× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ab56bcc94f106f221b2596e89e34303170451898afcc651cb4e27ec1684a6751
File name: avitoolbox_nork.exe
Detection ratio: 0 / 46
Analysis date: 2013-07-28 14:36:40 UTC ( 8 months, 3 weeks ago )
Antivirus Result Update
AVG 20130728
Agnitum 20130727
AhnLab-V3 20130728
AntiVir 20130728
Antiy-AVL 20130728
Avast 20130728
BitDefender 20130728
ByteHero 20130724
CAT-QuickHeal 20130727
ClamAV 20130728
Commtouch 20130728
Comodo 20130728
DrWeb 20130728
ESET-NOD32 20130728
Emsisoft 20130728
F-Prot 20130728
F-Secure 20130728
Fortinet 20130728
GData 20130728
Ikarus 20130728
Jiangmin 20130728
K7AntiVirus 20130726
K7GW 20130726
Kaspersky 20130728
Kingsoft 20130723
Malwarebytes 20130728
McAfee 20130728
McAfee-GW-Edition 20130728
MicroWorld-eScan 20130728
Microsoft 20130728
NANO-Antivirus 20130727
Norman 20130728
PCTools 20130728
Panda 20130728
Rising 20130726
SUPERAntiSpyware 20130727
Sophos 20130728
Symantec 20130727
TheHacker 20130726
TotalDefense 20130728
TrendMicro 20130728
TrendMicro-HouseCall 20130728
VBA32 20130727
VIPRE 20130728
ViRobot 20130727
nProtect 20130728
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © 1998-2013 KC Softwares

Publisher KC Softwares
Product KC Softwares AVIToolbox
Description KC Softwares AVIToolbox Setup
Comments This installation was built with Inno Setup.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Link date 11:22 PM 6/19/1992
Entry Point 0x00009C40
Number of sections 8
PE sections
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_ICON 15
RT_STRING 6
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL 7
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
120320

ImageVersion
6.0

ProductName
KC Softwares AVIToolbox

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
2.25

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2013:05:31 11:59:50+01:00

FileDescription
KC Softwares AVIToolbox Setup

OSVersion
1.0

FileCreateDate
2013:05:31 11:59:50+01:00

FileOS
Win32

LegalCopyright
Copyright 1998-2013 KC Softwares

MachineType
Intel 386 or later, and compatibles

CompanyName
KC Softwares

CodeSize
37888

FileSubtype
0

ProductVersionNumber
0.0.0.0

EntryPoint
0x9c40

ObjectFileType
Executable application

File identification
MD5 3ce35218fc8b0dba9522b5427558b67e
SHA1 83e22ec66a41b9f59ab14e3ed7b9e1c3ebf1ef0e
SHA256 ab56bcc94f106f221b2596e89e34303170451898afcc651cb4e27ec1684a6751
ssdeep
24576:ZQFkAvaxid8t9bP3pg1FFfb2GCBDwVfSMCrMdYcxVLnA/gDYXsi4Lv6Si:Zq5vmiabfpgbWmV7CAxVLSJEif

File size 1.2 MB ( 1267278 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (91.1%)
Win32 Executable (generic) (3.7%)
Win16/32 Executable Delphi generic (1.7%)
Generic Win/DOS Executable (1.6%)
DOS Executable Generic (1.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-16 16:44:02 UTC ( 11 months, 1 week ago )
Last submission 2013-07-28 14:36:40 UTC ( 8 months, 3 weeks ago )
File names 3ce35218fc8b0dba9522b5427558b67e.83e22ec66a41b9f59ab14e3ed7b9e1c3ebf1ef0e
avitoolbox_nork.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications