× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3810858716da2862abd4e9bebb048d275bd05337b1dec3964669bfec34ea909d
File name: TorchInstaller.dll
Detection ratio: 2 / 54
Analysis date: 2016-01-29 04:03:13 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
AegisLab AdWare.W32.SoftwareInformer 20160129
Bkav W32.HfsAdware.F59A 20160128
Ad-Aware 20160129
Yandex 20160128
AhnLab-V3 20160128
Alibaba 20160129
ALYac 20160129
Antiy-AVL 20160129
Arcabit 20160129
Avast 20160129
AVG 20160129
Avira (no cloud) 20160129
Baidu-International 20160128
BitDefender 20160129
ByteHero 20160129
CAT-QuickHeal 20160128
ClamAV 20160129
CMC 20160111
Comodo 20160129
Cyren 20160129
DrWeb 20160129
Emsisoft 20160129
ESET-NOD32 20160129
F-Prot 20160129
F-Secure 20160128
Fortinet 20160129
GData 20160129
Ikarus 20160129
Jiangmin 20160129
K7AntiVirus 20160128
K7GW 20160128
Kaspersky 20160129
Malwarebytes 20160129
McAfee 20160129
McAfee-GW-Edition 20160129
Microsoft 20160129
eScan 20160129
NANO-Antivirus 20160129
nProtect 20160128
Panda 20160128
Qihoo-360 20160129
Rising 20160128
Sophos AV 20160129
SUPERAntiSpyware 20160129
Symantec 20160128
Tencent 20160129
TheHacker 20160124
TrendMicro 20160129
TrendMicro-HouseCall 20160129
VBA32 20160128
VIPRE 20160129
ViRobot 20160129
Zillya 20160128
Zoner 20160129
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 7:05 PM 12/26/2015
Signers
[+] Torch Media Inc.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer thawte SHA256 Code Signing CA - G2
Valid from 1:00 AM 10/26/2015
Valid to 12:59 AM 6/26/2016
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 7E4DC37BBAFB298FCB6DF29AE9EBA2993C972B74
Serial number 58 21 49 9C 77 53 14 DC 77 3D E2 10 C0 E1 B8 FB
[+] thawte SHA256 Code Signing CA - G2
Status Valid
Issuer thawte Primary Root CA - G3
Valid from 1:00 AM 7/22/2014
Valid to 12:59 AM 7/22/2024
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint F3759A4E5448BACDB78562328461045844216EB7
Serial number 0B F3 CC 63 CF 04 30 4D 47 C3 B5 87 04 9F A8 07
[+] thawte Primary Root CA - G3
Status Valid
Issuer thawte Primary Root CA - G3
Valid from 1:00 AM 4/2/2008
Valid to 12:59 AM 12/2/2037
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha256RSA
Thumbprint F18B538D1BE903B6A6F056435B171589CAF36BF2
Serial number 60 01 97 B7 46 A7 EA B4 B4 9A D6 4B 2F F7 90 FB
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-12-26 18:04:58
Entry Point 0x0006F13A
Number of sections 6
PE sections
Overlays
MD5 d42b8dcbbc9a6c12993f65f9222fe09b
File type data
Offset 1416704
Size 6008
Entropy 7.33
PE imports
DuplicateTokenEx
RegCloseKey
OpenProcessToken
IsValidSid
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegQueryValueExW
AdjustTokenPrivileges
CreateProcessAsUserW
LookupPrivilegeValueW
LookupAccountNameW
ConvertSidToStringSidW
DeleteDC
CreateRectRgn
SetBkMode
SetDIBColorTable
CreateFontW
SelectObject
GetObjectW
BitBlt
SelectClipRgn
CreateCompatibleDC
DeleteObject
CreateDIBSection
GetStdHandle
GetDriveTypeW
ReleaseMutex
InterlockedPopEntrySList
WaitForSingleObject
GetDriveTypeA
HeapDestroy
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
GetFileInformationByHandle
FileTimeToSystemTime
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
InterlockedExchange
FindResourceExW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
ResumeThread
SetWaitableTimer
InterlockedPushEntrySList
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
PeekNamedPipe
DeviceIoControl
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
EnumSystemLocalesA
SetThreadPriority
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
CreateMutexA
GetModuleHandleA
LockFileEx
CreateSemaphoreA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SleepEx
WriteConsoleW
CreateToolhelp32Snapshot
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
RtlUnwind
GetDateFormatA
GetFileSize
OpenProcess
GetStartupInfoW
DeleteFileW
GetProcAddress
GetProcessHeap
CompareStringW
WriteFile
RemoveDirectoryW
FreeEnvironmentStringsW
FindFirstFileExA
WTSGetActiveConsoleSessionId
ResetEvent
CreateWaitableTimerA
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
GetConsoleCP
GetEnvironmentStringsW
lstrlenW
Process32NextW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCPInfo
HeapSize
GetCommandLineA
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
RaiseException
ReleaseSemaphore
TlsFree
SetFilePointer
ReadFile
CloseHandle
UnlockFileEx
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
OpenEventA
VirtualAlloc
GetTimeFormatA
AlphaBlend
AccessibleChildren
AccessibleObjectFromWindow
SysFreeString
VariantCopy
VariantClear
VariantInit
SHGetFolderPathW
MapWindowPoints
GetMonitorInfoW
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
KillTimer
ShowWindow
SetWindowPos
EnableMenuItem
GetWindowRect
EndPaint
MoveWindow
DialogBoxParamW
GetWindow
PostMessageW
BeginPaint
SendMessageW
UnregisterClassA
IsWindowVisible
SetWindowTextW
SetWindowLongW
GetDlgItem
DrawTextW
BringWindowToTop
MonitorFromWindow
ScreenToClient
InvalidateRect
SetTimer
CallWindowProcW
GetActiveWindow
CopyRect
GetSystemMenu
FindWindowExW
GetWindowLongW
GetClientRect
CreateEnvironmentBlock
ExpandEnvironmentStringsForUserW
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetSetOptionW
InternetGetConnectedState
HttpSendRequestW
InternetOpenW
HttpOpenRequestW
getaddrinfo
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
select
getsockopt
recv
send
ntohs
WSAGetLastError
__WSAFDIsSet
WSACleanup
gethostbyname
WSASetLastError
closesocket
WSAIoctl
setsockopt
socket
bind
WTSQuerySessionInformationW
WTSQueryUserToken
WTSFreeMemory
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipCreateBitmapFromFile
GdipBitmapUnlockBits
GdipGetImageWidth
GdipBitmapLockBits
GdipAlloc
GdipFree
GdipCloneImage
GdiplusStartup
GdipGetImagePaletteSize
GdipGetImageHeight
GdipDrawImageI
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePixelFormat
PE exports
Number of PE resources by type
PNG 7
RT_DIALOG 4
RT_BITMAP 2
RT_STRING 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 15
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
dll

TimeStamp
2015:12:26 19:04:58+01:00

FileType
Win32 DLL

PEType
PE32

CodeSize
734208

LinkerVersion
10.0

ImageFileCharacteristics
Executable, 32-bit, DLL

EntryPoint
0x6f13a

InitializedDataSize
681472

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 44333cccedcadd85f320d5bb20b37838
SHA1 79996f1217eacd0b614fbea774f50ee155400b22
SHA256 3810858716da2862abd4e9bebb048d275bd05337b1dec3964669bfec34ea909d
ssdeep
24576:3rSSA9Na6N0sUgkmKYwJ80DHUgSeZqJJ17tYZZw6dBbl4PrA:32SqB0AKvJzf7dBbl4PrA

authentihash 3b565f765be83bbf340c2d459b58728e5294907e454cc3a5af6e7174297125a4
imphash ab20454aa7b9558c71a54b1aa72d1e12
File size 1.4 MB ( 1422712 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
pedll signed overlay

VirusTotal metadata
First submission 2015-12-27 20:14:11 UTC ( 2 years, 11 months ago )
Last submission 2018-05-25 18:14:00 UTC ( 6 months, 3 weeks ago )
File names TorchInstaller.dll
torchinstaller.dll
TorchInstaller.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!