× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 669e7028bfd518ef3fc6a80729be0b13090ad99681a82eee5dce8d82d2290dc5
File name: 6459798F5804ECA6496402FC5E86670063B82A21.dll
Detection ratio: 0 / 42
Analysis date: 2012-09-03 08:25:38 UTC ( 6 years, 8 months ago )
Antivirus Result Update
AhnLab-V3 20120901
AntiVir 20120901
Antiy-AVL 20120831
Avast 20120901
AVG 20120901
BitDefender 20120901
ByteHero 20120830
CAT-QuickHeal 20120901
ClamAV 20120828
Commtouch 20120901
Comodo 20120901
DrWeb 20120901
Emsisoft 20120901
eSafe 20120830
ESET-NOD32 20120901
F-Prot 20120831
F-Secure 20120901
Fortinet 20120830
GData 20120901
Ikarus 20120901
Jiangmin 20120901
K7AntiVirus 20120831
Kaspersky 20120901
McAfee 20120901
McAfee-GW-Edition 20120901
Microsoft 20120901
Norman 20120831
nProtect 20120901
Panda 20120901
PCTools 20120901
Rising 20120831
Sophos AV 20120901
SUPERAntiSpyware 20120901
Symantec 20120901
TheHacker 20120830
TotalDefense 20120831
TrendMicro 20120901
TrendMicro-HouseCall 20120901
VBA32 20120901
VIPRE 20120901
ViRobot 20120901
VirusBuster 20120831
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) _1C_ 1996-2012

Publisher 1C
Product 1C:Enterprise 8.2
Original name wbase81.dll
Internal name wbase
File version 8.2.16.362
Description wbase81
Comments 1C:Enterprise 8.2 WBase component
Signing date 10:39 AM 8/13/2012
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-13 14:56:19
Entry Point 0x0001877F
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
_TrackMouseEvent
GetWindowExtEx
Polygon
TextOutW
GetWindowOrgEx
PatBlt
CreatePen
SaveDC
TextOutA
GetViewportOrgEx
Rectangle
GetDeviceCaps
ExcludeClipRect
LineTo
DeleteDC
RestoreDC
SetBkMode
SetPixel
DeleteObject
BitBlt
CreateDIBSection
RealizePalette
SetTextColor
CreatePatternBrush
GetCurrentObject
ExtTextOutW
CreateBitmap
CreateHalftonePalette
MoveToEx
GetStockObject
SelectPalette
SetBkColor
RoundRect
CreateCompatibleDC
StretchBlt
GetTextExtentPoint32W
GetTextExtentPoint32A
CreateSolidBrush
Polyline
SelectObject
GetViewportExtEx
GetBkColor
GetLastError
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LoadLibraryA
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
lstrcmpiW
lstrlenW
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetCurrentProcessId
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetProcAddress
InterlockedCompareExchange
FlushInstructionCache
GetProcessHeap
RaiseException
GetModuleFileNameW
InterlockedExchange
SetUnhandledExceptionFilter
MulDiv
GetSystemTimeAsFileTime
GetModuleHandleW
TerminateProcess
InitializeCriticalSection
LoadResource
FindResourceW
VirtualFree
InterlockedDecrement
Sleep
HeapAlloc
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
InterlockedIncrement
_malloc_crt
malloc
wcstoul
memset
__dllonexit
wcsncpy_s
__clean_type_info_names_internal
_recalloc
_amsg_exit
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
floor
_lock
_onexit
_encode_pointer
memmove
_decode_pointer
_crt_debugger_hook
_except_handler3
_CxxThrowException
_unlock
_adjust_fdiv
free
__CxxFrameHandler3
_except_handler4_common
memcpy_s
_initterm_e
clock
_encoded_null
__CppXcptFilter
wcsstr
_initterm
Ord(277)
RegisterWindowMessageW
GetMonitorInfoW
GetParent
ReleaseDC
BeginPaint
CreateWindowExW
DefWindowProcW
FindWindowW
GetCapture
KillTimer
GetMessageW
SetWindowLongW
SetWindowPos
DeferWindowPos
GetTabbedTextExtentW
IsWindow
PeekMessageW
GetWindowRect
EndPaint
UpdateWindow
SetCapture
ReleaseCapture
GetWindowDC
CharNextW
VkKeyScanW
GetSysColor
RegisterClipboardFormatW
DispatchMessageW
GetKeyState
GetCursorPos
DrawTextA
SendMessageW
UnregisterClassA
LoadCursorW
PtInRect
OffsetRect
SetWindowTextW
SetTimer
SystemParametersInfoW
DrawTextW
MonitorFromWindow
ScreenToClient
PostMessageW
InvalidateRect
GetDCEx
CallWindowProcW
GetKeyboardLayout
FillRect
GetWindowTextW
GetDesktopWindow
LockWindowUpdate
GetWindowTextLengthW
GetDC
TabbedTextOutW
GetWindowLongW
SetCursor
IsChild
DestroyWindow
??0Rect@core@@QAE@HHHH@Z
?string_len@core@@YAIPB_W@Z
?detect_win_ver@core@@YA?AW4WinVer@1@XZ
?current_process_data@core@@YAPAVSCOM_ProcessData@1@XZ
?cleanup@SCOM_ResourceBundle@core@@QAEXXZ
??0SCOM_ResourceBundle@core@@QAE@PBD@Z
?init@Process@core@@QAEXPAVSCOM_ProcessData@2@@Z
??1SCOM_ResourceBundle@core@@QAE@XZ
?kEmptyRect@core@@3URect@1@B
?term@Process@core@@QAEXXZ
?kEmptySize@core@@3USize@1@B
?offset@Rect@core@@QAEAAU12@HH@Z
?kEmptyPoint@core@@3UPoint@1@B
??0Rect@core@@QAE@ABUtagPOINT@@ABUtagSIZE@@@Z
?kUUIDNull@core@@3U_GUID@@B
?initialize@SCOM_Module@core@@QAEXXZ
?inflate@Rect@core@@QAEAAU12@HH@Z
?current_process@core@@YAPAVSCOM_Process@1@XZ
?to_upper@core@@YA?AV?$basic_string@_WV?$char_traits@_W@stlp_std@@V?$allocator@_W@2@@stlp_std@@PB_W0@Z
?cleanup@SCOM_Module@core@@QAEXXZ
CoCreateInstance
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
?__stl_delete@stlp_std@@YAXPAX@Z
?__stl_new@stlp_std@@YAPAXI@Z
?__stl_throw_length_error@stlp_std@@YAXPBD@Z
?_M_decrement@?$_Rb_global@_N@priv@stlp_std@@SAPAU_Rb_tree_node_base@23@PAU423@@Z
?move@?$char_traits@_W@stlp_std@@SAPA_WPA_WPB_WI@Z
?allocate@__new_alloc@stlp_std@@SAPAXI@Z
?_M_increment@?$_Rb_global@_N@priv@stlp_std@@SAPAU_Rb_tree_node_base@23@PAU423@@Z
?_Rebalance@?$_Rb_global@_N@priv@stlp_std@@SAXPAU_Rb_tree_node_base@23@AAPAU423@@Z
?allocate@?$allocator@_W@stlp_std@@QAEPA_WIPBX@Z
?copy@?$char_traits@_W@stlp_std@@SAPA_WPA_WPB_WI@Z
?assign@?$char_traits@_W@stlp_std@@SAPA_WPA_WI_W@Z
??1?$allocator@_W@stlp_std@@QAE@XZ
?compare@?$char_traits@_W@stlp_std@@SAHPB_W0I@Z
?_Rebalance_for_erase@?$_Rb_global@_N@priv@stlp_std@@SAPAU_Rb_tree_node_base@23@PAU423@AAPAU423@11@Z
PE exports
Number of PE resources by type
RT_CURSOR 4
RT_GROUP_CURSOR 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 7
ENGLISH US 1
File identification
MD5 3c7433382cc74e19a1d929da985fb66e
SHA1 940a8d17837ac6cc22aa74d65fb177e52ffcc481
SHA256 669e7028bfd518ef3fc6a80729be0b13090ad99681a82eee5dce8d82d2290dc5
ssdeep
3072:OudHcspzm5B4bDXDraA9woIR+gFHDzbfJWduz2WOtv9AoQcttcI:OujtIibnauwoIRbv2WOtVAC6I

File size 146.3 KB ( 149848 bytes )
File type Win32 DLL
Magic literal
MS-DOS executable PE for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Windows Screen Saver (39.4%)
Win32 Executable Generic (25.6%)
Win32 Dynamic Link Library (generic) (22.8%)
Generic Win/DOS Executable (6.0%)
DOS Executable Generic (6.0%)
Tags
pedll signed

VirusTotal metadata
First submission 2012-09-03 08:25:38 UTC ( 6 years, 8 months ago )
Last submission 2012-09-03 08:25:38 UTC ( 6 years, 8 months ago )
File names wbase81.dll
6459798F5804ECA6496402FC5E86670063B82A21.dll
wbase
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!