× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4f6f8fa1406629871a5dba8ae578ef065f599bca047955b9fe449c516d1a604
File name: E160Update_11.609.10.02.432.B418.exe
Detection ratio: 0 / 61
Analysis date: 2017-04-19 14:27:41 UTC ( 7 months, 4 weeks ago )
Antivirus Result Update
Ad-Aware 20170419
AegisLab 20170419
AhnLab-V3 20170419
Alibaba 20170419
ALYac 20170419
Antiy-AVL 20170419
Arcabit 20170419
Avast 20170419
AVG 20170419
Avira (no cloud) 20170419
AVware 20170419
Baidu 20170419
BitDefender 20170419
Bkav 20170419
CAT-QuickHeal 20170419
ClamAV 20170419
CMC 20170419
Comodo 20170419
CrowdStrike Falcon (ML) 20170130
Cyren 20170419
DrWeb 20170419
Emsisoft 20170419
Endgame 20170419
ESET-NOD32 20170419
F-Prot 20170419
F-Secure 20170419
Fortinet 20170419
GData 20170419
Ikarus 20170419
Sophos ML 20170413
Jiangmin 20170419
K7AntiVirus 20170419
K7GW 20170419
Kaspersky 20170419
Kingsoft 20170419
Malwarebytes 20170419
McAfee 20170419
McAfee-GW-Edition 20170419
Microsoft 20170419
eScan 20170419
NANO-Antivirus 20170419
nProtect 20170419
Palo Alto Networks (Known Signatures) 20170419
Panda 20170419
Qihoo-360 20170419
Rising 20170419
SentinelOne (Static ML) 20170330
Sophos AV 20170419
SUPERAntiSpyware 20170419
Symantec 20170419
Symantec Mobile Insight 20170414
Tencent 20170419
TheHacker 20170419
TrendMicro 20170419
TrendMicro-HouseCall 20170419
Trustlook 20170419
VBA32 20170419
VIPRE 20170419
ViRobot 20170419
Webroot 20170419
WhiteArmor 20170409
Yandex 20170418
Zillya 20170418
ZoneAlarm by Check Point 20170419
Zoner 20170419
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(C) HUAWEI Corporation. All rights reserved.

Product HUAWEI DataCard Update Wizard
Original name DataCard Update Wizard .EXE
File version 1, 0, 0, 1
Description HUAWEI DataCard Update Wizard
Comments PRODUCE
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-02-05 11:59:20
Entry Point 0x00022511
Number of sections 4
PE sections
PE imports
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegQueryInfoKeyA
CM_Get_DevNode_Status
GetWindowExtEx
SetMapMode
SetBkMode
PatBlt
SaveDC
TextOutA
LPtoDP
GetClipBox
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetTextExtentPointA
SelectObject
IntersectClipRect
BitBlt
SetTextColor
GetObjectA
CreateFontA
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
CreateCompatibleDC
ScaleViewportExtEx
GetBkColor
GetMapMode
SetWindowExtEx
GetTextColor
CreateSolidBrush
DPtoLP
Escape
GetViewportExtEx
DeleteObject
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
SetEvent
PurgeComm
HeapDestroy
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
WaitCommEvent
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetStringTypeA
GetProcessVersion
WriteFile
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
MoveFileA
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
GlobalFindAtomA
HeapAlloc
GetVersionExA
GetModuleFileNameA
GetVolumeInformationA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
CreateSemaphoreA
CreateThread
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ClearCommError
ExitThread
SetEnvironmentVariableA
VirtualQuery
SetEndOfFile
GetVersion
InterlockedIncrement
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
DeleteFileA
GetCommProperties
SetCommMask
GetProcAddress
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
GetTempFileNameA
DuplicateHandle
WaitForMultipleObjects
GlobalAlloc
GetTimeZoneInformation
SetCommState
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
CancelIo
GetCurrentThread
SuspendThread
RaiseException
ReleaseSemaphore
TlsFree
SetFilePointer
ReadFile
GetCommState
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetCurrentThreadId
SetThreadExecutionState
SizeofResource
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
ResetEvent
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
UuidFromStringA
SetupDiGetDeviceInstallParamsA
CM_Request_Device_EjectA
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
CommandLineToArgvW
SetFocus
SetDlgItemTextA
GetMessagePos
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GetWindowLongA
GrayStringA
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetTopWindow
ExcludeUpdateRgn
GetActiveWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
ShowWindow
GetPropA
GetNextDlgGroupItem
ValidateRect
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
DrawFocusRect
CreateWindowExA
SetWindowContextHelpId
GetSysColorBrush
IsWindowUnicode
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
BeginPaint
OffsetRect
KillTimer
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
InflateRect
PostMessageA
DrawIcon
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
GetMenuState
GetMenuItemID
SetForegroundWindow
PostThreadMessageA
ReleaseDC
IntersectRect
EndDialog
HideCaret
CopyRect
GetCapture
MessageBeep
ShowCaret
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
GetDesktopWindow
WinHelpA
SetRect
InvalidateRect
wsprintfA
DrawTextA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CLSIDFromString
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoGetClassObject
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemFree
CreateILockBytesOnHGlobal
CoTaskMemAlloc
Number of PE resources by type
RT_STRING 21
RT_BITMAP 13
BIN 3
RT_DIALOG 2
RT_ICON 2
RT_CURSOR 2
EXE 1
RT_GROUP_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE SIMPLIFIED 47
PE resources
ExifTool file metadata
LegalTrademarks
HUAWEI

SubsystemVersion
4.0

Comments
PRODUCE

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.1

LanguageCode
Chinese (Simplified)

FileFlagsMask
0x003f

FileDescription
HUAWEI DataCard Update Wizard

CharacterSet
Unicode

InitializedDataSize
30461952

EntryPoint
0x22511

OriginalFileName
DataCard Update Wizard .EXE

MIMEType
application/octet-stream

LegalCopyright
(C) HUAWEI Corporation. All rights reserved.

FileVersion
1, 0, 0, 1

TimeStamp
2009:02:05 12:59:20+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1, 0, 0, 1

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
HUAWEI Corporation

CodeSize
266240

ProductName
HUAWEI DataCard Update Wizard

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 9a10bff158843fcd0383cb3f569c8817
SHA1 f680a9cef47ffee4d7094a603aec19ba1b55466f
SHA256 a4f6f8fa1406629871a5dba8ae578ef065f599bca047955b9fe449c516d1a604
ssdeep
393216:iVF0CO8ZZVNokvP5LhyhFcW6LL21OdKJ97CHl:L0ZVNTp0vx1Od26

authentihash ad5c1bbc14f063a5d6819352bf2e30afdadb94fbf34b18a04d230e11fc42e9bc
imphash 01dd65b1eb35c0ec464d693f1c76d771
File size 29.3 MB ( 30732288 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (76.4%)
Win32 Executable (generic) (12.4%)
Generic Win/DOS Executable (5.5%)
DOS Executable Generic (5.5%)
Tags
peexe

VirusTotal metadata
First submission 2012-05-04 13:41:41 UTC ( 5 years, 7 months ago )
Last submission 2017-04-19 14:27:41 UTC ( 7 months, 4 weeks ago )
File names Firmware_E160E_11.609.10.02.432.b418.exe
update_11.609.10.02.432.b418.exe
E160Update_11.609.10.02.432.B418.exe
Update_11.609.10.02.432.B418.exe
DataCard Update Wizard .EXE
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!