× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 96547ac052ca25d1852ad4287e5a009c513f1c0dbc17dbd7bba40629fcf3b048
Detection ratio: 7 / 66
Analysis date: 2018-04-05 15:06:46 UTC ( 10 months, 2 weeks ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_60% (W) 20170201
Fortinet W32/Zbot.PKJO!tr 20180405
Sophos ML heuristic 20180121
Kaspersky UDS:DangerousObject.Multi.Generic 20180405
Palo Alto Networks (Known Signatures) generic.ml 20180405
Qihoo-360 Win32/Trojan.3fe 20180405
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180405
Ad-Aware 20180405
AegisLab 20180405
AhnLab-V3 20180405
Alibaba 20180404
ALYac 20180405
Antiy-AVL 20180405
Arcabit 20180405
Avast 20180405
Avast-Mobile 20180405
AVG 20180405
Avira (no cloud) 20180405
AVware 20180405
Baidu 20180404
BitDefender 20180405
Bkav 20180405
CAT-QuickHeal 20180405
ClamAV 20180405
CMC 20180405
Comodo 20180405
Cybereason 20180225
Cylance 20180405
Cyren 20180405
DrWeb 20180405
eGambit 20180405
Emsisoft 20180405
Endgame 20180403
ESET-NOD32 20180405
F-Prot 20180405
F-Secure 20180405
GData 20180405
Ikarus 20180405
Jiangmin 20180405
K7AntiVirus 20180404
K7GW 20180405
Kingsoft 20180405
Malwarebytes 20180405
MAX 20180405
McAfee 20180405
McAfee-GW-Edition 20180405
Microsoft 20180405
eScan 20180405
NANO-Antivirus 20180405
nProtect 20180405
Panda 20180405
Rising 20180405
SentinelOne (Static ML) 20180225
Sophos AV 20180405
SUPERAntiSpyware 20180405
Symantec 20180405
Symantec Mobile Insight 20180401
Tencent 20180405
TheHacker 20180404
TrendMicro 20180405
TrendMicro-HouseCall 20180405
Trustlook 20180405
VBA32 20180405
VIPRE 20180405
ViRobot 20180405
WhiteArmor 20180405
Yandex 20180405
Zillya 20180405
Zoner 20180405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2002 Fishbowl Inventory Slip. All rights reserved.

Product Out Print
Internal name Out Print
File version 8, 0, 9166, 6547
Description Out Print
Comments Ma
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-04-05 11:22:06
Entry Point 0x00154788
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
ImageList_GetIconSize
GetFileTitleW
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
EndDoc
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
Escape
ScaleViewportExtEx
SetWindowExtEx
SetViewportExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
CreateFontIndirectW
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
SetAbortProc
FrameRgn
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
DeleteObject
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetSystemPaletteEntries
GetCharWidthW
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
Ellipse
CreateSolidBrush
Polyline
DPtoLP
AbortDoc
CreateCompatibleBitmap
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
FileTimeToSystemTime
DeactivateActCtx
SetEvent
EncodePointer
GetFileAttributesW
lstrcmpW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
LoadLibraryExW
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetProcAddress
InterlockedExchange
WriteFile
FormatMessageW
WaitForSingleObject
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
GetFullPathNameW
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
GlobalFindAtomW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
HeapSetInformation
EnumSystemLocalesA
SetThreadPriority
ActivateActCtx
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
CopyFileW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
LCMapStringW
OpenProcess
GetDateFormatW
GetStartupInfoW
GetUserDefaultLCID
GetProcessHeap
GetTempFileNameW
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
GlobalLock
GlobalAlloc
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
GlobalDeleteAtom
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
OpenMutexW
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
IsValidCodePage
HeapCreate
FindResourceExW
CreateProcessW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
LresultFromObject
CreateStdAccessibleObject
AccessibleObjectFromWindow
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
DragFinish
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHBrowseForFolderW
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
RedrawWindow
GetForegroundWindow
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
CharUpperW
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
IntersectRect
CharUpperBuffW
SetMenuItemInfoW
SetActiveWindow
GetDC
GetAsyncKeyState
MapDialogRect
GetDlgCtrlID
DefFrameProcW
GetClassInfoW
GetMenuItemInfoW
DefWindowProcW
SetMenuDefaultItem
MoveWindow
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
TrackPopupMenu
ClientToScreen
GetActiveWindow
MapVirtualKeyExW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
GetTopWindow
DrawTextW
GetMenuItemID
PtInRect
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
GetWindowTextW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetMenuState
GetCursorPos
PeekMessageW
TranslateMDISysAccel
InsertMenuItemW
SetWindowPlacement
CopyAcceleratorTableW
LoadIconW
CopyImage
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
RegisterClassW
GetIconInfo
SetParent
SetClipboardData
ScrollWindow
IsZoomed
GetWindowPlacement
DestroyWindow
SetWindowLongW
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
GetScrollPos
DrawFocusRect
CreateMenu
GetKeyboardLayout
FillRect
MonitorFromPoint
CreateAcceleratorTableW
DeferWindowPos
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
GetMenuStringW
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
BeginPaint
OffsetRect
DefMDIChildProcW
ReleaseCapture
CopyIcon
KillTimer
MapVirtualKeyW
MapWindowPoints
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetCapture
DrawIcon
DrawTextExW
ShowOwnedPopups
SendDlgItemMessageW
PostMessageW
InvalidateRect
CheckDlgButton
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
GetMessageTime
SetWindowTextW
SetTimer
GetDlgItem
RemovePropW
BringWindowToTop
ScreenToClient
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
DestroyAcceleratorTable
BeginDeferWindowPos
ValidateRect
IsDialogMessageW
LoadCursorW
GetSystemMenu
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
NotifyWinEvent
OpenClipboard
EmptyClipboard
CreateDialogIndirectParamW
ReleaseDC
GetScrollRange
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
HideCaret
CopyRect
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
SetRectEmpty
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
EnumDisplayMonitors
IsWindowVisible
WinHelpW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CallWindowProcW
GetClassNameW
GetClientRect
SetWindowsHookExW
IsRectEmpty
IsMenu
GetFocus
EnableWindow
CloseClipboard
SetCursor
GetMenu
SetMenu
TranslateAcceleratorW
PlaySoundW
DocumentPropertiesW
AddPrinterDriverExW
WaitForPrinterChange
EnumPortsW
ReadPrinter
AddMonitorW
DeletePortW
GetPrinterDataExW
WritePrinter
GetPrinterDataW
SetFormW
AddJobW
ResetPrinterW
OpenPrinterW
DeletePrinter
DeletePrinterDataExW
GetPrinterW
ConfigurePortW
AddPrinterConnectionW
EnumPrinterDriversW
EnumPrinterDataExW
DeleteMonitorW
DeletePrintProvidorW
EnumFormsW
EnumPrinterDataW
XcvDataW
GetPrintProcessorDirectoryW
DeletePrinterConnectionW
SetPortW
GetPrinterDriverW
StartPagePrinter
EnumPrintersW
SetPrinterDataExW
DeletePrinterDataW
SetJobW
EnumMonitorsW
GetJobW
ScheduleJob
FlushPrinter
AddPrintProcessorW
DeletePrinterDriverW
GetFormW
AddPrinterDriverW
EnumJobsW
AbortPrinter
EndPagePrinter
AddPortW
DeleteFormW
EnumPrinterKeyW
AddPrintProvidorW
PrinterMessageBoxW
EnumPrintProcessorsW
DeletePrinterDriverExW
DeletePrintProcessorW
DeletePrinterKeyW
ClosePrinter
GetPrinterDriverDirectoryW
StartDocPrinterW
FindClosePrinterChangeNotification
SetPrinterDataW
EnumPrintProcessorDatatypesW
EndDocPrinter
AddPrinterW
AddFormW
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleLockRunning
CoUninitialize
OleTranslateAccelerator
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
CreateStreamOnHGlobal
IsAccelerator
OleSetContainedObject
RegisterDragDrop
RevokeDragDrop
OleGetClipboard
OleDuplicateData
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
OleCreateMenuDescriptor
ReleaseStgMedium
CoTaskMemFree
SfcIsFileProtected
Number of PE resources by type
RT_DIALOG 11
RT_ICON 9
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 24
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

Comments
Ma

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
8.0.9166.6547

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Out Print

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
1199616

EntryPoint
0x154788

MIMEType
application/octet-stream

LegalCopyright
Copyright 2002 Fishbowl Inventory Slip. All rights reserved.

FileVersion
8, 0, 9166, 6547

TimeStamp
2012:04:05 12:22:06+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Out Print

ProductVersion
8, 0, 9166, 6547

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Fishbowl Inventory Slip

CodeSize
1562624

ProductName
Out Print

ProductVersionNumber
8.0.9166.6547

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 4fe345d81e170a532c127fee2afc46c5
SHA1 b3aa5d62a8e03a4d012d9e1bac1d64a7d1e7a200
SHA256 96547ac052ca25d1852ad4287e5a009c513f1c0dbc17dbd7bba40629fcf3b048
ssdeep
49152:5gc5XHfJcJ6dhdkv01AcE/JponL+QVWbjsIanjEFV/Z4gZuirDNVC94eagQx3:f1HffhdksAcWponqQVWbVanoFDyiVVCq

authentihash 3f3190f8d3bf3f110449c9a0e873865b5ec1ee51632a5142f8cd26fd8a75c375
imphash e0cdf05b9e0f2a936d029b77e681d726
File size 2.6 MB ( 2686976 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-04-05 13:37:23 UTC ( 10 months, 2 weeks ago )
Last submission 2018-04-05 15:06:46 UTC ( 10 months, 2 weeks ago )
File names Out Print
ing1.class
ing2.class
ing5.class
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened mutexes
Runtime DLLs