× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4f21a2af74ff741734382a701c6424deeba03c54dc9f570531bcb4e929b16346
File name: Pendencias-serasa.com
Detection ratio: 1 / 46
Analysis date: 2012-12-15 15:49:50 UTC ( 1 year, 4 months ago ) View latest
Antivirus Result Update
Symantec WS.Reputation.1 20121215
AVG 20121215
Agnitum 20121215
AhnLab-V3 20121215
AntiVir 20121215
Antiy-AVL 20121215
Avast 20121215
BitDefender 20121215
ByteHero 20121213
CAT-QuickHeal 20121214
ClamAV 20121215
Commtouch 20121215
Comodo 20121215
DrWeb 20121215
ESET-NOD32 20121215
Emsisoft 20121215
F-Prot 20121215
F-Secure 20121215
Fortinet 20121215
GData 20121215
Ikarus 20121215
Jiangmin 20121215
K7AntiVirus 20121214
Kaspersky 20121215
Kingsoft 20121210
Malwarebytes 20121215
McAfee 20121215
McAfee-GW-Edition 20121215
MicroWorld-eScan 20121215
Microsoft 20121215
NANO-Antivirus 20121215
Norman 20121215
PCTools 20121215
Panda 20121215
Rising 20121214
SUPERAntiSpyware 20121215
Sophos 20121215
TheHacker 20121214
TotalDefense 20121214
TrendMicro 20121215
TrendMicro-HouseCall 20121215
VBA32 20121214
VIPRE 20121215
ViRobot 20121215
eSafe 20121212
nProtect 20121214
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © SerasaReader 2012

Product SerasaReader
Version 1.0.0.0
Original name SerasaReader.exe
Internal name SerasaReader.exe
File version 1.0.0.0
Description SerasaReader
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-12-15 05:53:21
Link date 6:53 AM 12/15/2012
Entry Point 0x00003EFE
Number of sections 4
PE sections
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 5
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
4096

ImageVersion
0.0

ProductName
SerasaReader

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
11.0

OriginalFilename
SerasaReader.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.0

TimeStamp
2012:12:15 06:53:21+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
SerasaReader.exe

FileAccessDate
2013:05:28 01:04:12+01:00

ProductVersion
1.0.0.0

FileDescription
SerasaReader

OSVersion
4.0

FileCreateDate
2013:05:28 01:04:12+01:00

FileOS
Win32

LegalCopyright
Copyright SerasaReader 2012

MachineType
Intel 386 or later, and compatibles

CodeSize
8192

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x3efe

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 43c744157dd268b210e05a2e4a5c607c
SHA1 5c090df7c4bc7d0eacddee5dbbbcab6db3140f8c
SHA256 4f21a2af74ff741734382a701c6424deeba03c54dc9f570531bcb4e929b16346
ssdeep
192:KAnFj4HDySlM6ZmwnloYk4xNIDLTyWMezGuCH1SSBjd6a:KzzY4z+LTyNeJK8SNd6

File size 13.0 KB ( 13312 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Generic CIL Executable (.NET, Mono, etc.) (81.0%)
Win32 Dynamic Link Library (generic) (7.2%)
Win32 Executable (generic) (4.9%)
Win16/32 Executable Delphi generic (2.2%)
Generic Win/DOS Executable (2.2%)
Tags
peexe assembly

VirusTotal metadata
First submission 2012-12-15 15:49:50 UTC ( 1 year, 4 months ago )
Last submission 2013-10-17 18:11:15 UTC ( 6 months, 1 week ago )
File names SerasaReader.exe
43c744157dd268b210e05a2e4a5c607c
Pendencias-serasa.com
43c744157dd268b210e05a2e4a5c607c
375152152b434bdda31ae21d3efe40a4e0fbec00
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!