× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 85b56bce99907392589601e1a0c043111e9dd73e1b02a24f8ab5be30ac1196a1
File name: data_guardian.exe
Detection ratio: 0 / 46
Analysis date: 2013-04-27 14:16:44 UTC ( 11 months, 3 weeks ago )
Antivirus Result Update
AVG 20130427
Agnitum 20130426
AhnLab-V3 20130427
AntiVir 20130427
Antiy-AVL 20130427
Avast 20130427
BitDefender 20130427
ByteHero 20130425
CAT-QuickHeal 20130427
ClamAV 20130427
Commtouch 20130427
Comodo 20130427
DrWeb 20130427
ESET-NOD32 20130427
Emsisoft 20130427
F-Prot 20130427
F-Secure 20130427
Fortinet 20130427
GData 20130427
Ikarus 20130427
Jiangmin 20130427
K7AntiVirus 20130426
K7GW 20130426
Kaspersky 20130427
Kingsoft 20130422
Malwarebytes 20130427
McAfee 20130427
McAfee-GW-Edition 20130427
MicroWorld-eScan 20130427
Microsoft 20130427
NANO-Antivirus 20130427
Norman 20130426
PCTools 20130427
Panda 20130427
SUPERAntiSpyware 20130427
Sophos 20130427
Symantec 20130427
TheHacker 20130426
TotalDefense 20130426
TrendMicro 20130427
TrendMicro-HouseCall 20130427
VBA32 20130427
VIPRE 20130427
ViRobot 20130427
eSafe 20130423
nProtect 20130427
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright (C) Data Guardian

Publisher Koingo Software, Inc.
Product Data Guardian
Original name data_guardian.exe
Internal name data_guardian
File version 3.0.6
Description This installer database contains the logic and data required to install Data Guardian.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-02-04 14:35:55
Entry Point 0x0002F6EE
Number of sections 4
PE sections
PE imports
DestroyPropertySheetPage
CreatePropertySheetPageW
PropertySheetW
GetDeviceCaps
DeleteDC
CreateFontIndirectW
SetBkMode
BitBlt
GetStockObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
WaitForSingleObject
HeapDestroy
IsValidLocale
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
FormatMessageW
ConnectNamedPipe
GetExitCodeProcess
InitializeCriticalSection
OutputDebugStringW
GetLogicalDriveStringsW
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetSystemTime
TlsGetValue
CopyFileW
GetUserDefaultLangID
LoadResource
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
lstrcmpiW
EnumSystemLocalesA
EnumResourceLanguagesW
GetUserDefaultLCID
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetSystemDirectoryW
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
GlobalMemoryStatus
SearchPathW
WriteConsoleA
GetVersion
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
OpenProcess
DeleteFileA
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetModuleFileNameW
FindNextFileW
ResetEvent
GetTempFileNameA
FindFirstFileW
TerminateProcess
DuplicateHandle
GlobalLock
GetTempPathW
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetShortPathNameW
CreateNamedPipeW
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
VirtualFree
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCPInfo
HeapSize
InterlockedCompareExchange
lstrcpynW
GetSystemDefaultLangID
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
FindResourceExW
CreateProcessA
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
GetOEMCP
Ord(277)
Ord(418)
SHGetFolderPathW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
PathFileExistsW
MapWindowPoints
RedrawWindow
GetForegroundWindow
GetParent
EmptyClipboard
GetScrollRange
EndDialog
DestroyWindow
DefWindowProcW
ModifyMenuW
KillTimer
DestroyMenu
PostQuitMessage
ShowWindow
MessageBeep
LoadMenuW
SetWindowPos
SetFocus
GetSystemMetrics
EnableMenuItem
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
DialogBoxParamW
LoadIconW
SetPropW
TranslateMessage
GetWindow
PostMessageW
MessageBoxW
GetPropW
GetDC
CreateDialogParamW
ReleaseDC
GetDlgCtrlID
SendMessageW
UnregisterClassA
SetClipboardData
IsWindowVisible
CloseClipboard
GetClientRect
SetWindowLongW
GetDlgItem
RemovePropW
SystemParametersInfoW
LoadImageW
DispatchMessageW
ScreenToClient
InvalidateRect
GetScrollPos
GetSubMenu
SetTimer
CallWindowProcW
TrackPopupMenu
LoadStringW
GetActiveWindow
FindWindowW
SetWindowTextW
GetWindowTextW
GetDesktopWindow
GetSystemMenu
GetWindowTextLengthW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
CharNextW
ExitWindowsEx
OpenClipboard
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CreateILockBytesOnHGlobal
Number of PE resources by type
RT_DIALOG 12
RT_ICON 12
RT_STRING 9
RTF_FILE 2
RT_MENU 2
IMAGE_FILE 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 42
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.0.6.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
121344

OriginalFileName
data_guardian.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Data Guardian

FileVersion
3.0.6

TimeStamp
2013:02:04 15:35:55+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
data_guardian

FileAccessDate
2013:04:27 15:25:41+01:00

ProductVersion
3.0.6

FileDescription
This installer database contains the logic and data required to install Data Guardian.

OSVersion
5.0

FileCreateDate
2013:04:27 15:25:41+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Koingo Software, Inc.

CodeSize
275456

ProductName
Data Guardian

ProductVersionNumber
3.0.6.0

EntryPoint
0x2f6ee

ObjectFileType
Dynamic link library

File identification
MD5 384802c88775a5e4c310b99929d329f0
SHA1 05e72d8b0133d0e9f8a31934f38e61defa79b9de
SHA256 85b56bce99907392589601e1a0c043111e9dd73e1b02a24f8ab5be30ac1196a1
ssdeep
196608:9G2gqoWCat0PSnFQLdp73046VEjOenskZtyYb03/wjssByCo+OQHBi+C5Jp0BQng:ktZBLf730PaxnsayzYgsByiHw9Z0E+fd

File size 11.7 MB ( 12319183 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (47.1%)
Win32 Executable MS Visual C++ (generic) (34.1%)
Win32 Dynamic Link Library (generic) (7.2%)
Win32 Executable (generic) (7.1%)
Generic Win/DOS Executable (2.1%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-22 04:11:04 UTC ( 1 year ago )
Last submission 2013-04-27 14:16:44 UTC ( 11 months, 3 weeks ago )
File names data_guardian.exe
file-5427377_exe
data_guardian
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!