtect 20140912
Panda 20140912
Qihoo-360 20140912
Rising 20140912
Sophos AV 20140912
SUPERAntiSpyware 20140912
Symantec 20140912
Tencent 20140912
TheHacker 20140912
TotalDefense 20140912
TrendMicro 20140912
TrendMicro-HouseCall 20140912
VBA32 20140911
VIPRE 20140912
ViRobot 20140912
Zillya 20140912
Zoner 20140912
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2013 AVG Technologies CZ, s.r.o.

Publisher AVG Technologies CZ
Product AVG Internet Security
Original name avgfws9.exe
Internal name avgfws9
File version 13.0.0.3310
Description AVG Firewall Service
Signature verification Signed file, verified signature
Signing date 10:07 AM 4/10/2013
Signers
[+] AVG Technologies CZ
Status Valid
Issuer None
Valid from 1:00 AM 1/6/2012
Valid to 12:59 AM 1/6/2015
Valid usage Code Signing
Algorithm SHA1
Thumbprint 7AC7F2C6891947E6BB43D632BE9167D8F2911A81
Serial number 49 84 48 9D EC 62 00 DE CE AD 93 D4 73 2C AB CA
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer None
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer None
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer None
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer None
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer None
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-04-10 07:48:48
Entry Point 0x000DE2D6
Number of sections 5
PE sections
PE imports
RegCloseKey
OpenServiceW
AdjustTokenPrivileges
ControlService
LookupPrivilegeValueW
CloseServiceHandle
ChangeServiceConfig2W
QueryServiceConfigW
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
CreateServiceW
SetServiceStatus
EnumServicesStatusExW
RegEnumValueW
StartServiceW
RegSetValueExW
OpenSCManagerW
RegisterServiceCtrlHandlerExW
QueryServiceLockStatusW
StartServiceCtrlDispatcherW
QueryServiceStatusEx
GetIpForwardTable
GetBestInterface
GetBestRoute
GetLastError
LoadLibraryW
OpenThread
FindVolumeClose
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
QueueUserAPC
FindNextVolumeW
lstrlenW
GetVolumePathNamesForVolumeNameW
HeapSetInformation
GetCurrentProcess
GetCurrentProcessId
InterlockedDecrement
GetProcAddress
InterlockedCompareExchange
EncodePointer
GetOverlappedResult
TlsFree
GetSystemDefaultUILanguage
WTSGetActiveConsoleSessionId
SetUnhandledExceptionFilter
CloseHandle
GetSystemTimeAsFileTime
WaitForMultipleObjects
DecodePointer
GetModuleHandleW
InterlockedExchange
LocalFree
WaitForMultipleObjectsEx
DeviceIoControl
CancelIo
CreateEventW
CreateFileW
CreateProcessW
TlsGetValue
Sleep
SetLastError
TlsSetValue
ExitProcess
GetCurrentThreadId
SleepEx
FindFirstVolumeW
_purecall
__wgetmainargs
memset
__dllonexit
_controlfp_s
swprintf_s
_invoke_watson
_fmode
__winitenv
getchar
_cexit
?terminate@@YAXXZ
wcsnlen
??2@YAPAXI@Z
_lock
_onexit
exit
_XcptFilter
_commode
__setusermatherr
_initterm_e
??_V@YAXPAX@Z
_amsg_exit
_CxxThrowException
memmove_s
_unlock
_set_invalid_parameter_handler
??3@YAXPAX@Z
memcpy
memcpy_s
_except_handler4_common
_initterm
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CxxFrameHandler3
memmove
_configthreadlocale
_exit
__set_app_type
DsEnumerateDomainTrustsW
NetApiBufferFree
SysAllocString
SysFreeString
VariantClear
VariantInit
SysAllocStringLen
RasEnumEntriesW
RasEnumConnectionsW
UuidFromStringW
UuidFromStringA
UnregisterDeviceNotification
MessageBoxW
WSAStartup
WSACreateEvent
GetAvgFwConfigurationFwCache
GetDefaultFwConfigPath
GetAvgFwConfigurationFwFull
AvgGetSqlite3ApiRoutines
AvgSqliteSetBusyTimeout
?AvgLowerString@@YGHW4AvgCodePage@@PA_WIPB_WPAII@Z
?SetDWordValue@AvgBasWinRegistryHandle@@QAGHKABU?$AvgStringRefBase@_W$0A@@@_N@Z
?Assign@AvgUtf16CharHeapBuffer@@QAGHPB_WI@Z
?Create@AvgBasCriticalSection@@QAGHXZ
??1AvgBasWinRegistryHandle@@QAE@XZ
?AvgKernel32_UnhandledExceptionFilter@@YGJPAU_EXCEPTION_POINTERS@@@Z
?GetThreadState@AvgBasThread@@QAGHAAW4ThreadState@1@@Z
??1AvgBasSharedLibraryLoader@@UAE@XZ
?AvgWinZwOpenFile@@YGHPB_WPAPAXKPAU_IO_STATUS_BLOCK@@KK@Z
?AddDaclAce@AvgWinSecurityDescriptor@@QAGHW4WellKnownSidType@AvgWinSecurityIdentifier@@HW4Type@AvgWinAce@@V?$AvgFlags@W4FlagsValues@AvgWinAce@@@@@Z
??0AvgBasObjectFactoryImpl@detail@@QAE@XZ
?AvgConvertString2Number@@YGHAAHPB_WIHPAPB_W@Z
?GetSessionIdForProcess@AvgEnvironment@@YGHAAKK@Z
?Initialize@AvgBasWinHandleWaitable@@QAGHPAX_N@Z
?AvgBasGetStackFrameModulePath@@YGHAAV?$IAvgString@_W$0A@@@ABUAvgBasStackFrameX86@@@Z
?AvgCopyString@@YGHPA_WIPB_WI@Z
?GetBuffer@AvgUtf16CharHeapBuffer@@QAGPA_WXZ
?Load@AvgBasSharedLibraryLoader@@QAGHPB_W@Z
?AttachTo@AvgBasSharedLibraryLoader@@QAGHPBDPCRAX@Z
?GetStringValue@AvgBasWinRegistryHandle@@QAGHAAV?$IAvgString@_W$0A@@@ABU?$AvgStringRefBase@_W$0A@@@@Z
?GetCurrentSessionId@AvgEnvironment@@YGHAAK@Z
?AvgPrintV@@YGHPB_WPAD@Z
?AvgCompareString@@YGHPB_W0II@Z
?OpenRegistryRoot@AvgBasWinRegistryHandle@@QAGHW4AvgBasWinRegistryRootType@@@Z
?GetFilename@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
??0AvgBasCriticalSection@@QAE@XZ
?IsInitialized@AvgBasThread@@QBG_NXZ
?GetCurrentModuleHandle@AvgProcess@@YGPAXXZ
?DetachResource@AvgBasWaitable@@IAGXXZ
??0AvgBasWinWow64FsRedirection@@QAE@XZ
?InternalWait@AvgBasWaitable@@IAGHH@Z
?SetViewMode@AvgBasWinRegistryHandle@@QAGHV?$AvgFlags@W4AvgBasWinRegistryViewModeValues@@@@@Z
??0AvgBasWinProcess@@QAE@XZ
?IsWindowsVista@OsInfo@AvgEnvironment@@YG_NXZ
?AvgGetStringSizeInElements@@YGIPBD@Z
?AvgKernel32IsFnLoaded_UnhandledExceptionFilter@@YG_NXZ
?Disable@AvgBasWinWow64FsRedirection@@QAGHXZ
?AvgGetStringSizeInElements@@YGIPB_W@Z
??0AvgSpinLockLocker@@QAE@PAUAvgSpinLock@@_N@Z
?Reset@AvgBasEvent@@QAGHXZ
?AvgNtdll_RtlDosPathNameToNtPathName_T_EliminateDosDevice@@YGHPB_WPAU_UNICODE_STRING@@@Z
??0AvgBasWinHandleWaitable@@QAE@PAX_N@Z
?AvgGetMb2Utf16StringSize@@YGHAAIPBDW4AvgCodePage@@I@Z
?Cleanup@AvgBasThread@@MAGXXZ
?ParseWinSecDes@AvgWinSecurityDescriptor@@KGHAAV1@PBXV?$AvgFlags@W4InformationValues@AvgWinSecurityDescriptor@@@@@Z
?AvgGetSystemTime@@YGHAA_K@Z
?AvgConvertAvgTimeToStruct@@YGHAAUAvgTimeStruct@@_K@Z
?AvgConvertMb2Utf16String@@YGHPA_WIPBDW4AvgCodePage@@PAII@Z
?CloneImpl@AvgWinSecurityDescriptor@@MBEHAAPAVAvgSecurityCtx@@@Z
?Create@AvgBasMutex@@QAGH_N@Z
?GetTempDirPath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PAI@Z
?GetProcessPriority@AvgProcess@@YGHKAAW4AvgPriority@@@Z
?IsSupported@AvgBasWinWow64FsRedirection@@QAG_NXZ
?AvgWinIsProcessBeingDebugged@@YG_NXZ
??0AvgBasWinRegistryHandle@@QAE@W4AvgBasWinRegistryRootType@@@Z
??1AvgBasWinWow64FsRedirection@@QAE@XZ
??1AvgUtf16CharHeapBuffer@@QAE@XZ
?Destroy@AvgBasWaitable@@UAGHXZ
?Destroy@AvgBasWinHandleWaitable@@UAGHXZ
?ClearSecurityAttributes@AvgWinSecurityDescriptor@@QAGXXZ
?AvgCreateErrorCodeFromWin32@@YGHK@Z
?GetForward@AvgBasWaitable@@IBGPAV1@XZ
??1AvgPeVersionInfo@@QAE@XZ
?AvgCreateWin32CodeFromErrorCode@@YG_NAAKH@Z
?AppendDescriptorToObject@AvgWinSecurity@@YGHAAVAvgWinSecurityDescriptor@@ABVAvgWinObject@@_N@Z
?Hash@AvgMiniSuperFastHash@@SGKPBE0K@Z
?IsStopRequested@AvgBasThread@@QAG_NXZ
?GetChildrenEnumeratorImpl@AvgBasWinRegistryHandle@@AAGHAAPAV?$IAvgEnumerator@U?$AvgStringzRefBase@_W$0A@@@@@@Z
?IsWindowsXP@OsInfo@AvgEnvironment@@YG_NXZ
??1AvgBasCriticalSection@@QAE@XZ
??1AvgBasObjectFactoryImpl@detail@@QAE@XZ
?GetHandle@AvgBasWaitable@@IBGPAXXZ
?Acquire@AvgBasMutex@@QAGHH@Z
?Assign@AvgGuidUtils@@YGXAAU_AvgGuid@@QBE@Z
?Unload@AvgBasSharedLibraryLoader@@UAGXXZ
?AvgGenerateRandomBuffer@@YGXPAEI@Z
?AvgGetTimestamp@@YGKXZ
?IsPathRooted@AvgBasPath@@YG_NPB_WI@Z
?GetCurrentThreadId@AvgBasThread@@SGKXZ
?Create@AvgBasWinProcess@@QAGHPB_W0PAVAvgSecurityCtx@@1W4CreationFlags@1@0@Z
?AvgMemXor@@YGXPAEPBEI@Z
?GetFullPath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?CreateDir@AvgBasFs@@YGHPB_W_NPAVAvgSecurityCtx@@@Z
?IsWindowsXPOrHigher@OsInfo@AvgEnvironment@@YG_NXZ
?IsWow64ViewModeSupported@AvgBasWinRegistryHandle@@SG_NXZ
?Initialize@AvgBasThread@@QAGHPAVAvgBasEvent@@@Z
?Set@AvgBasEvent@@QAGHXZ
?ClearStopRequest@AvgBasThread@@QAGHXZ
?StopThread@AvgBasThread@@QAGHH@Z
?FreeResource@AvgBasWaitable@@IAGHXZ
?Release@AvgBasMutex@@QAGHXZ
?GetUserByProcessId@AvgEnvironment@@YGHAAV?$IAvgString@_W$0A@@@K@Z
?IsEmpty@AvgUtf16CharHeapBuffer@@QBG_NXZ
?GetAvgObject@AvgBasObjectFactoryImpl@detail@@QAGHABU_AvgGuid@@PAPAX@Z
??1AvgSpinLockLocker@@QAE@XZ
?GetDirectoryPathFromFilenamePath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?GetOsInfoData@AvgEnvironment@@YGABUOsInfoData@1@XZ
?GetInformationType@AvgWinSecurityDescriptor@@QBG?AV?$AvgFlags@W4InformationValues@AvgWinSecurityDescriptor@@@@XZ
?Initialize@Impl@AvgBasFsWatcher@@QAGHABU?$AvgStringRefBase@_W$0A@@@_N0V?$AvgFlags@W4ChangeEvent@AvgBasFsWatcher@@@@IAAPAVAvgBasWaitable@@@Z
?Initialize@AvgBasObjectFactoryImpl@detail@@QAGHPBUAvgBasObjectFactoryMapping@@I@Z
?AvgGetUtf162MbStringSize@@YGHAAIPB_WW4AvgCodePage@@I@Z
?AvgConvertUtf162MbString@@YGHPADIPB_WW4AvgCodePage@@PAII@Z
?UnloadSharedLibraries@AvgBasObjectFactoryImpl@detail@@QAGX_N@Z
?Enable@AvgBasWinWow64FsRedirection@@QAGHXZ
??0AvgPeVersionInfo@@QAE@XZ
?GetFileVersion@AvgPeVersionInfo@@QBGHAAV?$IAvgString@_W$0A@@@@Z
?WaitForThreadToStop@AvgBasThread@@QAGHH@Z
?Destroy@AvgBasCriticalSection@@QAGHXZ
?AvgWinConstructDllSearchPath@@YGHAAVAvgUtf16CharHeapBuffer@@ABU?$AvgStringRefBase@_W$0A@@@@Z
?IsWindowsVistaOrHigher@OsInfo@AvgEnvironment@@YG_NXZ
?AvgUpperString@@YGHW4AvgCodePage@@PA_WIPB_WPAII@Z
?GetDWordValue@AvgBasWinRegistryHandle@@QAGHAAKABU?$AvgStringRefBase@_W$0A@@@@Z
?OpenKeyIfExists@AvgBasWinRegistryHandle@@QAGHABU?$AvgStringRefBase@_W$0A@@@@Z
?Wait@AvgBasEvent@@QAGHH@Z
?AvgGetSystemTime@@YGHAAUAvgTimeStruct@@@Z
?GetCurrentProcessId@AvgProcess@@YGKXZ
?GetSecurityDescriptor@AvgWinSecurityDescriptor@@QAGHAAPAX@Z
?Assign@AvgWinSecurityDescriptor@@QAGHABVAvgSecurityCtx@@@Z
?LoadFromFile@AvgPeVersionInfo@@QAGHABU?$AvgStringzRefBase@_W$0A@@@@Z
?AvgKernel32ForceInitialize@@YGXXZ
?DirectoryExists@AvgBasFs@@YGHPB_W@Z
?AvgCreateErrorCodeFromWin32@@YGHW4_AvgErrorCodeSeverity@@K@Z
?Assign@AvgGuidUtils@@YGXAAU_AvgGuid@@ABU2@@Z
??0AvgTimeStruct@@QAE@XZ
?FileExists@AvgBasFs@@YGHPB_W@Z
?SetStopRequest@AvgBasThread@@QAGHXZ
?Initialize@AvgWinSecurityDescriptor@@QAGHXZ
?CreateLuid@AvgGuidUtils@@YGHAAU_AvgGuid@@@Z
?AvgKernel32_SetUnhandledExceptionFilter@@YGP6GJPAU_EXCEPTION_POINTERS@@@ZP6GJ0@Z@Z
?CloseKey@AvgBasWinRegistryHandle@@QAGXXZ
?GetFileSize@AvgBasFs@@YGHPB_WAA_J@Z
?GetDetailsDefaultTranslation@AvgPeVersionInfo@@ABGHAAUCrossmoduleDetails@1@AAUTranslation@1@@Z
?Clear@AvgUtf16CharHeapBuffer@@QAGXXZ
?GetBinaryValue@AvgBasWinRegistryHandle@@QAGHAAV?$IAvgBuffer@E@@ABU?$AvgStringRefBase@_W$0A@@@@Z
?GetProcessExitCode@AvgBasWinProcess@@QAGHAAH@Z
?GetRandomName@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PAI@Z
?Release@AvgBasCriticalSection@@QAGHXZ
??0AvgUtf16CharHeapBuffer@@QAE@XZ
?GetString@AvgGuidUtils@@YGHABU_AvgGuid@@AAU_AVG_UTF16CHAR_STR@@@Z
?IsWindows2k@OsInfo@AvgEnvironment@@YG_NXZ
?IsInitialized@AvgBasWaitable@@QBG_NXZ
?IsWindows8OrHigher@OsInfo@AvgEnvironment@@YG_NXZ
?Delete@Impl@AvgBasFsWatcher@@SGXPAU12@@Z
?Sleep@AvgBasThread@@SGHH@Z
?New@Impl@AvgBasFsWatcher@@SGPAU12@XZ
?Delete@AvgBasFs@@YGHPB_WV?$AvgFlags@W4FileDeleteFlagItems@AvgBasFs@@@@@Z
??0AvgBasSharedLibraryLoader@@QAE@PB_W@Z
?ValueExists@AvgBasWinRegistryHandle@@QAG_NABU?$AvgStringRefBase@_W$0A@@@@Z
?Initialize@AvgWinMandatoryLabel@@QAGHW4Label@1@V?$AvgFlags@W4FlagsValues@AvgWinMandatoryLabel@@@@@Z
?GetThreadStopRequestEvent@AvgBasThread@@QAGAAVAvgBasEvent@@XZ
?AvgInitializeSysMini@@YGHXZ
?GetResourceType@AvgBasWaitable@@IBG?AW4AvgBasWaitableResourceType@@XZ
?GetModuleDirectory@AvgModule@@YGHPAXAAU_AVG_UTF16CHAR_STR@@PAI@Z
?GetSpecialFolder@AvgEnvironment@@YGHW4SpecialFolder@1@AAV?$IAvgString@_W$0A@@@@Z
?IsSystemProcess@AvgProcess@@YG_NK@Z
?GetThreadExitCode@AvgBasThread@@QAGHAAH@Z
?AvgCompareStringNoCase@@YGHW4AvgCodePage@@PB_W1II@Z
?AddDaclAce@AvgWinSecurityDescriptor@@QAGHABVAvgWinAce@@@Z
?AvgFindSubStringFromRight@@YGPB_WPB_W0II@Z
?IsInitialized@AvgBasCriticalSection@@QBG_NXZ
?Initialize@AvgWinSecurityIdentifier@@QAGHW4WellKnownSidType@1@PBV1@@Z
?InitializeEnvironment@AvgEnvironment@@YGHXZ
?AvgBufferXor@@YGXPAEPBEI1I_J@Z
?Create@AvgBasEvent@@QAGHW4ResetType@1@_N@Z
?AttachForward@AvgBasWaitable@@IAGXPAV1@@Z
?StartThread@AvgBasThread@@QAGHW4AvgPriority@@PAVAvgSecurityCtx@@V?$AvgFlags@W4ThreadFlag@AvgBasThread@@@@PBD@Z
?AvgConvertLocalTimeToSystemTime@@YGHAAUAvgTimeStruct@@@Z
?Acquire@AvgBasCriticalSection@@QAGHXZ
?IsWindowsServer2k3@OsInfo@AvgEnvironment@@YG_NXZ
?GetRandomNameSize@AvgBasPath@@YGIXZ
?AvgFormatStringV@@YGHW4AvgCodePage@@PA_WIPB_WPAIPAD@Z
?GetMaxPathLength@AvgEnvironment@@YGHAAIPB_W@Z
?GetChanges@Impl@AvgBasFsWatcher@@QAGHAAV?$IAvgBackInserter@UAvgBasFsWatcher_CrossChangeItem@@@@@Z
?GetLongPath@AvgBasPath@@YGHAAU_AVG_UTF16CHAR_STR@@PB_WIPAI@Z
?ReleaseClonedObject@AvgWinSecurityDescriptor@@UAEXXZ
LdrUnloadDll
RtlCreateUserProcess
RtlReAllocateHeap
ZwReadFile
ZwQuerySystemInformation
ZwCreateFile
ZwFreeVirtualMemory
ZwTerminateProcess
ZwResumeThread
ZwWriteFile
RtlAcquirePebLock
ZwSetInformationThread
RtlReleasePebLock
ZwFsControlFile
ZwWaitForMultipleObjects
ZwUnmapViewOfSection
ZwMapViewOfSection
RtlAllocateHeap
ZwQueryInformationFile
RtlRemoveVectoredExceptionHandler
RtlAddVectoredExceptionHandler
ZwSetEvent
RtlInitUnicodeString
ZwFlushBuffersFile
RtlNtStatusToDosError
ZwDuplicateObject
RtlFreeHeap
RtlFreeUnicodeString
ZwAllocateVirtualMemory
ZwCancelIoFile
ZwSetInformationFile
ZwOpenFile
RtlInitAnsiString
LdrGetProcedureAddress
RtlCreateUnicodeString
ZwFlushVirtualMemory
ZwCreateSection
ZwCreateNamedPipeFile
LdrLoadDll
ZwWaitForSingleObject
ZwClose
ZwQueryVirtualMemory
ZwCreateEvent
CoInitializeEx
CoCreateInstance
CoUninitialize
CoInitializeSecurity
SnmpUtilOidCpy
SnmpUtilOidFree
SnmpUtilOidNCmp
PE exports
Number of PE resources by type
RT_ICON 10
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 12
ENGLISH US 1
PE resources
ExifTool file metadata
SpecialBuild
AvgVC10_2013_0410_085952(3310), SVNRev e9f68ad (release/SmallUpdate2013-04_Beta)

SubsystemVersion
5.1

InitializedDataSize
384512

ImageVersion
0.0

ProductName
AVG Internet Security

FileVersionNumber
13.0.0.3310

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x0017

CharacterSet
Unicode

LinkerVersion
10.0

OriginalFilename
avgfws9.exe

PrivateBuild
Win32 Release_Unicode_DLS

MIMEType
application/octet-stream

Subsystem
Windows command line

FileVersion
13.0.0.3310

TimeStamp
2013:04:10 08:48:48+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
avgfws9

FileAccessDate
2014:07:19 21:50:35+01:00

ProductVersion
13.0.0.3310

FileDescription
AVG Firewall Service

OSVersion
5.1

FileCreateDate
2014:07:19 21:50:35+01:00

FileOS
Win32

LegalCopyright
Copyright (C) 2013 AVG Technologies CZ, s.r.o.

MachineType
Intel 386 or later, and compatibles

CompanyName
AVG Technologies CZ, s.r.o.

CodeSize
1025536

FileSubtype
0

ProductVersionNumber
13.0.0.3310

EntryPoint
0xde2d6

ObjectFileType
Executable application

File identification
MD5 6d3a517fe33ad047578bf73bb447eead
SHA1 4f0ba221e100f09def23dd2cb0f50ff6aab8f4ec
SHA256 32f12b410146e22bb96e3f55f5d60ea55681959313cafb56cf99705d20c92e6c
ssdeep
24576:5GvENyyBHMV1SVWG6T4FPGysWBevDb5+DVxttv3UvQ/GGRXew6skXnML9WOKGOJD:5GIRMpT4FPGysWXnXvlBHAis258K2ILo

authentihash 1514b82f15397ddc44c243d3b6f512f63ee49ea31f6fdc5f1dc51528db9d93f5
imphash dae579f02b3dfc0db24504198dc82f4c
File size 1.4 MB ( 1428472 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.4%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed

VirusTotal metadata
First submission 2013-05-09 19:26:28 UTC ( 5 years, 10 months ago )
Last submission 2013-07-09 19:27:22 UTC ( 5 years, 8 months ago )
File names avgfws9.exe
avgfws.exe
vt-upload-u_SW7G
avgfws.exe
avgfws.exe
avgfws9
avgfws.exe
avgfws.exe
avgfws.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!