× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 75fc7e6913a78c897368d7c0c452fe6f5a93d3e9bfba5b21301cb515b34cd448
File name: 20167962
Detection ratio: 0 / 56
Analysis date: 2015-02-19 18:45:29 UTC ( 1 week, 4 days ago )
Antivirus Result Update
ALYac 20150219
AVG 20150219
AVware 20150219
Ad-Aware 20150219
AegisLab 20150219
Agnitum 20150218
AhnLab-V3 20150219
Alibaba 20150219
Antiy-AVL 20150219
Avast 20150219
Avira 20150219
Baidu-International 20150219
BitDefender 20150219
Bkav 20150213
ByteHero 20150219
CAT-QuickHeal 20150219
CMC 20150214
ClamAV 20150219
Comodo 20150219
Cyren 20150219
DrWeb 20150219
ESET-NOD32 20150219
Emsisoft 20150219
F-Prot 20150219
F-Secure 20150219
Fortinet 20150219
GData 20150219
Ikarus 20150219
K7AntiVirus 20150219
K7GW 20150219
Kaspersky 20150219
Kingsoft 20150219
Malwarebytes 20150219
McAfee 20150219
McAfee-GW-Edition 20150219
MicroWorld-eScan 20150219
Microsoft 20150219
NANO-Antivirus 20150219
Norman 20150219
Panda 20150219
Qihoo-360 20150219
Rising 20150219
SUPERAntiSpyware 20150219
Sophos 20150219
Symantec 20150219
Tencent 20150219
TheHacker 20150219
TotalDefense 20150219
TrendMicro 20150219
TrendMicro-HouseCall 20150219
VBA32 20150219
VIPRE 20150219
ViRobot 20150219
Zillya 20150219
Zoner 20150218
nProtect 20150218
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
Benjamin Pasero

Publisher RSSOwl Team
Product RSSOwl
File version 2.1.6
Description RSSOwl
Packers identified
F-PROT NSIS, embedded
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-05 22:50:46
Link date 11:50 PM 12/5/2009
Entry Point 0x0000323C
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegDeleteValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
lstrcmpiA
GetModuleHandleA
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
GetProcAddress
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
EndPaint
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
GetClassInfoA
SetForegroundWindow
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
DrawTextA
EnableMenuItem
RegisterClassA
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
SetTimer
LoadCursorA
TrackPopupMenu
SendMessageA
FillRect
ShowWindow
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 30
RT_ICON 6
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 38
NEUTRAL 1
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2.1.6.0

UninitializedDataSize
1024

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
119808

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.1.6

TimeStamp
2009:12:05 23:50:46+01:00

FileType
Win32 EXE

PEType
PE32

FileDescription
RSSOwl

OSVersion
4.0

FileOS
Win32

LegalCopyright
Benjamin Pasero

MachineType
Intel 386 or later, and compatibles

CompanyName
RSSOwl Team

CodeSize
23552

ProductName
RSSOwl

ProductVersionNumber
2.1.6.0

EntryPoint
0x323c

ObjectFileType
Executable application

File identification
MD5 cee03674f95f07778f2b9d26b7b9eb4f
SHA1 6b5830e867f4912d3636e2920bdd64cef6d590b8
SHA256 75fc7e6913a78c897368d7c0c452fe6f5a93d3e9bfba5b21301cb515b34cd448
ssdeep
98304:CVzF0U9icWh7N9BR65v3+mbvWmYzNF7qXq1/7Asyn63f/r19vpzY7:Cb0oicWh7BR6l3+mKdzNJcq1zAC3f/rc

authentihash 1d0fa9ae33437a8c4551d433d2b7d198ffe0be630d433b606bee1a1cf6e32f1e
imphash 099c0646ea7282d232219f8807883be0
File size 3.8 MB ( 4021517 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe

VirusTotal metadata
First submission 2012-12-13 00:37:36 UTC ( 2 years, 2 months ago )
Last submission 2014-02-06 18:17:34 UTC ( 1 year ago )
File names output.20167962.txt
file-5578520_exe
RSSOwl Setup 2.1.6.exe
12878916.exe
20167962
RSSOwl Setup 2.1.6.exe
RSSOwlSetup2.1.6.exe
RSSOwl%20Setup%202.1.6.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!