× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 46756f08c744cdcca8afb24cb8b2dbc0af12853b59067ff916b9f3d38344a666
File name: REMon.exe
Detection ratio: 0 / 57
Analysis date: 2017-02-23 17:52:59 UTC ( 1 year, 5 months ago )
Antivirus Result Update
Ad-Aware 20170223
AegisLab 20170223
AhnLab-V3 20170223
Alibaba 20170223
ALYac 20170223
Antiy-AVL 20170223
Arcabit 20170223
Avast 20170223
AVG 20170223
Avira (no cloud) 20170223
AVware 20170223
Baidu 20170223
BitDefender 20170223
Bkav 20170223
CAT-QuickHeal 20170223
ClamAV 20170223
CMC 20170223
Comodo 20170223
CrowdStrike Falcon (ML) 20170130
Cyren 20170223
DrWeb 20170223
Emsisoft 20170223
Endgame 20170222
ESET-NOD32 20170223
F-Prot 20170223
F-Secure 20170223
Fortinet 20170223
GData 20170223
Ikarus 20170223
Sophos ML 20170203
Jiangmin 20170223
K7AntiVirus 20170223
K7GW 20170223
Kaspersky 20170223
Kingsoft 20170223
Malwarebytes 20170223
McAfee 20170223
McAfee-GW-Edition 20170223
Microsoft 20170223
eScan 20170223
NANO-Antivirus 20170223
nProtect 20170223
Panda 20170223
Qihoo-360 20170223
Rising None
Sophos AV 20170223
SUPERAntiSpyware 20170223
Symantec 20170223
Tencent 20170223
TheHacker 20170223
TrendMicro 20170223
Trustlook 20170223
VBA32 20170223
VIPRE 20170223
ViRobot 20170223
Webroot 20170223
WhiteArmor 20170222
Yandex 20170222
Zillya 20170222
Zoner 20170223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2005 IZEX CO., LTD. All rights reserved.

Product REMon
Original name REMon.EXE
Internal name REMon
File version 2, 0, 0, 0
Description IR Pro Monitor
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-06-21 06:22:28
Entry Point 0x0001AE0B
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
ImageList_GetImageCount
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
Ord(17)
ImageList_GetIcon
CreatePolygonRgn
GetWindowExtEx
SetMapMode
PatBlt
OffsetRgn
CreatePen
SaveDC
Pie
TextOutA
CreateFontIndirectA
GetTextMetricsA
FillRgn
LPtoDP
CombineRgn
GetClipBox
Rectangle
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
CreateSolidBrush
DeleteObject
IntersectClipRect
BitBlt
CreateDIBSection
SetTextColor
GetObjectA
SelectObject
RectVisible
FrameRgn
CreateBitmap
MoveToEx
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
LineTo
GetTextExtentPointA
ScaleViewportExtEx
SelectClipRgn
CreateCompatibleDC
StretchBlt
CreateRoundRectRgn
SetROP2
CreateRectRgn
GetBkColor
GetTextExtentPoint32A
GetMapMode
Ellipse
SetWindowExtEx
GetTextColor
PtVisible
DPtoLP
Escape
GetViewportExtEx
SetViewportExtEx
CreateCompatibleBitmap
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
GetDriveTypeA
HeapDestroy
IsBadCodePtr
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
MoveFileA
GetLogicalDriveStringsA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GlobalFindAtomA
ExitProcess
GetVersionExA
RemoveDirectoryA
GetVolumeInformationA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
SetFileAttributesA
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
WinExec
GetFileSize
GlobalDeleteAtom
DeleteFileA
GetWindowsDirectoryA
GlobalLock
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
CreateFileMappingA
FindNextFileA
DuplicateHandle
GetProcAddress
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
LCMapStringW
UnmapViewOfFile
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
OpenMutexA
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetVersion
SizeofResource
CreateProcessA
HeapCreate
VirtualFree
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
Shell_NotifyIconA
SetFocus
RegisterClipboardFormatA
GetMessagePos
SetWindowRgn
SetMenuItemBitmaps
DrawStateA
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
ScreenToClient
GetWindowLongA
GrayStringA
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
SetWindowContextHelpId
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
GetTopWindow
RegisterHotKey
ExcludeUpdateRgn
GetActiveWindow
GetWindowTextA
PtInRect
GetMessageA
GetParent
MapDialogRect
UpdateWindow
SetPropA
GetMenuState
ShowWindow
GetPropA
GetNextDlgGroupItem
ValidateRect
EnableWindow
LoadImageA
GetDlgItemTextA
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
GetIconInfo
LoadStringA
GetWindowPlacement
IsIconic
RegisterClassA
TabbedTextOutA
DrawFocusRect
CreateWindowExA
FillRect
CopyRect
GetSysColorBrush
IsWindowUnicode
EndPaint
DestroyWindow
IsChild
IsDialogMessageA
MapWindowPoints
SetCapture
BeginPaint
OffsetRect
ReleaseCapture
KillTimer
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
PostMessageA
DrawIcon
SetWindowLongA
RemovePropA
SetWindowTextA
ShowCaret
GetSubMenu
GetLastActivePopup
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
GetDesktopWindow
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
ChildWindowFromPointEx
IntersectRect
EndDialog
HideCaret
CharNextA
GetCapture
MessageBeep
CheckMenuItem
AppendMenuA
UnhookWindowsHookEx
SetDlgItemTextA
MoveWindow
CallWindowProcA
MessageBoxA
GetCursor
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
DestroyIcon
IsWindowVisible
WinHelpA
SetRect
InvalidateRect
wsprintfA
DrawTextA
DefDlgProcA
IsRectEmpty
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CLSIDFromString
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoGetClassObject
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemFree
CreateILockBytesOnHGlobal
CoTaskMemAlloc
Number of PE resources by type
RT_STRING 11
RT_BITMAP 4
RT_ICON 2
RT_CURSOR 2
RT_VERSION 2
RT_DIALOG 1
RT_GROUP_CURSOR 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE SIMPLIFIED 23
KOREAN 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
98304

ImageVersion
0.0

ProductName
REMon

FileVersionNumber
2.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
REMon.EXE

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2, 0, 0, 0

TimeStamp
2006:06:21 07:22:28+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
REMon

ProductVersion
2, 0, 0, 0

FileDescription
IR Pro Monitor

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright (C) 2005 IZEX CO., LTD. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CodeSize
225280

FileSubtype
0

ProductVersionNumber
2.0.0.0

EntryPoint
0x1ae0b

ObjectFileType
Executable application

File identification
MD5 1c86f598a3139ea39fb7edff5576cc75
SHA1 68c7040d4b1584a9ce691ed3b94c092c7bc9d00e
SHA256 46756f08c744cdcca8afb24cb8b2dbc0af12853b59067ff916b9f3d38344a666
ssdeep
3072:hiGIOt8IVMyDM2djpC/HfrxRZ+bPe3NI1sCZ+VgEz7Pw72zwO37/V7YKENav2tiR:h2Otvg2sVRr3NID+Zz747cYTL2T

authentihash 3c5654720e9d4c25dac3db209137db09ab38c7028ebb470e10198bcaa668a63c
imphash 1f93597253836d86cf443778c0724a5a
File size 300.0 KB ( 307200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.8%)
Win64 Executable (generic) (31.7%)
Windows screen saver (15.0%)
Win32 Dynamic Link Library (generic) (7.5%)
Win32 Executable (generic) (5.1%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2009-04-06 08:41:55 UTC ( 9 years, 4 months ago )
Last submission 2017-02-23 17:52:59 UTC ( 1 year, 5 months ago )
File names REMon.EXE
remon.exe
1C86F598A3139EA39FB7EDFF5576CC75
smona131463388952834915262
Remon.exe
REMon.exe
REMon
68c7040d4b1584a9ce691ed3b94c092c7bc9d00e.bin
Remon.exe
remon.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!