× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9687d454aea5203c4eb3e4d973d189db3260d1d6d48370d2ee60a045cad20325
File name: 4t-min
Detection ratio: 47 / 57
Analysis date: 2016-12-13 23:32:55 UTC ( 2 years, 5 months ago )
Antivirus Result Update
Ad-Aware Trojan.Ransom.TeslaCrypt.A 20161213
AegisLab Troj.W32.Generic!c 20161213
AhnLab-V3 Trojan/Win32.Locky.R188552 20161213
ALYac Trojan.Ransom.TeslaCrypt.A 20161213
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20161213
Arcabit Trojan.Ransom.TeslaCrypt.A 20161213
Avast Win32:Malware-gen 20161213
AVG Crypt5.CMIR 20161213
Avira (no cloud) TR/Agent.keo 20161213
AVware Trojan.Win32.Generic!BT 20161213
Baidu Win32.Trojan.Kryptik.asp 20161207
BitDefender Trojan.Ransom.TeslaCrypt.A 20161214
CAT-QuickHeal Ransomware.Locky.WR5 20161213
ClamAV Win.Ransomware.Locky-31469 20161213
Comodo TrojWare.Win32.Ransom.Locky.XSU 20161213
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20161024
Cyren W32/Locky.BE.gen!Eldorado 20161214
Emsisoft Trojan.Ransom.TeslaCrypt.A (B) 20161214
ESET-NOD32 a variant of Win32/Kryptik.FFLK 20161213
F-Prot W32/Locky.BE.gen!Eldorado 20161214
F-Secure Trojan.Ransom.TeslaCrypt.A 20161214
Fortinet W32/Generic.AC.37EE62!tr 20161214
GData Trojan.Ransom.TeslaCrypt.A 20161214
Ikarus Trojan-Ransom.Locky 20161213
Sophos ML backdoor.win32.vawtrak.a 20161202
Jiangmin Trojan.Agent.aihh 20161213
K7AntiVirus Trojan ( 004f7c551 ) 20161213
K7GW Trojan ( 004f7c551 ) 20161214
Kaspersky Trojan-Ransom.Win32.Agent.ita 20161214
Malwarebytes Ransom.Locky 20161214
McAfee RDN/Generic.com 20161214
McAfee-GW-Edition BehavesLike.Win32.Ransomware.cc 20161213
Microsoft Ransom:Win32/Locky 20161213
eScan Trojan.Ransom.TeslaCrypt.A 20161213
NANO-Antivirus Trojan.Win32.Agent.ejkurp 20161213
Panda Trj/Genetic.gen 20161213
Qihoo-360 Win32/Trojan.e6d 20161214
Rising Malware.Generic!MSaEnqn0xTV@5 (thunder) 20161213
Sophos AV Mal/Locky-B 20161213
Symantec Ransom.Locky 20161213
Tencent Win32.Trojan.Raas.Auto 20161214
TrendMicro Ransom_HPLOCKY.SM24 20161213
TrendMicro-HouseCall Ransom_HPLOCKY.SM24 20161213
VBA32 Hoax.Agent 20161213
VIPRE Trojan.Win32.Generic!BT 20161213
ViRobot Trojan.Win32.Locky.Gen.D[h] 20161213
Yandex Trojan.Agent!+J4v/8JdRyQ 20161213
Alibaba 20161213
Bkav 20161213
CMC 20161213
DrWeb 20161214
Kingsoft 20161214
nProtect 20161213
SUPERAntiSpyware 20161213
TheHacker 20161212
TotalDefense 20161213
Trustlook 20161214
WhiteArmor 20161212
Zillya 20161213
Zoner 20161213
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2001-2011, 4t Niagara Software

Product 4t Tray Minimizer Free
Internal name 4t-min
File version 5.52.0.0
Description 4t Tray Minimizer Free
Comments Minimize any program to the system tray!
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-08-31 05:30:54
Entry Point 0x000058D1
Number of sections 5
PE sections
PE imports
CryptDestroyKey
RegCreateKeyExW
RegCloseKey
RegRestoreKeyW
RegQueryValueExA
RegCreateKeyW
CryptVerifySignatureW
LookupPrivilegeValueW
RegEnumKeyW
RegDeleteKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
OpenProcessToken
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueW
CryptReleaseContext
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
GetUserNameA
CryptDestroyHash
CryptAcquireContextW
CryptGetUserKey
RegDeleteValueW
RegSetValueExW
GetSaveFileNameW
GetFileTitleW
CommDlgExtendedError
SetGraphicsMode
Polygon
TextOutW
CreateFontIndirectW
GetGlyphOutlineW
CreatePen
SetMapMode
SaveDC
SetTextAlign
GetTextMetricsA
GetBkColor
CombineRgn
GetClipBox
ModifyWorldTransform
GetClipRgn
GetPixel
Rectangle
BitBlt
GetBrushOrgEx
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
GetCharacterPlacementW
SetWorldTransform
DeleteObject
GetObjectW
CreateDCW
CreateDIBSection
RealizePalette
SetTextColor
CreatePatternBrush
GetDeviceCaps
RectVisible
ExtTextOutW
GetOutlineTextMetricsA
CreateBitmap
Escape
CreatePalette
EnumFontFamiliesExW
SetViewportOrgEx
ScaleWindowExtEx
GetFontData
PtVisible
GetDIBits
ExtCreateRegion
GdiFlush
ScaleViewportExtEx
SelectClipRgn
CreateCompatibleDC
CreateFontW
SelectPalette
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
Ellipse
SetWindowExtEx
CreateSolidBrush
SetViewportExtEx
GetStockObject
SetPixelV
SetBkColor
GetTextExtentPoint32W
CreateCompatibleBitmap
ImmReleaseContext
ImmGetContext
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
EnumUILanguagesW
GetFileAttributesW
lstrcmpW
GetLocalTime
GetProfileIntA
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetVolumeInformationW
SetErrorMode
GetLogicalDrives
GetFileInformationByHandle
lstrcatW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
GetTimeZoneInformation
LoadResource
GlobalHandle
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
LocalLock
FindAtomA
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
GlobalFindAtomW
SetProcessWorkingSetSize
EnumResourceLanguagesW
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
FormatMessageA
GetModuleHandleA
SetFileAttributesW
GlobalAddAtomW
CreateThread
DeleteCriticalSection
GetExitCodeThread
CreateSemaphoreW
ConvertDefaultLocale
CreateMutexW
MulDiv
GetDateFormatA
ExitThread
SetUnhandledExceptionFilter
WriteConsoleA
SetCurrentDirectoryW
VirtualQuery
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
SetEndOfFile
GetVersion
InterlockedIncrement
WriteConsoleW
AreFileApisANSI
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
GetVersionExW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
FreeLibrary
CopyFileW
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
OpenProcess
GetPrivateProfileIntA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
AddAtomW
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
GetTimeFormatA
GetComputerNameA
FindFirstFileW
DuplicateHandle
CreateEventW
CreateFileW
VirtualProtectEx
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
LockFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
CancelIo
WritePrivateProfileStringW
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
FreeResource
GetFileAttributesExW
GetEnvironmentStrings
WideCharToMultiByte
GetConsoleFontSize
HeapCreate
FindResourceW
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
CompareStringA
VarUI4FromStr
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SysStringLen
SystemTimeToVariantTime
RegisterTypeLib
LoadRegTypeLib
SysAllocString
SafeArrayDestroy
SafeArrayGetUBound
VariantClear
SafeArrayGetVartype
UnRegisterTypeLib
VariantTimeToSystemTime
LoadTypeLib
SysFreeString
SafeArrayCopy
VariantInit
SafeArrayGetElement
GetModuleBaseNameW
EnumProcesses
EnumProcessModules
DragQueryFileW
SHQueryRecycleBinW
SHEmptyRecycleBinW
SHCreateDirectoryExW
DragFinish
SHGetFolderLocation
SHFileOperationW
SHGetPathFromIDListW
ExtractIconExW
SHGetDesktopFolder
Shell_NotifyIconW
SHGetMalloc
CommandLineToArgvW
SHBrowseForFolderW
PathFindFileNameW
SHCopyKeyW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathMakeSystemFolderW
PathUnmakeSystemFolderW
InternetTimeFromSystemTimeW
HttpQueryInfoW
InternetGetLastResponseInfoW
InternetConnectW
InternetReadFile
InternetTimeToSystemTimeW
InternetSetOptionW
InternetGetConnectedState
InternetErrorDlg
InternetCloseHandle
HttpSendRequestW
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
mixerGetLineControlsW
mixerGetControlDetailsW
mciGetErrorStringW
mixerOpen
mixerSetControlDetails
mciSendCommandW
mixerClose
mixerGetDevCapsW
mixerGetLineInfoW
GdipDrawImageRectRect
GdipGetFontStyle
GdipDrawRectangleI
GdipSetClipRect
GdipSaveGraphics
GdipGetGenericFontFamilySansSerif
GdipTranslateMatrix
GdipDrawImageRectRectI
GdipCreateBitmapFromScan0
GdipGetImageVerticalResolution
GdipDisposeImage
GdipImageSelectActiveFrame
GdipGetFamilyName
GdipGetFontSize
GdipGetCompositingMode
GdipGetTextRenderingHint
GdipGetCellAscent
GdipGetClipBounds
GdipSetStringFormatAlign
GdipImageGetFrameCount
GdipGetImageWidth
GdipDrawImageI
GdipStringFormatGetGenericTypographic
GdipCreateFont
GdipCloneBrush
GdipCloneStringFormat
GdipCreateLineBrushFromRectWithAngleI
GdipFree
GdipGetImageRawFormat
GdipGetImageHeight
GdipDeleteStringFormat
GdipTranslateWorldTransform
GdipSetPenDashStyle
GdipSetTextRenderingHint
GdipCreateBitmapFromHICON
GdipGetImageHorizontalResolution
GdipSetImageAttributesColorMatrix
GdipSaveImageToFile
GdipMeasureString
GdipTransformMatrixPoints
GdipSetPenBrushFill
GdipBitmapSetResolution
GdiplusStartup
GdipGetFamily
GdipFillPath
GdipCreateBitmapFromStream
GdipGetImageThumbnail
GdipGetImageEncoders
GdipFillRectangleI
GdipDisposeImageAttributes
GdipSetCompositingMode
GdipClosePathFigure
GdipCreateMatrix
GdipDrawLine
GdipRotateMatrix
GdipGetImageGraphicsContext
GdipRestoreGraphics
GdipGetImageEncodersSize
GdipBitmapLockBits
GdipClonePen
GdipGetCellDescent
GdipStringFormatGetGenericDefault
GdipDrawPath
GdipDeleteFontFamily
GdipCloneFontFamily
GdipCreatePath
GdipBitmapUnlockBits
GdipFillRectangle
GdipDeleteFont
GdipSetPixelOffsetMode
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipDrawLineI
GdipBitmapGetPixel
GdipCreateFontFamilyFromName
GdipSetStringFormatFlags
GdipDeleteBrush
GdipRotateWorldTransform
GdipInvertMatrix
GdipAddPathArcI
GdipSetMatrixElements
GdipSetClipRectI
GdipGetStringFormatFlags
GdipGetClipBoundsI
GdipGetImagePixelFormat
GdipCreateSolidFill
GdipSetSmoothingMode
GdipSetStringFormatTrimming
GdipGetEmHeight
GdipGetDC
GdipDeleteMatrix
GdipGetLineSpacing
GdipDeleteGraphics
GdipTransformPath
GdipCreateImageAttributes
GdipCreateFromHDC
GdipCreatePen1
GdipDrawRectangle
GdipAlloc
GdipDeletePath
GdipDeletePen
GdipSetInterpolationMode
GdipDrawString
GdipCloneImage
GdipReleaseDC
isdigit
_exit
_CIcos
_wtoi
CreateStreamOnHGlobal
OleLockRunning
CoRegisterClassObject
CoInitialize
OleInitialize
CoRevokeClassObject
CoLockObjectExternal
CoCreateGuid
CoTaskMemRealloc
CoCreateInstance
RegisterDragDrop
CLSIDFromProgID
RevokeDragDrop
CoUninitialize
CoCreateInstanceEx
OleSetContainedObject
CLSIDFromString
CoTaskMemFree
StringFromGUID2
CoTaskMemAlloc
SnmpUtilOidCpy
SnmpUtilOidNCmp
SnmpUtilVarBindFree
CreateURLMonikerEx
PE exports
Number of PE resources by type
RT_BITMAP 4
RT_RCDATA 2
RT_VERSION 1
Number of PE resources by language
ENGLISH US 7
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

Comments
Minimize any program to the system tray!

LinkerVersion
3.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.52.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
238080

EntryPoint
0x58d1

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2001-2011, 4t Niagara Software

FileVersion
5.52.0.0

TimeStamp
2016:08:31 06:30:54+01:00

FileType
Win32 DLL

PEType
PE32

InternalName
4t-min

SubsystemVersion
5.1

ProductVersion
5.52

FileDescription
4t Tray Minimizer Free

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
4t Niagara Software

CodeSize
41984

ProductName
4t Tray Minimizer Free

ProductVersionNumber
5.52.0.0

FileTypeExtension
dll

ObjectFileType
Executable application

File identification
MD5 b6000b98544393399e08c00f9794783d
SHA1 187d21eb4488b092e3c4897f103affb9127dac8e
SHA256 9687d454aea5203c4eb3e4d973d189db3260d1d6d48370d2ee60a045cad20325
ssdeep
3072:u+Kz/nLHMZqXT5gQPv68J3SeNbmHBFZySNL7dx8UKZHJLUKCW:JKzVTDrmAM8Lw

authentihash bf9ae0e64e5d948cf99119b747052389cc7b1bac16f30077cf0d65bc80fa4609
imphash 1cb00b7a415a2fada5aee7b7ddaf5dea
File size 138.5 KB ( 141824 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
pedll

VirusTotal metadata
First submission 2016-08-31 08:18:08 UTC ( 2 years, 8 months ago )
Last submission 2016-08-31 13:30:06 UTC ( 2 years, 8 months ago )
File names 6nUw34S98goC.dll
4t-min
nAITJMGLetQ5.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!