× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3a14b6027f97a75478951c13089a3c9861feb86d68d84395a7d504298c43d740
File name: blekkotb.exe
Detection ratio: 0 / 42
Analysis date: 2012-07-20 16:30:48 UTC ( 6 years, 4 months ago ) View latest
Antivirus Result Update
AhnLab-V3 20120720
AntiVir 20120720
Antiy-AVL 20120717
Avast 20120720
AVG 20120720
BitDefender 20120720
ByteHero 20120719
CAT-QuickHeal 20120720
ClamAV 20120720
Commtouch 20120720
Comodo 20120720
DrWeb 20120720
Emsisoft 20120720
eSafe 20120719
ESET-NOD32 20120720
F-Prot 20120720
F-Secure 20120720
Fortinet 20120720
GData 20120720
Ikarus 20120720
Jiangmin 20120720
K7AntiVirus 20120720
Kaspersky 20120720
McAfee 20120720
McAfee-GW-Edition 20120720
Microsoft 20120720
Norman 20120720
nProtect 20120720
Panda 20120720
PCTools 20120720
Rising 20120720
Sophos AV 20120720
SUPERAntiSpyware 20120720
Symantec 20120720
TheHacker 20120720
TotalDefense 20120718
TrendMicro 20120720
TrendMicro-HouseCall 20120720
VBA32 20120720
VIPRE 20120720
ViRobot 20120720
VirusBuster 20120720
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© Visicom Media Inc. (License)

Publisher Visicom Media Inc.
Product blekko search bar
File version 1.6.28.12
Description blekko search bar Installer
Comments blekko search bar
Signature verification Signed file, verified signature
Signing date 2:08 AM 6/29/2012
Signers
[+] Visicom Media Inc.
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 4/18/2012
Valid to 12:59 AM 6/22/2014
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm SHA1
Thumbprint 52DB3586EC9B3C072654C9BAFD964428760F3130
Serial number 2B 19 B5 4B B7 AB EE 1A 26 23 11 1C 02 9A F4 49
[+] Thawte Code Signing CA - G2
Status Valid
Issuer None
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Issuer None
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Issuer None
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer None
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT docwrite, UPX, maxorder, appended, NSIS, UTF-8, eval
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-05 22:50:46
Entry Point 0x0000323C
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
EnableMenuItem
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
ShowWindow
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 4
RT_ICON 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
NEUTRAL 1
PE resources
ExifTool file metadata
CodeSize
23552

UninitializedDataSize
1024

Comments
blekko search bar

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
1.6.28.12

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
119808

MIMEType
application/octet-stream

LegalCopyright
Visicom Media Inc. (License)

FileVersion
1.6.28.12

TimeStamp
2009:12:05 23:50:46+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

FileAccessDate
2015:02:02 13:42:46+01:00

ProductVersion
1.6.28.12

FileDescription
blekko search bar Installer

OSVersion
4.0

FileCreateDate
2015:02:02 13:42:46+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Visicom Media Inc.

LegalTrademarks
Visicom Media Inc., All Rights Reserved

ProductName
blekko search bar

ProductVersionNumber
1.6.28.12

EntryPoint
0x323c

ObjectFileType
Executable application

File identification
MD5 7c47b6c2d134287c53f011d957a093a9
SHA1 f392dccd1df0da8f96fc4065d0a00ae6864c5972
SHA256 3a14b6027f97a75478951c13089a3c9861feb86d68d84395a7d504298c43d740
ssdeep
49152:o/vOVkuwYIRj74qpAmJ5i24My+Eq9nUbeFt1D4TmT+IiukWUjyds7j:jkNvpxV4M4Zbg1DgmZiuCyQ

authentihash 9290067b98371d7bd9382b1b4c8f1e998de062c702e480bafdc68452849e76b3
imphash 099c0646ea7282d232219f8807883be0
File size 2.3 MB ( 2434096 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe signed upx

VirusTotal metadata
First submission 2012-07-20 16:30:48 UTC ( 6 years, 4 months ago )
Last submission 2013-04-14 07:14:04 UTC ( 5 years, 7 months ago )
File names blekkotb.exe
blekkotb installer.exe
file-4569494_exe
blekkotb.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Created mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.