× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8548bd8edc70d98f06abbfaf7a982ed9c8066afeb2f89cf243fb42c699514d27
File name: inetops.exe
Detection ratio: 0 / 66
Analysis date: 2018-08-09 19:49:14 UTC ( 8 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware 20180809
AegisLab 20180809
AhnLab-V3 20180809
Alibaba 20180713
ALYac 20180809
Antiy-AVL 20180809
Arcabit 20180809
Avast 20180809
Avast-Mobile 20180809
AVG 20180809
Avira (no cloud) 20180809
AVware 20180809
Babable 20180725
Baidu 20180809
BitDefender 20180809
Bkav 20180807
CAT-QuickHeal 20180807
ClamAV 20180809
CMC 20180809
Comodo 20180809
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180809
Cyren 20180809
DrWeb 20180809
eGambit 20180809
Emsisoft 20180809
Endgame 20180730
ESET-NOD32 20180809
F-Prot 20180809
F-Secure 20180809
Fortinet 20180809
GData 20180809
Ikarus 20180809
Sophos ML 20180717
Jiangmin 20180809
K7AntiVirus 20180809
K7GW 20180809
Kaspersky 20180809
Kingsoft 20180809
Malwarebytes 20180809
MAX 20180809
McAfee 20180809
McAfee-GW-Edition 20180809
Microsoft 20180809
eScan 20180809
NANO-Antivirus 20180809
Palo Alto Networks (Known Signatures) 20180809
Panda 20180809
Qihoo-360 20180809
Rising 20180809
SentinelOne (Static ML) 20180701
Sophos AV 20180809
SUPERAntiSpyware 20180809
Symantec 20180809
Symantec Mobile Insight 20180809
TACHYON 20180809
Tencent 20180809
TheHacker 20180807
TrendMicro 20180809
TrendMicro-HouseCall 20180809
Trustlook 20180809
VBA32 20180808
VIPRE 20180809
ViRobot 20180809
Webroot 20180809
Yandex 20180808
ZoneAlarm by Check Point 20180809
Zoner 20180808
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2012 Henry++

Product InetOps
Original name inetops.exe
File version 1.0
Description InetOps
Comments http://www.henrypp.org
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-01-11 18:58:51
Entry Point 0x0000A3D4
Number of sections 5
PE sections
PE imports
GetUserNameW
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_Create
InitCommonControlsEx
GetSaveFileNameW
ExtTextOutW
FrameRgn
SetBkMode
GetStockObject
SetPixel
CreateSolidBrush
CreateRectRgnIndirect
SelectObject
SetBkColor
DeleteObject
CreateFontW
SetTextColor
GetNetworkParams
GetUdpStatisticsEx
GetIpStatisticsEx
IcmpCloseHandle
IcmpSendEcho
GetIcmpStatisticsEx
GetTcpStatisticsEx
IcmpCreateFile
HeapSize
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
GetConsoleCP
GetVersionExW
GetOEMCP
QueryPerformanceCounter
EncodePointer
IsDebuggerPresent
ExitProcess
TlsAlloc
FlushFileBuffers
GetEnvironmentStringsW
GlobalUnlock
lstrcmpiW
RtlUnwind
lstrlenW
GetLocalTime
GetStdHandle
IsProcessorFeaturePresent
DeleteCriticalSection
GetCurrentProcess
CreateThread
RaiseException
GetConsoleMode
GetStringTypeW
GetCurrentProcessId
WriteConsoleW
GetCommandLineW
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetStartupInfoW
FreeEnvironmentStringsW
ExitThread
GlobalLock
GetPrivateProfileIntW
GetModuleHandleW
GetPrivateProfileStringW
WritePrivateProfileStringW
SetStdHandle
QueryPerformanceFrequency
WideCharToMultiByte
LoadLibraryW
TlsFree
SetFilePointer
HeapSetInformation
ReadFile
SetUnhandledExceptionFilter
WriteFile
CreateMutexW
CloseHandle
GetComputerNameExW
GetACP
HeapReAlloc
DecodePointer
GetProcAddress
HeapAlloc
TerminateProcess
ResumeThread
IsValidCodePage
HeapCreate
CreateFileW
GlobalAlloc
TlsGetValue
Sleep
GetFileType
TlsSetValue
GetTickCount
GetCurrentThreadId
InterlockedIncrement
SetLastError
LeaveCriticalSection
NetShareEnum
NetApiBufferFree
ShellExecuteW
StrTrimW
PathRenameExtensionW
UrlUnescapeW
StrFormatByteSizeW
IsNetworkAlive
GetCursorPos
GetClassInfoExW
EmptyClipboard
EndPaint
BeginPaint
DefWindowProcW
KillTimer
DestroyMenu
GetMessageW
PostQuitMessage
ShowWindow
LoadMenuW
SetWindowPos
GetParent
GetDesktopWindow
GetSystemMetrics
SetWindowLongW
MessageBoxW
GetMenu
GetWindowRect
DestroyIcon
RegisterClassExW
SetDlgItemTextA
MoveWindow
GetDlgItemTextA
LoadIconW
SendDlgItemMessageW
GetDlgItemTextW
GetSysColor
GetDlgItemInt
CheckDlgButton
DispatchMessageW
CreateDialogParamW
GetDlgCtrlID
CheckMenuItem
SendMessageW
SetClipboardData
TranslateMessage
SetActiveWindow
SetWindowTextW
GetDlgItem
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
SetTimer
LoadImageW
IsDialogMessageW
EnableWindow
IsDlgButtonChecked
GetSysColorBrush
SetDlgItemTextW
SetDlgItemInt
LoadCursorW
GetSystemMenu
CreateWindowExW
InsertMenuW
wsprintfW
CloseClipboard
GetClientRect
DestroyWindow
OpenClipboard
SetWindowTheme
HttpQueryInfoW
InternetCloseHandle
InternetCrackUrlW
InternetOpenUrlW
InternetReadFile
InternetOpenW
GetAddrInfoW
gethostname
socket
FreeAddrInfoW
closesocket
inet_addr
send
WSAAddressToStringW
WSAStartup
gethostbyname
connect
WSACleanup
inet_ntoa
htons
recv
WSAGetLastError
Number of PE resources by type
RT_DIALOG 14
RT_ICON 6
RT_GROUP_ICON 5
RT_MENU 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
RUSSIAN 28
ENGLISH US 1
PE resources
ExifTool file metadata
SubsystemVersion
5.1

Comments
http://www.henrypp.org

LinkerVersion
10.0

ImageVersion
0.0

ProductName
InetOps

FileVersionNumber
1.0.0.0

LanguageCode
Russian

FileFlagsMask
0x0000

FileDescription
InetOps

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unknown (0025)

InitializedDataSize
74752

FileTypeExtension
exe

OriginalFileName
inetops.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0

TimeStamp
2012:01:11 19:58:51+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright 2012 Henry++

MachineType
Intel 386 or later, and compatibles

CodeSize
99328

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0xa3d4

ObjectFileType
Executable application

Execution parents
Compressed bundles
File identification
MD5 341f440ca4febf68dab9a681316b8817
SHA1 017d6ed4768852e683c4fd83aeddf3a6a11f1712
SHA256 8548bd8edc70d98f06abbfaf7a982ed9c8066afeb2f89cf243fb42c699514d27
ssdeep
3072:++iTs4Z+AXz9AeWbbpUnm4FyVODh4z3UpsMSeZ14tOoHgAg0Fuflfpb0U:yj+AXz9AeWbbbJOWzkOMSeZ14oAONfpd

authentihash 82a7a27ed4ff6414bccd8d3d8c4f929a470a5b0cac3223aad2d4b71d34c18973
imphash 52ed52edcde32c6176bb2497eb3b753c
File size 171.0 KB ( 175104 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2012-05-23 21:35:42 UTC ( 6 years, 11 months ago )
Last submission 2018-08-09 19:49:14 UTC ( 8 months, 2 weeks ago )
File names inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
inetops.exe
iNetOps.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Runtime DLLs