× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 92eedd6734319b03af7d4f685dc28e4893bd8c2a5f3f296a73e2000d86dff44b
File name: 92eedd6734319b03af7d4f685dc28e4893bd8c2a5f3f296a73e2000d86dff44b
Detection ratio: 1 / 69
Analysis date: 2019-02-10 13:59:04 UTC ( 1 month ago ) View latest
Antivirus Result Update
CAT-QuickHeal Serverproxy.Analogx 20190210
Acronis 20190207
Ad-Aware 20190210
AegisLab 20190210
AhnLab-V3 20190210
Alibaba 20180921
Antiy-AVL 20190210
Arcabit 20190210
Avast 20190210
Avast-Mobile 20190210
AVG 20190210
Avira (no cloud) 20190210
Babable 20180917
Baidu 20190201
BitDefender 20190210
Bkav 20190201
ClamAV 20190210
CMC 20190210
Comodo 20190210
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190210
Cyren 20190210
DrWeb 20190210
eGambit 20190210
Emsisoft 20190210
Endgame 20181108
ESET-NOD32 20190210
F-Prot 20190210
F-Secure 20190210
Fortinet 20190210
GData 20190210
Ikarus 20190210
Sophos ML 20181128
Jiangmin 20190210
K7AntiVirus 20190210
K7GW 20190210
Kaspersky 20190210
Kingsoft 20190210
Malwarebytes 20190210
MAX 20190210
McAfee 20190210
McAfee-GW-Edition 20190209
Microsoft 20190210
eScan 20190210
NANO-Antivirus 20190210
Palo Alto Networks (Known Signatures) 20190210
Panda 20190210
Qihoo-360 20190210
Rising 20190210
SentinelOne (Static ML) 20190203
Sophos AV 20190210
SUPERAntiSpyware 20190206
Symantec 20190209
Symantec Mobile Insight 20190206
TACHYON 20190209
Tencent 20190210
TheHacker 20190203
TotalDefense 20190210
Trapmine 20190123
TrendMicro 20190210
TrendMicro-HouseCall 20190210
Trustlook 20190210
VBA32 20190208
ViRobot 20190210
Webroot 20190210
Yandex 20190207
Zillya 20190208
ZoneAlarm by Check Point 20190210
Zoner 20190209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
AnalogX, LLC. All rights reserved.

Product VirtualPiano Installer
Original name vpianoi.exe
Description AnalogX VirtualPiano Installer
Signature verification Signed file, verified signature
Signing date 2:19 AM 5/24/2009
Signers
[+] AnalogX, LLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Go Daddy Secure Certification Authority
Valid from 05:07 PM 05/21/2009
Valid to 03:58 PM 05/21/2010
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 11CD73F5EE4BDD37E241EE5C9055011498C82AFD
Serial number 00 AE 55 A5 F8 0E E0
[+] Go Daddy Secure Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 01:54 AM 11/16/2006
Valid to 01:54 AM 11/16/2026
Valid usage All
Algorithm sha1RSA
Thumbprint 7C4656C3061F7F4C0D67B319A855F60EBC11FC44
Serial number 03 01
[+] Go Daddy Class 2 Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 04:06 PM 06/29/2004
Valid to 04:06 PM 06/29/2034
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 2796BAE63F1801E277261BA0D77770028F20EEE4
Serial number 00
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 11:00 PM 06/14/2007
Valid to 10:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/04/2003
Valid to 11:59 PM 12/03/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-05-24 01:13:39
Entry Point 0x00012357
Number of sections 4
PE sections
Overlays
MD5 471a2eba72256133b71c96b58dfc9953
File type data
Offset 158208
Size 193664
Entropy 7.99
PE imports
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
InitCommonControlsEx
AddFontResourceA
DeleteDC
RemoveFontResourceA
SelectObject
BitBlt
GdiFlush
CreateDIBSection
CreateCompatibleDC
DeleteObject
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
AllocConsole
TlsGetValue
SetLastError
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
FindClose
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
SetUnhandledExceptionFilter
GetCurrentProcess
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetProcAddress
GetProcessHeap
CompareStringW
FindFirstFileA
CompareStringA
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetConsoleTitleA
CloseHandle
GetACP
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
EnumWindows
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetSysColorBrush
GetSystemMetrics
IsWindow
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
GetUpdateRect
ShowWindowAsync
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
RegisterClassExA
SetWindowTextA
DestroyIcon
SendDlgItemMessageA
SendMessageA
GetWindowTextA
GetClientRect
GetDlgItem
CreateDialogParamA
InvalidateRect
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
GetDesktopWindow
GetClassNameA
SetForegroundWindow
UnregisterClassA
DestroyWindow
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 5
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
AnalogX VirtualPiano Installer

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
34816

EntryPoint
0x12357

OriginalFileName
vpianoi.exe

MIMEType
application/octet-stream

LegalCopyright
AnalogX, LLC. All rights reserved.

TimeStamp
2009:05:24 03:13:39+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AnalogX, LLC

CodeSize
122368

ProductName
VirtualPiano Installer

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 395f2d260ca3e14b4fdb561158dce838
SHA1 3a3294e07b7530571a6d377ed1b21dea52ed357a
SHA256 92eedd6734319b03af7d4f685dc28e4893bd8c2a5f3f296a73e2000d86dff44b
ssdeep
6144:MefdDoDLhnowxc23DvJQTDWzKajrEeW4Lyx0jp0jQ9p6c789Xm:FRoDLvO23Dc2Emyqzpd8A

authentihash c488a13c78a5847a8529f49df3b377a5cd78d896b317efdc1aad7b9ea86ea110
imphash 56ed6084c5ecd8784553be57502cda76
File size 343.6 KB ( 351872 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2009-05-27 23:42:21 UTC ( 9 years, 9 months ago )
Last submission 2018-05-22 07:16:04 UTC ( 10 months ago )
File names 141482878025433-vpianoi.exe
ANALOGX.EXE
vpianoi.exe
22405029
VirtualPiano1.11[inst].exe
file-418672_exe
vpianoi.exe
file-5537303_exe
226614
vpianoi.exe
vpianoi.exe
vpianoi.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Shell commands
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.