× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 45c2c46815fb1b97fe46fcd9a34427fa72d858ab6739c305bcb234ceb80666a5
File name: vt-upload-0kbpbj
Detection ratio: 0 / 51
Analysis date: 2014-03-21 01:55:59 UTC ( 4 years, 12 months ago )
Antivirus Result Update
Ad-Aware 20140321
AegisLab 20140321
Yandex 20140320
AhnLab-V3 20140320
AntiVir 20140321
Antiy-AVL 20140320
Avast 20140321
AVG 20140320
Baidu-International 20140320
BitDefender 20140321
Bkav 20140320
ByteHero 20140321
CAT-QuickHeal 20140320
ClamAV 20140321
CMC 20140319
Commtouch 20140321
Comodo 20140321
DrWeb 20140321
Emsisoft 20140321
ESET-NOD32 20140321
F-Prot 20140321
F-Secure 20140321
Fortinet 20140321
GData 20140321
Ikarus 20140321
Jiangmin 20140320
K7AntiVirus 20140320
K7GW 20140320
Kaspersky 20140321
Kingsoft 20140321
Malwarebytes 20140321
McAfee 20140321
McAfee-GW-Edition 20140321
Microsoft 20140321
eScan 20140321
NANO-Antivirus 20140321
Norman 20140320
nProtect 20140320
Panda 20140320
Qihoo-360 20140321
Rising 20140320
Sophos AV 20140321
SUPERAntiSpyware 20140321
Symantec 20140321
TheHacker 20140320
TotalDefense 20140320
TrendMicro 20140321
TrendMicro-HouseCall 20140321
VBA32 20140320
VIPRE 20140321
ViRobot 20140320
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© ?????????? ??????????. ??? ????? ????????.

Publisher ?????????? ??????????
Product ???????????? ??????? Microsoft® Windows®
Original name CLEANMGR.DLL
Internal name CLEANMGR
File version 6.00.2900.5512 (xpsp.080413-2105)
Description ????????? ??????? ????????? ???????????? ??? Windows
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-04-13 18:35:26
Entry Point 0x000055B1
Number of sections 3
PE sections
PE imports
RegCloseKey
RegEnumKeyW
RegSetValueExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
CreatePropertySheetPageW
ImageList_Create
Ord(17)
ImageList_ReplaceIcon
PropertySheetW
SetBkColor
SetBkMode
GetTextExtentPoint32W
SetTextColor
ExtTextOutW
GetLastError
LoadLibraryExW
GetDriveTypeW
LoadLibraryW
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
GetTickCount
lstrlenW
GetCurrentProcess
LocalAlloc
OpenProcess
GetVolumeInformationW
GetCommandLineW
CreateThread
UnhandledExceptionFilter
SetErrorMode
GetStartupInfoW
GetProcAddress
lstrcpyW
WideCharToMultiByte
GetModuleHandleA
GetSystemDirectoryW
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
GetModuleHandleW
SetEvent
LocalFree
FormatMessageW
TerminateProcess
CreateEventW
CreateProcessW
GetDiskFreeSpaceExW
PulseEvent
Sleep
GetCurrentThreadId
GetCurrentProcessId
MulDiv
VariantClear
VariantInit
ExtractIconExW
ShellExecuteW
Ord(680)
SHGetFileInfoW
StrCmpW
SHDeleteKeyW
Ord(346)
StrCpyNW
StrCpyW
StrStrIW
StrFormatKBSizeW
StrToIntW
SetFocus
EndDialog
EnumWindows
FindWindowW
ShowWindow
GetWindowThreadProcessId
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
EnableWindow
DialogBoxParamW
TranslateMessage
PostMessageW
GetSysColor
SetDlgItemTextW
DispatchMessageW
CreateDialogParamW
SendMessageW
RegisterClassW
GetWindowLongW
DrawIconEx
WinHelpW
LoadStringW
GetClientRect
GetDlgItem
SendDlgItemMessageW
DrawFocusRect
IsDialogMessageW
GetWindowTextW
LoadCursorW
LoadIconW
MsgWaitForMultipleObjects
wsprintfW
SetForegroundWindow
DestroyWindow
DefDlgProcW
SetCursor
_except_handler3
__p__fmode
_c_exit
_adjust_fdiv
__p__commode
__setusermatherr
_cexit
__initenv
exit
_XcptFilter
toupper
__getmainargs
_initterm
_exit
_controlfp
__set_app_type
CoUninitialize
CoInitialize
CoTaskMemAlloc
CLSIDFromString
CoCreateInstance
CoTaskMemFree
Number of PE resources by type
RT_ICON 14
RT_BITMAP 8
RT_DIALOG 7
RT_GROUP_ICON 4
RT_STRING 2
RT_MESSAGETABLE 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 38
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
1804800

ImageVersion
5.1

ProductName
Microsoft Windows

FileVersionNumber
6.0.2900.5512

LanguageCode
Russian

FileFlagsMask
0x003f

FileDescription
Windows

CharacterSet
Unicode

LinkerVersion
7.1

OriginalFilename
CLEANMGR.DLL

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.00.2900.5512 (xpsp.080413-2105)

TimeStamp
2008:04:13 19:35:26+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
CLEANMGR

FileAccessDate
2014:03:21 02:55:10+01:00

ProductVersion
6.00.2900.5512

SubsystemVersion
4.1

OSVersion
5.1

FileCreateDate
2014:03:21 02:55:10+01:00

FileOS
Windows NT 32-bit

LegalCopyright
. .

MachineType
Intel 386 or later, and compatibles

CodeSize
22016

FileSubtype
0

ProductVersionNumber
6.0.2900.5512

EntryPoint
0x55b1

ObjectFileType
Executable application

File identification
MD5 1a1e1c8ddb7581a7bd48c1bdfae5e5b7
SHA1 77a4dcbdfa33adc15dcdd67bd1ea8ab57dc800d6
SHA256 45c2c46815fb1b97fe46fcd9a34427fa72d858ab6739c305bcb234ceb80666a5
ssdeep
6144:NkDkgTTmsWyf1ldyKFd8QFt5Mc+nIdYLfrjrEaegsCL61Qycn9FNx/H9zjMvG+k:ypisNJ48zuNWq4RWs

imphash a4df2eeb35e0b46d612e4033fdd4712b
File size 1.7 MB ( 1827840 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2014-03-21 01:55:59 UTC ( 4 years, 12 months ago )
Last submission 2014-03-21 01:55:59 UTC ( 4 years, 12 months ago )
File names CLEANMGR
vt-upload-0kbpbj
CLEANMGR.DLL
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs