× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48b5a7bc9313b1123e7079309c0c0e66c8d4463d5dba95f7c6ba31bb0c714920
Detection ratio: 0 / 41
Analysis date: 2009-12-26 00:19:38 UTC ( 9 years ago )
Antivirus Result Update
a-squared 20091225
AhnLab-V3 20091225
AntiVir 20091225
Antiy-AVL 20091225
Authentium 20091225
Avast 20091225
AVG 20091225
BitDefender 20091225
CAT-QuickHeal 20091224
ClamAV 20091225
Comodo 20091225
DrWeb 20091225
eSafe 20091224
eTrust-Vet 20091225
F-Prot 20091225
F-Secure 20091225
Fortinet 20091225
GData 20091225
Ikarus 20091225
Jiangmin 20091225
K7AntiVirus 20091224
Kaspersky 20091225
McAfee 20091224
McAfee+Artemis 20091224
McAfee-GW-Edition 20091225
Microsoft 20091225
NOD32 20091225
Norman 20091224
nProtect 20091224
Panda 20091215
PCTools 20091225
Prevx 20091226
Rising 20091225
Sophos AV 20091225
Sunbelt 20091225
Symantec 20091225
TheHacker 20091225
TrendMicro 20091225
VBA32 20091225
ViRobot 20091224
VirusBuster 20091225
The file being studied is a Portable Executable file! More specifically, it is a unknown file.
PE header basic information
Number of sections 5
PE sections
PE imports
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
LockResource
LoadResource
FindResourceExW
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpynW
GetSystemInfo
VirtualProtect
GetUserDefaultUILanguage
GetSystemDefaultLCID
GetVersionExW
GetStdHandle
LCMapStringW
LCMapStringA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
ShellExecuteW
SHGetValueW
MessageBoxW
EnumDisplayDevicesW
LoadStringW
LoadImageW
File identification
MD5 7c189c2fe44833ec747cbcf53f854ceb
SHA1 6bbaf9c8fc56ae71885eebac8c6f11e2853970a7
SHA256 48b5a7bc9313b1123e7079309c0c0e66c8d4463d5dba95f7c6ba31bb0c714920
ssdeep
3072:sFoLsB/yDMSX0GM7yoBZYkLDfz/FEEEETr:sFoQV4k9KkLDfzt

File size 410.5 KB ( 420384 bytes )
File type unknown
Magic literal

TrID Win32 Executable MS Visual C++ (generic) (51.4%)
Win 9x/ME Control Panel applet (21.1%)
Win32 Executable Generic (11.6%)
Win32 Dynamic Link Library (generic) (10.3%)
Generic Win/DOS Executable (2.7%)
VirusTotal metadata
First submission 2009-12-26 00:19:38 UTC ( 9 years ago )
Last submission 2009-12-26 00:19:38 UTC ( 9 years ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!