× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7afb56dd48565c3c9804f683c80ef47e5333f847f2d3211ec11ed13ad36061e1
File name: putty.exe
Detection ratio: 0 / 67
Analysis date: 2018-06-19 01:43:45 UTC ( 9 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180618
AegisLab 20180619
AhnLab-V3 20180618
Alibaba 20180615
ALYac 20180618
Antiy-AVL 20180619
Arcabit 20180619
Avast 20180618
Avast-Mobile 20180619
AVG 20180619
Avira (no cloud) 20180619
AVware 20180618
Babable 20180406
Baidu 20180615
BitDefender 20180618
Bkav 20180618
CAT-QuickHeal 20180618
ClamAV 20180619
CMC 20180618
Comodo 20180619
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180619
Cyren 20180619
DrWeb 20180618
eGambit 20180619
Emsisoft 20180618
Endgame 20180612
ESET-NOD32 20180619
F-Prot 20180618
F-Secure 20180619
Fortinet 20180618
GData 20180618
Ikarus 20180618
Sophos ML 20180601
Jiangmin 20180618
K7AntiVirus 20180618
K7GW 20180619
Kaspersky 20180618
Kingsoft 20180619
Malwarebytes 20180618
MAX 20180619
McAfee 20180618
McAfee-GW-Edition 20180618
Microsoft 20180619
eScan 20180618
NANO-Antivirus 20180618
Palo Alto Networks (Known Signatures) 20180619
Panda 20180618
Qihoo-360 20180619
Rising 20180618
SentinelOne (Static ML) 20180618
Sophos AV 20180618
SUPERAntiSpyware 20180618
Symantec 20180618
Symantec Mobile Insight 20180614
TACHYON 20180618
Tencent 20180619
TheHacker 20180613
TrendMicro 20180618
TrendMicro-HouseCall 20180618
Trustlook 20180619
VBA32 20180618
VIPRE 20180619
ViRobot 20180618
Webroot 20180619
Yandex 20180618
Zillya 20180618
ZoneAlarm by Check Point 20180618
Zoner 20180619
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 1997-2017 Simon Tatham.

Product PuTTY suite
Original name PuTTY
Internal name PuTTY
File version Release 0.70
Description SSH, Telnet and Rlogin client
Signature verification Signed file, verified signature
Signing date 8:34 PM 7/4/2017
Signers
[+] Simon Tatham
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer COMODO SHA-256 Code Signing CA
Valid from 12:00 AM 12/10/2015
Valid to 11:59 PM 12/01/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 4022BB3C0398D595623A5380D5EEB520FC6150AA
Serial number 6C D2 82 A2 D9 A2 C1 58 50 5B 17 8D 59 51 8B 7B
[+] COMODO SHA-256 Code Signing CA
Status Valid
Issuer AddTrust External CA Root
Valid from 12:00 AM 12/22/2014
Valid to 10:48 AM 05/30/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint D09E349FD5615F147CF855ACCD3C03B0833A2BC4
Serial number 00 ED 72 DF 71 20 8F 78 36 D0 AB 00 9F CA 97 E0 1F
[+] The USERTrust Network™
Status Valid
Issuer AddTrust External CA Root
Valid from 10:48 AM 05/30/2000
Valid to 10:48 AM 05/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbprint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Counter signers
[+] COMODO SHA-1 Time Stamping Signer
Status Valid
Issuer UTN-USERFirst-Object
Valid from 12:00 AM 12/31/2015
Valid to 06:40 PM 07/09/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 03A5B14663EB12023091B84A6D6A68BC871DE66B
Serial number 16 88 F0 39 25 5E 63 8E 69 14 39 07 E6 33 0B
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 06:31 PM 07/09/1999
Valid to 06:40 PM 07/09/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine x64
Entry Point 0x000A9384
Number of sections 11
PE sections
Overlays
MD5 2316ef39879a928b68db3da62fe0b874
File type data
Offset 841728
Size 12344
Entropy 7.43
PE imports
RegDeleteKeyA
SetSecurityDescriptorDacl
RegOpenKeyA
RegCloseKey
RegDeleteValueA
RegSetValueExA
CopySid
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetUserNameA
RegEnumKeyA
EqualSid
RegCreateKeyExA
GetLengthSid
RegCreateKeyA
SetSecurityDescriptorOwner
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
SetMapMode
CreatePen
GetBkMode
TextOutA
CreateFontIndirectA
GetCharABCWidthsFloatA
UpdateColors
GetPixel
Rectangle
GetDeviceCaps
ExcludeClipRect
TranslateCharsetInfo
LineTo
GetTextExtentExPointA
DeleteDC
SetBkMode
GetCharacterPlacementW
GetCharWidthW
SetPixel
GetTextMetricsA
IntersectClipRect
GetCharWidthA
RealizePalette
SetTextColor
GetObjectA
MoveToEx
ExtTextOutW
SetPaletteEntries
CreateBitmap
CreateFontA
CreatePalette
GetStockObject
SelectPalette
ExtTextOutA
UnrealizeObject
SetTextAlign
CreateCompatibleDC
SelectObject
GetTextExtentPoint32A
GetCharWidth32W
CreateSolidBrush
Polyline
SetBkColor
GetCharWidth32A
DeleteObject
CreateCompatibleBitmap
ImmReleaseContext
ImmSetCompositionFontA
ImmGetCompositionStringW
ImmSetCompositionWindow
ImmGetContext
GetStdHandle
ReleaseMutex
GetOverlappedResult
SetEvent
SetEndOfFile
GetLocalTime
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
RtlUnwindEx
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
IsDBCSLeadByteEx
GetCPInfo
WriteFile
WaitForSingleObject
GetSystemTimeAsFileTime
GetThreadTimes
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
ConnectNamedPipe
GetEnvironmentVariableA
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
GetModuleFileNameW
Beep
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
LoadLibraryExA
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
CreateThread
DeleteCriticalSection
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
GetSystemDirectoryA
SetHandleInformation
SetEnvironmentVariableA
GlobalMemoryStatus
GetModuleHandleExW
GlobalAlloc
ReadConsoleW
GetCurrentThreadId
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetCommBreak
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
OpenProcess
DeleteFileA
GetWindowsDirectoryA
GetDateFormatW
GetStartupInfoW
GetProcAddress
GetProcessHeap
GetTimeFormatW
FindFirstFileExA
FindFirstFileA
WaitNamedPipeA
RtlLookupFunctionEntry
CreateFileMappingA
FindNextFileA
TerminateProcess
GlobalLock
SetCommTimeouts
GetTimeZoneInformation
SetCommState
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GlobalFree
GetConsoleCP
CompareStringW
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
GetCommState
CreateNamedPipeA
WaitForSingleObjectEx
GetCurrentProcessId
GetCommandLineW
GetCurrentDirectoryA
ClearCommBreak
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
RtlCaptureContext
CloseHandle
GetACP
GetModuleHandleW
GetSystemTimeAdjustment
CreateProcessA
WideCharToMultiByte
IsValidCodePage
UnmapViewOfFile
ShellExecuteA
SetDlgItemTextA
GetForegroundWindow
PostQuitMessage
SetWindowPos
IsWindow
SetTimer
DispatchMessageA
EndPaint
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
SendMessageA
GetClientRect
SetCaretPos
GetWindowTextLengthA
TrackPopupMenu
ShowCursor
MsgWaitForMultipleObjects
GetWindowTextA
DestroyWindow
DrawEdge
GetParent
UpdateWindow
CheckRadioButton
CreateCaret
ShowWindow
PeekMessageW
EnableWindow
SetWindowPlacement
GetDlgItemTextA
PeekMessageA
WinHelpA
TranslateMessage
DestroyCaret
SetClipboardData
GetQueueStatus
RegisterClassW
IsZoomed
GetWindowPlacement
IsIconic
RegisterClassA
CreateWindowExA
GetKeyboardLayout
FlashWindow
CreateWindowExW
IsDialogMessageA
SetFocus
GetMessageA
SetCapture
BeginPaint
DefWindowProcW
SetClassLongPtrA
KillTimer
SetWindowLongPtrA
GetClipboardOwner
RegisterWindowMessageA
DefWindowProcA
ToAsciiEx
GetClipboardData
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
PostMessageA
ReleaseCapture
SetKeyboardState
GetScrollInfo
CreatePopupMenu
CheckMenuItem
CreateMenu
GetDlgItem
CreateDialogParamA
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
GetKeyboardState
IsDlgButtonChecked
CheckDlgButton
GetDesktopWindow
GetSystemMenu
DispatchMessageW
SetForegroundWindow
OpenClipboard
EmptyClipboard
GetCaretBlinkTime
ReleaseDC
EndDialog
HideCaret
GetCapture
FindWindowA
MessageBeep
ShowCaret
AppendMenuA
RegisterClipboardFormatA
MessageBoxIndirectA
MoveWindow
MessageBoxA
DialogBoxParamA
GetSysColor
SetScrollInfo
SystemParametersInfoA
GetDoubleClickTime
GetWindowLongPtrA
DeleteMenu
InvalidateRect
SetWindowTextA
DefDlgProcA
CloseClipboard
SetCursor
CoUninitialize
CoCreateInstance
CoInitialize
Number of PE resources by type
RT_ICON 12
RT_DIALOG 4
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 20
PE resources
Execution parents
PE resource-wise parents
Overlay parents
Compressed bundles
File identification
MD5 54cb91395cdaad9d47882533c21fc0e9
SHA1 3b1333f826e5fe36395042fe0f1b895f4a373f1b
SHA256 7afb56dd48565c3c9804f683c80ef47e5333f847f2d3211ec11ed13ad36061e1
ssdeep
12288:WQp6ALLEUO5QeUyccL4Gug+gDaM4EQNLXd4fx139U76NAaNZBA/JO:WG6co5RQs4N2kE0L8139O0A0nAhO

authentihash 68b54513bd8fa3c813992c693cf7d4ea1c7811fae85293b7e2ed10f9cf5758cc
imphash efe162fd3d51ded9dd66fa4ac219bf53
File size 834.1 KB ( 854072 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID DOS Executable Borland Pascal 7.0x (22.3%)
OS/2 Executable (generic) (22.2%)
Generic Win/DOS Executable (21.9%)
DOS Executable Generic (21.9%)
Music Craft Score (11.0%)
Tags
peexe overlay assembly signed via-tor

VirusTotal metadata
First submission 2017-07-08 07:34:03 UTC ( 1 year, 8 months ago )
Last submission 2019-03-16 10:51:36 UTC ( 1 week ago )
File names puty.exe
putty.exe
putty_64.exe
putty.exe
putty.exe
15_putty.exe
video.exe
putty.exe
putty.exe
putty(2).exe
PUTTY.EXE
PUTTY.EXE
BatchVR2x-PyqkzNKUnm-exe
putty.jpg
bool.exe
api205389.exe
putty.exe
bit6475.tmp
temputn19.exe
putty.exe
put[1].exe
putr.exe
1.exe
putty(1).exe
DREMCOUT.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!