× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 75fc7e6913a78c897368d7c0c452fe6f5a93d3e9bfba5b21301cb515b34cd448
File name: 351372
Detection ratio: 0 / 55
Analysis date: 2016-01-10 03:07:31 UTC ( 6 months, 3 weeks ago )
Antivirus Result Update
ALYac 20160110
AVG 20160110
AVware 20160109
Ad-Aware 20160110
AegisLab 20160109
Yandex 20160108
AhnLab-V3 20160109
Alibaba 20160109
Antiy-AVL 20160110
Arcabit 20160110
Avast 20160110
Avira (no cloud) 20160109
Baidu-International 20160109
BitDefender 20160109
Bkav 20160109
ByteHero 20160110
CAT-QuickHeal 20160109
CMC 20160107
ClamAV 20160109
Comodo 20160109
Cyren 20160110
DrWeb 20160110
ESET-NOD32 20160109
Emsisoft 20160110
F-Prot 20160109
F-Secure 20160108
Fortinet 20160109
GData 20160110
Ikarus 20160109
Jiangmin 20160110
K7AntiVirus 20160109
K7GW 20160109
Kaspersky 20160110
Malwarebytes 20160110
McAfee 20160110
McAfee-GW-Edition 20160109
eScan 20160110
Microsoft 20160110
NANO-Antivirus 20160110
Panda 20160109
Qihoo-360 20160110
Rising 20160109
SUPERAntiSpyware 20160109
Sophos 20160109
Symantec 20160109
TheHacker 20160107
TotalDefense 20160109
TrendMicro 20160110
TrendMicro-HouseCall 20160110
VBA32 20160107
VIPRE 20160110
ViRobot 20160110
Zillya 20160109
Zoner 20160110
nProtect 20160108
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Benjamin Pasero

Product RSSOwl
File version 2.1.6
Description RSSOwl
Packers identified
F-PROT NSIS, embedded
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-05 22:50:46
Entry Point 0x0000323C
Number of sections 5
PE sections
Overlays
MD5 67727e1d804eb284424ca7faa2318feb
File type data
Offset 64000
Size 3957517
Entropy 8.00
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
EnableMenuItem
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
ShowWindow
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 30
RT_ICON 6
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 38
NEUTRAL 1
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2.1.6.0

UninitializedDataSize
1024

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
119808

EntryPoint
0x323c

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.1.6

TimeStamp
2009:12:05 22:50:46+00:00

FileType
Win32 EXE

PEType
PE32

FileDescription
RSSOwl

OSVersion
4.0

FileOS
Win32

LegalCopyright
Benjamin Pasero

MachineType
Intel 386 or later, and compatibles

CompanyName
RSSOwl Team

CodeSize
23552

ProductName
RSSOwl

ProductVersionNumber
2.1.6.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 cee03674f95f07778f2b9d26b7b9eb4f
SHA1 6b5830e867f4912d3636e2920bdd64cef6d590b8
SHA256 75fc7e6913a78c897368d7c0c452fe6f5a93d3e9bfba5b21301cb515b34cd448
ssdeep
98304:CVzF0U9icWh7N9BR65v3+mbvWmYzNF7qXq1/7Asyn63f/r19vpzY7:Cb0oicWh7BR6l3+mKdzNJcq1zAC3f/rc

authentihash 1d0fa9ae33437a8c4551d433d2b7d198ffe0be630d433b606bee1a1cf6e32f1e
imphash 099c0646ea7282d232219f8807883be0
File size 3.8 MB ( 4021517 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe overlay

VirusTotal metadata
First submission 2012-12-13 00:37:36 UTC ( 3 years, 7 months ago )
Last submission 2016-01-10 03:07:31 UTC ( 6 months, 3 weeks ago )
File names output.20167962.txt
file-5578520_exe
RSSOwlSetup2.1.6.exe
12878916.exe
351372
20167962
RSSOwl Setup 2.1.6.exe
RSSOwl Setup 2.1.6.exe
RSSOwl_Setup_2.1.6.exe
RSSOwl%20Setup%202.1.6.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!