× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85b56bce99907392589601e1a0c043111e9dd73e1b02a24f8ab5be30ac1196a1
File name: 356768
Detection ratio: 2 / 56
Analysis date: 2015-06-27 07:31:34 UTC ( 6 days, 9 hours ago )
Antivirus Result Update
Jiangmin Adware/Agent.amwf 20150626
Zillya Downloader.Agent.Win32.242727 20150627
ALYac 20150627
AVG 20150627
AVware 20150627
Ad-Aware 20150627
AegisLab 20150626
Agnitum 20150626
AhnLab-V3 20150626
Alibaba 20150626
Antiy-AVL 20150627
Arcabit 20150627
Avast 20150627
Avira 20150627
Baidu-International 20150626
BitDefender 20150627
Bkav 20150627
ByteHero 20150627
CAT-QuickHeal 20150627
ClamAV 20150626
Comodo 20150627
Cyren 20150627
DrWeb 20150627
ESET-NOD32 20150627
Emsisoft 20150627
F-Prot 20150627
F-Secure 20150627
Fortinet 20150627
GData 20150627
Ikarus 20150627
K7AntiVirus 20150627
K7GW 20150627
Kaspersky 20150627
Kingsoft 20150627
Malwarebytes 20150627
McAfee 20150627
McAfee-GW-Edition 20150627
MicroWorld-eScan 20150627
Microsoft 20150627
NANO-Antivirus 20150627
Panda 20150626
Qihoo-360 20150627
Rising 20150626
SUPERAntiSpyware 20150627
Sophos 20150627
Symantec 20150627
Tencent 20150627
TheHacker 20150626
TotalDefense 20150626
TrendMicro 20150627
TrendMicro-HouseCall 20150627
VBA32 20150626
VIPRE 20150627
ViRobot 20150627
Zoner 20150627
nProtect 20150626
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
Copyright (C) Data Guardian

Publisher Koingo Software, Inc.
Product Data Guardian
Original name data_guardian.exe
Internal name data_guardian
File version 3.0.6
Description This installer database contains the logic and data required to install Data Guardian.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-02-04 14:35:55
Link date 3:35 PM 2/4/2013
Entry Point 0x0002F6EE
Number of sections 4
PE sections
Overlays
MD5 950d781eaff8e8eca599717e3ab9b50c
File type data
Offset 397824
Size 11921359
Entropy 7.98
PE imports
DestroyPropertySheetPage
CreatePropertySheetPageW
PropertySheetW
GetDeviceCaps
DeleteDC
CreateFontIndirectW
SetBkMode
BitBlt
GetStockObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
WaitForSingleObject
HeapDestroy
IsValidLocale
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
FormatMessageW
ConnectNamedPipe
GetExitCodeProcess
InitializeCriticalSection
OutputDebugStringW
GetLogicalDriveStringsW
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetSystemTime
TlsGetValue
CopyFileW
GetUserDefaultLangID
LoadResource
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
lstrcmpiW
EnumSystemLocalesA
EnumResourceLanguagesW
GetUserDefaultLCID
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetSystemDirectoryW
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
GlobalMemoryStatus
SearchPathW
WriteConsoleA
GetVersion
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
OpenProcess
DeleteFileA
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetModuleFileNameW
FindNextFileW
ResetEvent
GetTempFileNameA
FindFirstFileW
TerminateProcess
DuplicateHandle
GlobalLock
GetTempPathW
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetShortPathNameW
CreateNamedPipeW
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
VirtualFree
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCPInfo
HeapSize
InterlockedCompareExchange
lstrcpynW
GetSystemDefaultLangID
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
FindResourceExW
CreateProcessA
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
GetOEMCP
VarUI4FromStr
OleLoadPicture
SHGetFolderPathW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
PathFileExistsW
MapWindowPoints
RedrawWindow
GetForegroundWindow
GetParent
EmptyClipboard
GetScrollRange
EndDialog
DestroyWindow
DefWindowProcW
ModifyMenuW
KillTimer
DestroyMenu
PostQuitMessage
ShowWindow
MessageBeep
LoadMenuW
SetWindowPos
SetFocus
GetSystemMetrics
EnableMenuItem
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
DialogBoxParamW
LoadIconW
SetPropW
TranslateMessage
GetWindow
PostMessageW
MessageBoxW
GetPropW
GetDC
CreateDialogParamW
ReleaseDC
GetDlgCtrlID
SendMessageW
UnregisterClassA
SetClipboardData
IsWindowVisible
CloseClipboard
GetClientRect
SetWindowLongW
GetDlgItem
RemovePropW
SystemParametersInfoW
LoadImageW
DispatchMessageW
ScreenToClient
InvalidateRect
GetScrollPos
GetSubMenu
SetTimer
CallWindowProcW
TrackPopupMenu
LoadStringW
GetActiveWindow
FindWindowW
SetWindowTextW
GetWindowTextW
GetDesktopWindow
GetSystemMenu
GetWindowTextLengthW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
CharNextW
ExitWindowsEx
OpenClipboard
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CreateILockBytesOnHGlobal
Number of PE resources by type
RT_DIALOG 12
RT_ICON 12
RT_STRING 9
RTF_FILE 2
RT_MENU 2
IMAGE_FILE 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 42
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.0.6.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
121344

EntryPoint
0x2f6ee

OriginalFileName
data_guardian.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Data Guardian

FileVersion
3.0.6

TimeStamp
2013:02:04 15:35:55+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
data_guardian

ProductVersion
3.0.6

FileDescription
This installer database contains the logic and data required to install Data Guardian.

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Koingo Software, Inc.

CodeSize
275456

ProductName
Data Guardian

ProductVersionNumber
3.0.6.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 384802c88775a5e4c310b99929d329f0
SHA1 05e72d8b0133d0e9f8a31934f38e61defa79b9de
SHA256 85b56bce99907392589601e1a0c043111e9dd73e1b02a24f8ab5be30ac1196a1
ssdeep
196608:9G2gqoWCat0PSnFQLdp73046VEjOenskZtyYb03/wjssByCo+OQHBi+C5Jp0BQng:ktZBLf730PaxnsayzYgsByiHw9Z0E+fd

authentihash b3121665deebeaa847ec6fce3082a9a0ff02a820575c5ffcd9b3c9558c162906
imphash 64ac51d1685ad065533ce20c965f06ba
File size 11.7 MB ( 12319183 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (48.1%)
Win32 Executable MS Visual C++ (generic) (34.9%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Generic Win/DOS Executable (2.2%)
Tags
peexe overlay

VirusTotal metadata
First submission 2013-03-22 04:11:04 UTC ( 2 years, 3 months ago )
Last submission 2015-06-27 07:31:34 UTC ( 6 days, 9 hours ago )
File names 356768
85B56BCE99907392589601E1A0C043111E9DD73E1B02A24F8AB5BE30AC1196A1
file-5427377_exe
data_guardian.exe
data_guardian.exe
data_guardian
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!