× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6c96a37c19f1bcf46335260846de6cf5a3cb78faf03e0d7f49d07d9d3d1ad886
File name: QtCore4.dll
Detection ratio: 0 / 69
Analysis date: 2018-12-20 03:08:09 UTC ( 5 months ago )
Antivirus Result Update
Acronis 20180726
Ad-Aware 20181220
AegisLab 20181219
AhnLab-V3 20181219
Alibaba 20180921
ALYac 20181220
Antiy-AVL 20181220
Arcabit 20181220
Avast 20181220
Avast-Mobile 20181219
AVG 20181220
Avira (no cloud) 20181220
Babable 20180918
Baidu 20181207
BitDefender 20181220
Bkav 20181219
CAT-QuickHeal 20181219
ClamAV 20181219
CMC 20181219
Comodo 20181220
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181220
Cyren 20181220
DrWeb 20181220
eGambit 20181220
Emsisoft 20181220
Endgame 20181108
ESET-NOD32 20181219
F-Prot 20181220
F-Secure 20181220
Fortinet 20181220
GData 20181220
Ikarus 20181219
Sophos ML 20181128
Jiangmin 20181220
K7AntiVirus 20181219
K7GW 20181219
Kaspersky 20181220
Kingsoft 20181220
Malwarebytes 20181219
MAX 20181220
McAfee 20181219
McAfee-GW-Edition 20181219
Microsoft 20181219
eScan 20181219
NANO-Antivirus 20181219
Palo Alto Networks (Known Signatures) 20181220
Panda 20181219
Qihoo-360 20181220
Rising 20181219
SentinelOne (Static ML) 20181011
Sophos AV 20181219
SUPERAntiSpyware 20181212
Symantec 20181219
Symantec Mobile Insight 20181215
TACHYON 20181219
Tencent 20181220
TheHacker 20181216
TotalDefense 20181219
Trapmine 20181205
TrendMicro 20181219
TrendMicro-HouseCall 20181220
Trustlook 20181220
VBA32 20181219
ViRobot 20181219
Webroot 20181220
Yandex 20181219
Zillya 20181219
ZoneAlarm by Check Point 20181220
Zoner 20181220
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2012 Nokia Corporation and/or its subsidiary(-ies).

Product Qt4
Original name QtCore4.dll
File version 4.8.2.0
Description C++ application development framework.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-05-06 19:46:13
Entry Point 0x0014435F
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
GetTokenInformation
RegFlushKey
RegCloseKey
OpenProcessToken
RegSetValueExW
RegDeleteValueW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegEnumValueW
RegDeleteKeyW
FreeSid
GetLengthSid
CopySid
RegQueryValueExW
GetStdHandle
FileTimeToSystemTime
GetOverlappedResult
WaitForSingleObject
GetFileAttributesW
GetLocalTime
CreatePipe
GetCurrentProcess
OpenFileMappingW
SetErrorMode
GetLogicalDrives
FreeEnvironmentStringsW
GetLocaleInfoW
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetThreadPriority
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
OutputDebugStringW
FindClose
TlsGetValue
FindNextChangeNotification
GetFullPathNameW
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
CopyFileW
RemoveDirectoryW
IsDebuggerPresent
SetThreadPriority
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
MoveFileW
CreateThread
GetSystemDirectoryW
DeleteCriticalSection
CreateSemaphoreW
TerminateProcess
FindCloseChangeNotification
SetUnhandledExceptionFilter
SetCurrentDirectoryW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
GetProcAddress
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
DisableThreadLibraryCalls
TlsAlloc
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
CreateFileMappingW
GetTimeFormatW
GetModuleFileNameW
GetFileInformationByHandle
FindNextFileW
ResetEvent
FindFirstFileW
DuplicateHandle
FindFirstFileExW
WaitForMultipleObjects
SetEvent
CreateEventW
CreateFileW
GetFileType
TlsSetValue
GetCurrencyFormatW
LeaveCriticalSection
GetLastError
GetSystemInfo
CompareStringW
GetEnvironmentStringsW
WaitForSingleObjectEx
FindFirstChangeNotificationW
SwitchToThread
GetCurrentDirectoryW
GetCurrentProcessId
GetCommandLineW
InterlockedCompareExchange
GetCurrentThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetModuleHandleW
GetFileAttributesExW
UnmapViewOfFile
GetTempPathW
CreateProcessW
Sleep
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?uncaught_exception@std@@YA_NXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?begin@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AV?$_String_iterator@GU?$char_traits@G@std@@V?$allocator@G@2@@2@XZ
?size@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
?data@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?_Myptr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@IAEPAGXZ
?resize@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEXI@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?data@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
strncpy_s
??0exception@std@@QAE@ABQBDH@Z
fclose
fflush
_CIasin
_wgetenv
fwrite
strncmp
_environ
_gmtime64_s
_putenv_s
_ftelli64
isspace
sprintf
_CxxThrowException
_fileno
??3@YAXPAX@Z
ceil
_get_tzname
_write
_clearfp
memcpy
memmove
??0exception@std@@QAE@ABQBD@Z
_encoded_null
??0exception@std@@QAE@XZ
memchr
_purecall
?what@exception@std@@UBEPBDXZ
memset
wcschr
_vsnprintf_s
_invalid_parameter_noinfo
fgets
__clean_type_info_names_internal
strchr
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??2@YAPAXI@Z
exit
??_V@YAXPAX@Z
strcpy_s
_initterm_e
_crt_debugger_hook
free
__CxxFrameHandler3
_except_handler4_common
_getdrive
_lseeki64
_vsnprintf
??1exception@std@@UAE@XZ
_read
_CIpow
_CIacos
_initterm
isupper
rand
realloc
__dllonexit
_open_osfhandle
_lseek
_tzset
_open
_onexit
isalpha
fread
_CIcos
??0exception@std@@QAE@ABV01@@Z
strerror
_beginthreadex
_wassert
_close
_malloc_crt
malloc
__iob_func
_CIatan2
srand
??4exception@std@@QAEAAV01@ABV01@@Z
_waccess
fprintf
isdigit
feof
_endthreadex
_amsg_exit
?terminate@@YAXXZ
floor
_lock
_get_osfhandle
_encode_pointer
_errno
getenv_s
_decode_pointer
_localtime64_s
_unlock
_adjust_fdiv
_CIsin
_CIsqrt
_fseeki64
calloc
_mktime64
_control87
__CppXcptFilter
_wgetdcwd
_wchmod
EnumWindows
DefWindowProcW
KillTimer
GetMessageW
GetWindowThreadProcessId
SetWindowLongW
PeekMessageW
UnhookWindowsHookEx
TranslateMessage
PostMessageW
MsgWaitForMultipleObjectsEx
DispatchMessageW
CharNextExA
GetQueueStatus
RegisterClassW
UnregisterClassW
CallNextHookEx
SetTimer
PostThreadMessageW
SetWindowsHookExW
CreateWindowExW
GetWindowLongW
DestroyWindow
WSAAsyncSelect
CoCreateGuid
CoCreateInstance
CoUninitialize
CoInitialize
PE exports
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
4.82

FileSubtype
0

FileVersionNumber
4.8.2.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
C++ application development framework.

ImageFileCharacteristics
Executable, 32-bit, DLL

CharacterSet
Unicode

InitializedDataSize
1094656

EntryPoint
0x14435f

OriginalFileName
QtCore4.dll

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2012 Nokia Corporation and/or its subsidiary(-ies).

FileVersion
4.8.2.0

TimeStamp
2012:05:06 20:46:13+01:00

FileType
Win32 DLL

PEType
PE32

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nokia Corporation and/or its subsidiary(-ies)

CodeSize
1424896

ProductName
Qt4

ProductVersionNumber
4.8.2.0

FileTypeExtension
dll

ObjectFileType
Dynamic link library

CarbonBlack CarbonBlack acts as a surveillance camera for computers
Compressed bundles
File identification
MD5 fa0d8bc72f70b045a2de36121e34484d
SHA1 b76f422aadba9766664e63fe916fe8a3c614f391
SHA256 6c96a37c19f1bcf46335260846de6cf5a3cb78faf03e0d7f49d07d9d3d1ad886
ssdeep
49152:qJgo+qemQtbetdBWNGcuS4Jsv6tWKFdu9CUTLLyvL/6mShMZtmjNUVrciV5P+7QD:ig3VYJJsv6tWKFdu9C

authentihash 244241f3051bff10f83614b8376f7127c1369529af3f7c52663361427efd8faa
imphash 5e764acb23d3d6095e02e4407bc914e6
File size 2.4 MB ( 2520576 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
pedll

VirusTotal metadata
First submission 2013-04-01 10:34:25 UTC ( 6 years, 1 month ago )
Last submission 2017-07-28 01:16:08 UTC ( 1 year, 9 months ago )
File names QtCore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
qtcore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
QtCore4.dll
QTCORE4.DLL
QtCore4.dll
6C96A37C19F1BCF46335260846DE6CF5A3CB78FAF03E0D7F49D07D9D3D1AD886.dat
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!