× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 83a820aa0bd5b9040480c344823f2e7244cef9d6681565d4b9f11d22232796b5
File name: grepWin-x64-1.8.1_portable.exe
Detection ratio: 0 / 66
Analysis date: 2018-08-07 08:31:49 UTC ( 8 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware 20180807
AegisLab 20180807
AhnLab-V3 20180807
Alibaba 20180713
ALYac 20180807
Antiy-AVL 20180807
Arcabit 20180807
Avast 20180807
Avast-Mobile 20180807
AVG 20180807
Avira (no cloud) 20180807
AVware 20180727
Babable 20180725
Baidu 20180807
BitDefender 20180807
Bkav 20180806
CAT-QuickHeal 20180806
ClamAV 20180807
CMC 20180807
Comodo 20180807
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180807
Cyren 20180807
DrWeb 20180807
eGambit 20180807
Emsisoft 20180807
Endgame 20180730
ESET-NOD32 20180807
F-Prot 20180807
F-Secure 20180807
Fortinet 20180807
GData 20180807
Ikarus 20180807
Sophos ML 20180717
Jiangmin 20180807
K7AntiVirus 20180807
K7GW 20180807
Kaspersky 20180807
Kingsoft 20180807
Malwarebytes 20180807
MAX 20180807
McAfee 20180807
McAfee-GW-Edition 20180807
Microsoft 20180807
eScan 20180807
NANO-Antivirus 20180807
Palo Alto Networks (Known Signatures) 20180807
Panda 20180806
Qihoo-360 20180807
Rising 20180807
SentinelOne (Static ML) 20180701
Sophos AV 20180807
SUPERAntiSpyware 20180807
Symantec 20180807
Symantec Mobile Insight 20180801
TACHYON 20180807
Tencent 20180807
TheHacker 20180805
TrendMicro 20180807
TrendMicro-HouseCall 20180807
Trustlook 20180807
VBA32 20180806
VIPRE 20180806
ViRobot 20180807
Webroot 20180807
Yandex 20180805
ZoneAlarm by Check Point 20180807
Zoner 20180806
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2007-2018, Stefan Küng

Product grepWin
Original name grepWin.exe
Internal name grepWin.exe
File version 1.8.1.778
Description grepWin
Signature verification Signed file, verified signature
Signing date 2:49 PM 6/17/2018
Signers
[+] Open Source Developer, Stefan KUENG
Status Valid
Issuer Certum Code Signing CA SHA2
Valid from 1:00 AM 4/14/2018
Valid to 1:00 AM 4/14/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint BB0A721D5ACE675DCFDC9A1AB5C3DD11B29CEED3
Serial number 1C FB 3E 7A 68 A6 28 A6 3E 3A 46 D4 89 B2 34 FC
[+] Certum Code Signing CA SHA2
Status Valid
Issuer Certum Trusted Network CA
Valid from 12:30 PM 10/29/2015
Valid to 12:30 PM 6/9/2027
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 905DE119F6A0118CFFBF8B69463EFE5BD0C1D322
Serial number 6B 32 6A 0F 03 28 D3 7A 1D 53 0B FD 23 BD 48 E2
[+] Certum Trusted Network CA
Status Valid
Issuer Certum Trusted Network CA
Valid from 1:07 PM 10/22/2008
Valid to 1:07 PM 12/31/2029
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbprint 07E032E020B72C3F192F0628A2593A19A70F069E
Serial number 04 44 C0
Counter signers
[+] Certum EV TSA SHA2
Status Valid
Issuer Certum Trusted Network CA
Valid from 2:10 PM 3/8/2016
Valid to 2:10 PM 5/30/2027
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 4F8D4C480649426AEF8B86D4D5FC7932E7142D85
Serial number 00 FE 67 E4 F1 5A 24 E3 C6 0D 54 7C A0 20 C2 76 70
[+] Certum Trusted Network CA
Status Valid
Issuer Certum Trusted Network CA
Valid from 1:07 PM 10/22/2008
Valid to 1:07 PM 12/31/2029
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbrint 07E032E020B72C3F192F0628A2593A19A70F069E
Serial number 04 44 C0
PE header basic information
Target machine x64
Compilation timestamp 2018-06-17 13:49:03
Entry Point 0x00084B98
Number of sections 6
PE sections
Overlays
MD5 e98ff9f15f662791e17ec82810b60400
File type data
Offset 1405952
Size 5368
Entropy 7.34
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegOpenKeyW
RegQueryValueExW
Ord(412)
Ord(413)
InitCommonControlsEx
Ord(410)
ImageList_GetImageCount
ImageList_GetImageInfo
GetOpenFileNameW
GetDeviceCaps
ExtTextOutW
GetObjectW
CreateRectRgn
CreateFontIndirectW
SetBkMode
SetPixel
SelectObject
CreateRectRgnIndirect
CombineRgn
PatBlt
SetBkColor
DeleteObject
SetRectRgn
SetTextColor
GetStdHandle
FileTimeToSystemTime
EncodePointer
GetFileAttributesW
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
MapViewOfFileEx
UnhandledExceptionFilter
FreeEnvironmentStringsW
InitializeSListHead
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
WriteFile
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
CreateEventW
OutputDebugStringW
GetStringTypeExW
FindClose
TlsGetValue
FormatMessageA
SetFileAttributesW
GetStringTypeExA
SetLastError
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
QueryPerformanceFrequency
RtlVirtualUnwind
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
VerifyVersionInfoW
SetFilePointerEx
GetModuleHandleA
GetFullPathNameW
GlobalAddAtomW
CreateThread
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
MoveFileExA
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
GlobalAlloc
SetEndOfFile
RtlCaptureContext
GetCurrentThreadId
GetProcAddress
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
FreeLibrary
RtlPcToFileHeader
GetWindowsDirectoryW
DecodePointer
GetFileSize
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
GetUserDefaultLCID
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
lstrcpyW
GetFileSizeEx
GetFileInformationByHandle
FindNextFileW
RtlLookupFunctionEntry
ResetEvent
CreateFileMappingA
FindFirstFileW
IsValidLocale
FindFirstFileExW
RtlUnwindEx
ReadConsoleW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
GlobalFree
GetConsoleCP
LCMapStringA
CompareStringW
GetEnvironmentStringsW
GlobalUnlock
WaitForSingleObjectEx
lstrlenW
SwitchToThread
CompareFileTime
GetCurrentProcessId
GetCommandLineW
GetCPInfo
HeapSize
GetCommandLineA
VerSetConditionMask
GetTickCount64
lstrcpynW
ExpandEnvironmentStringsW
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
DeleteAtom
CloseHandle
SetDllDirectoryW
GetACP
GlobalLock
GetModuleHandleW
GetLongPathNameW
IsValidCodePage
UnmapViewOfFile
CreateProcessW
Sleep
DragQueryFileW
SHBrowseForFolderW
SHGetFolderPathW
SHGetPathFromIDListW
ShellExecuteW
Ord(701)
ShellExecuteExW
SHGetFileInfoW
SHGetDesktopFolder
SHGetMalloc
StrCmpLogicalW
SHSetValueW
PathIsRootW
SHDeleteKeyW
PathFileExistsW
PathIsURLW
SHAutoComplete
SHGetValueW
PathCanonicalizeW
AssocQueryStringW
PathIsRelativeW
PathIsDirectoryW
StrFormatByteSizeW
PathCompactPathExW
RedrawWindow
SetWindowRgn
DestroyMenu
PostQuitMessage
SetWindowPos
EndPaint
SetMenuItemInfoW
GetDC
GetCursorPos
ReleaseDC
SendMessageW
GetClientRect
DrawTextW
LoadImageW
GetWindowTextW
RegisterClipboardFormatW
GetWindowTextLengthW
LoadAcceleratorsW
InvalidateRgn
DestroyWindow
GetParent
GetPropW
EnumWindows
CheckRadioButton
GetMessageW
ShowWindow
SetPropW
EnableWindow
SetWindowPlacement
TranslateMessage
GetDlgItemTextW
LoadStringA
SetClipboardData
IsZoomed
GetWindowPlacement
LoadStringW
GetSubMenu
SetTimer
IsDialogMessageW
CopyRect
DeferWindowPos
CreateWindowExW
GetMenuItemInfoW
MapWindowPoints
RegisterWindowMessageW
SetWindowLongPtrW
BeginPaint
OffsetRect
SetFocus
KillTimer
GetSystemMetrics
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
SendDlgItemMessageW
PostMessageW
CreateDialogParamW
CreatePopupMenu
DrawFocusRect
PtInRect
SetWindowTextW
GetDlgItem
RemovePropW
BringWindowToTop
ClientToScreen
TrackPopupMenu
GetMenuItemCount
IsDlgButtonChecked
GetDesktopWindow
LoadCursorW
GetSystemMenu
FindWindowExW
DispatchMessageW
InsertMenuW
SetForegroundWindow
OpenClipboard
EmptyClipboard
IntersectRect
EndDialog
GetCapture
ScreenToClient
LoadMenuW
BeginDeferWindowPos
MessageBoxW
MoveWindow
DialogBoxParamW
AppendMenuW
GetWindowDC
SetDlgItemTextW
GetKeyState
EndDeferWindowPos
GetWindowLongPtrW
SetCursorPos
SystemParametersInfoW
InvalidateRect
CallWindowProcW
GetClassNameW
GetFocus
CloseClipboard
TranslateAcceleratorW
DefDlgProcW
SetCursor
SetWindowTheme
GdipResetPath
GdipDrawRectangleI
GdipDrawCachedBitmap
GdipCreateSolidFill
GdipDrawPath
GdiplusShutdown
GdipDisposeImage
GdipCreatePath
GdiplusStartup
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreatePen1
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCreateCachedBitmap
GdipDeletePath
GdipDeletePen
GdipDeleteCachedBitmap
GdipFillRectangleI
GdipCloneBrush
GdipStartPathFigure
GdipClosePathFigure
GdipDeleteBrush
GdipFree
GdipCloneImage
GdipAddPathArcI
GdipSetPenDashStyle
GdipCreateBitmapFromHICON
CoInitializeEx
OleUninitialize
CoUninitialize
OleInitialize
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
DoDragDrop
OleDuplicateData
CoTaskMemFree
CoTaskMemAlloc
CreateURLMoniker
Number of PE resources by type
RT_ICON 9
RT_DIALOG 7
RT_STRING 4
RT_HTML 1
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
NEUTRAL 10
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

LinkerVersion
14.14

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.8.1.778

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, Large address aware

CharacterSet
Windows, Latin1

InitializedDataSize
440832

EntryPoint
0x84b98

OriginalFileName
grepWin.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2007-2018, Stefan K ng

FileVersion
1.8.1.778

TimeStamp
2018:06:17 14:49:03+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
grepWin.exe

ProductVersion
1.8.1.778

FileDescription
grepWin

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
AMD AMD64

CompanyName
http://tools.stefankueng.com

CodeSize
972288

ProductName
grepWin

ProductVersionNumber
1.8.1.778

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 0436cb21a36164f53ae34d8f5f5ed46a
SHA1 421dc64d024f742174909d969d8b16f7d7944732
SHA256 83a820aa0bd5b9040480c344823f2e7244cef9d6681565d4b9f11d22232796b5
ssdeep
24576:Ea1VV9YwAIKawhatV53vA9oilODFtDkl4mmLvJpGg633+U8ijhJgf:EaHYwAIK+53IKOytDZmwEg6H+U89

authentihash 43295f1c0f375d945ed0db10d459cdb48f3998a21bb5d2665826fcc717cb6f75
imphash f6e9a2b67c914fd3ca0469bbd48049cb
File size 1.3 MB ( 1411320 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Win64 Executable (generic) (82.0%)
OS/2 Executable (generic) (6.0%)
Generic Win/DOS Executable (5.9%)
DOS Executable Generic (5.9%)
Tags
64bits peexe assembly signed overlay

VirusTotal metadata
First submission 2018-06-17 18:49:34 UTC ( 10 months ago )
Last submission 2018-08-07 08:31:49 UTC ( 8 months, 2 weeks ago )
File names grepWin.exe
grepWin-x64-1.8.1_portable.exe
grepWin-x64-1.8.1_portable.exe
grepWin.exe
grepWin-x64-1.8.1_portable.exe
grepWin64.exe
grepWin.exe
grepWin.exe
grepWin-x64-1.8.1_portable.exe
grepWin64.exe
grepWin.exe
grepWinx64.exe
grepWin.exe
grepWin.exe
grepWin.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!