× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b63dfdbfbb79f88688c63ee119215ebcdf6f65d8c54011fd6a6d246dbf301725
File name: MAPI32.DLL
Detection ratio: 0 / 64
Analysis date: 2017-07-28 16:43:52 UTC ( 6 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20170728
AegisLab 20170728
AhnLab-V3 20170728
Alibaba 20170728
ALYac 20170728
Antiy-AVL 20170728
Arcabit 20170728
Avast 20170728
AVG 20170728
Avira (no cloud) 20170728
AVware 20170728
Baidu 20170728
BitDefender 20170728
Bkav 20170728
CAT-QuickHeal 20170728
ClamAV 20170728
CMC 20170728
Comodo 20170728
CrowdStrike Falcon (ML) 20170710
Cylance 20170728
Cyren 20170728
DrWeb 20170728
Emsisoft 20170728
Endgame 20170721
ESET-NOD32 20170728
F-Prot 20170728
F-Secure 20170728
Fortinet 20170728
GData 20170728
Ikarus 20170728
Sophos ML 20170607
Jiangmin 20170728
K7AntiVirus 20170728
K7GW 20170728
Kaspersky 20170728
Kingsoft 20170728
Malwarebytes 20170728
MAX 20170728
McAfee 20170728
McAfee-GW-Edition 20170728
Microsoft 20170728
eScan 20170728
NANO-Antivirus 20170728
nProtect 20170728
Palo Alto Networks (Known Signatures) 20170728
Panda 20170728
Qihoo-360 20170728
Rising 20170728
SentinelOne (Static ML) 20170718
Sophos AV 20170728
SUPERAntiSpyware 20170728
Symantec 20170728
Symantec Mobile Insight 20170728
Tencent 20170728
TheHacker 20170727
TotalDefense 20170728
TrendMicro 20170728
TrendMicro-HouseCall 20170728
Trustlook 20170728
VBA32 20170728
VIPRE 20170728
ViRobot 20170728
Webroot 20170728
Yandex 20170728
Zillya 20170728
ZoneAlarm by Check Point 20170728
Zoner 20170728
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows command line subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© 2006 Microsoft Corporation. All rights reserved.

Product MAPI32
Original name MAPI32.DLL
Internal name MAPI32.DLL
File version 12.0.6670.5002
Description Extended MAPI 1.0 for Windows NT
Signature verification Signed file, verified signature
Signing date 9:23 PM 11/30/2012
Signers
[+] Microsoft Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Code Signing PCA
Valid from 10:42 PM 9/4/2012
Valid to 10:42 PM 3/4/2013
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint AC1FD0922A4A2A6E5779ACDD628747C28394B0B9
Serial number 33 00 00 00 9D 1E 8D 27 AE B8 F3 D8 38 00 01 00 00 00 9D
[+] Microsoft Code Signing PCA
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 11:19 PM 8/31/2010
Valid to 11:29 PM 8/31/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 3CAF9BA2DB5570CAF76942FF99101B993888E257
Serial number 61 33 26 1A 00 00 00 00 00 31
[+] Microsoft Root Certificate Authority
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 12:19 AM 5/10/2001
Valid to 12:28 AM 5/10/2021
Valid usage All
Algorithm sha1RSA
Thumbprint CDD4EEAE6000AC7F40C3802C171E30148030C072
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
Counter signers
[+] Microsoft Time-Stamp Service
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Time-Stamp PCA
Valid from 10:12 PM 9/4/2012
Valid to 10:12 PM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 2F497C556F94E32731CF86ADD8629C9867C35A24
Serial number 33 00 00 00 2B 39 32 48 C1 B2 C9 48 F3 00 00 00 00 00 2B
[+] Microsoft Time-Stamp PCA
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 1:53 PM 4/3/2007
Valid to 2:03 PM 4/3/2021
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 375FCB825C3DC3752A02E34EB70993B4997191EF
Serial number 61 16 68 34 00 00 00 00 00 1C
[+] Microsoft Root Certificate Authority
Status Valid
Issuer Microsoft Root Certificate Authority
Valid from 12:19 AM 5/10/2001
Valid to 12:28 AM 5/10/2021
Valid usage All
Algorithm sha1RSA
Thumbrint CDD4EEAE6000AC7F40C3802C171E30148030C072
Serial number 79 AD 16 A1 4A A0 A5 AD 4C 73 58 F4 07 13 2E 65
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-11-30 20:22:31
Entry Point 0x00001C30
Number of sections 4
PE sections
Overlays
MD5 3fae657e2923d5bafcb9e19c11431068
File type data
Offset 3013120
Size 6768
Entropy 7.44
PE imports
RegCreateKeyExW
RegDeleteKeyA
DestroyPrivateObjectSecurity
RegCreateKeyExA
CredUnmarshalCredentialW
RegEnumValueA
CopySid
RegQueryValueExA
AccessCheck
TraceEvent
GetTraceEnableFlags
ControlTraceW
RegEnumKeyW
RegDeleteKeyW
RegCloseKey
RegisterTraceGuidsW
RegQueryValueExW
GetSecurityDescriptorLength
CreatePrivateObjectSecurity
GetNamedSecurityInfoW
RegFlushKey
CryptContextAddRef
EqualSid
OpenProcessToken
RegSetValueExA
DeregisterEventSource
RegOpenKeyExW
RegisterEventSourceA
RegEnumKeyA
ImpersonateLoggedOnUser
EnableTrace
GetTokenInformation
DuplicateTokenEx
CryptReleaseContext
GetUserNameA
StartTraceW
IsValidSid
UnregisterTraceGuids
RegQueryInfoKeyW
RegEnumKeyExW
GetTraceEnableLevel
OpenThreadToken
RegOpenKeyExA
CredReadW
RegQueryValueA
RegSetValueA
GetLengthSid
CredWriteW
RegEnumKeyExA
RegQueryInfoKeyA
RegisterEventSourceW
CryptAcquireContextW
RegEnumValueW
RevertToSelf
RegSetValueExW
FreeSid
CredFree
ReportEventW
AllocateAndInitializeSid
SystemFunction040
SystemFunction041
RegDeleteValueA
CryptSetProvParam
SetKernelObjectSecurity
GetTraceLoggerHandle
SetMapMode
TextOutW
CreateFontIndirectW
PatBlt
CreatePen
SaveDC
TextOutA
CreateFontIndirectA
GetTextMetricsA
PtVisible
GetClipBox
GetBitmapBits
Rectangle
GetDeviceCaps
SetViewportExtEx
LineTo
GetTextExtentExPointA
DeleteDC
RestoreDC
SetBkMode
GetTextExtentExPointW
SelectObject
GetObjectW
BitBlt
GetCharWidthA
SetTextColor
GetTextExtentPointW
GetObjectA
RectVisible
ExtTextOutW
CreateBitmap
MoveToEx
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
ExtTextOutA
GetMetaFileBitsEx
SetTextAlign
CreateCompatibleDC
Escape
GetBkColor
ScaleViewportExtEx
OffsetViewportOrgEx
DeleteObject
CloseMetaFile
CreateMetaFileA
CreateSolidBrush
DeleteMetaFile
GetTextExtentPointA
SetBkColor
SetWindowExtEx
GetTextExtentPoint32W
CreateCompatibleBitmap
EnumFontFamiliesExA
GetTempFileNameA
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
LoadLibraryA
GetDriveTypeA
HeapDestroy
SetFileTime
SetUnhandledExceptionFilter
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
CompareFileTime
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
ExpandEnvironmentStringsA
VerifyVersionInfoA
SetErrorMode
lstrcpyA
FindResourceExA
GetFileTime
IsDBCSLeadByteEx
GetTempPathA
GetCPInfo
LoadLibraryW
GetSystemTimeAsFileTime
InterlockedExchange
WriteFile
IsBadHugeReadPtr
GlobalMemoryStatusEx
HeapReAlloc
GetFullPathNameA
GetExitCodeProcess
LocalFree
FormatMessageW
GetThreadPriority
GetTimeZoneInformation
LoadResource
GetStringTypeExW
FindClose
TlsGetValue
GetProfileIntA
SetFileAttributesW
OutputDebugStringA
WritePrivateProfileStringW
SetLastError
GetSystemTime
OpenThread
InitializeCriticalSection
GetUserDefaultLangID
GetModuleFileNameW
TryEnterCriticalSection
GlobalFindAtomA
HeapAlloc
GetVersionExA
RemoveDirectoryA
GlobalHandle
GetFileAttributesW
VerSetConditionMask
GetVolumeInformationA
LoadLibraryExA
GetPrivateProfileStringA
SetThreadPriority
GetSystemDefaultLCID
LoadLibraryExW
MultiByteToWideChar
GetPrivateProfileStringW
CreateMutexA
GetModuleHandleA
GetFullPathNameW
MoveFileExW
GetSystemDirectoryW
GlobalAddAtomA
CreateSemaphoreW
MulDiv
UnlockFile
GetSystemDirectoryA
WaitForMultipleObjectsEx
TerminateProcess
SearchPathW
GetModuleHandleExW
SetCurrentDirectoryW
VirtualQuery
SearchPathA
SetEndOfFile
GetVersion
GetProcAddress
GetModuleHandleExA
SleepEx
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
lstrcmpiA
RaiseException
SetEvent
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
FreeLibrary
GlobalSize
GetDateFormatA
SystemTimeToFileTime
GetWindowsDirectoryW
GetFileSize
OpenProcess
GetPrivateProfileIntA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetDateFormatW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
CompareStringW
GetDllDirectoryW
GlobalReAlloc
ExpandEnvironmentStringsW
lstrcmpA
FindFirstFileA
LocalSize
GetProfileStringA
CompareStringA
GetComputerNameExW
CreateFileMappingA
FindNextFileA
DuplicateHandle
WaitForMultipleObjects
GlobalAlloc
GetPrivateProfileSectionW
GetTempPathW
GetModuleFileNameA
CreateEventW
CreateFileW
CreateEventA
CopyFileA
TlsSetValue
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
GetLastError
LocalReAlloc
DosDateTimeToFileTime
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
FindResourceW
GetProcessTimes
GlobalUnlock
lstrcpyW
IsDBCSLeadByte
WaitForSingleObjectEx
lstrlenW
GetShortPathNameA
HeapCompact
LockFile
FileTimeToLocalFileTime
SizeofResource
LocalFileTimeToFileTime
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
ProcessIdToSessionId
GetCommandLineW
GetCurrentDirectoryA
HeapSize
IsDebuggerPresent
InterlockedCompareExchange
GetCurrentThread
GetSystemDefaultLangID
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
PulseEvent
DeleteAtom
CloseHandle
GetTimeFormatA
SetDllDirectoryW
GetACP
GlobalLock
GetModuleHandleW
FreeResource
IsBadStringPtrW
GetFileAttributesExW
OpenSemaphoreW
GetLongPathNameW
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
OpenEventW
SetCurrentDirectoryA
VirtualFree
Sleep
IsBadReadPtr
IsBadStringPtrA
GetFileAttributesExA
IsBadCodePtr
HeapValidate
FindResourceA
VirtualAlloc
ResetEvent
wcsftime
_expand
fclose
_time64
strtoul
wcstok_s
strtol
_mbsrchr
fwrite
_strupr_s
_wcsupr_s
_encode_pointer
isspace
_wstrdate_s
_ismbcdigit
_ismbblead
_makepath_s
iswctype
memmove_s
??3@YAXPAX@Z
_mbschr
wcsncmp
_resetstkoflw
memcpy
vswprintf_s
strstr
memmove
remove
_encoded_null
iswspace
strncmp
swscanf_s
_splitpath_s
memset
wcschr
_msize
_stricmp
swprintf_s
__clean_type_info_names_internal
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
strchr
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??_V@YAXPAX@Z
strrchr
fopen_s
_initterm_e
_mbsspn
_crt_debugger_hook
free
_strnicmp
_except_handler4_common
_vsnprintf
iswdigit
_initterm
iswalnum
rand
realloc
_getcwd
__dllonexit
_setjmp3
toupper
wcscpy_s
_vsnwprintf
_mbscmp
_onexit
fwprintf_s
_mbsicmp
srand
qsort
_wcsnicmp
_wstrtime_s
atoi
atol
_setmbcp
_strlwr_s
_mbsnbicmp
_wsplitpath_s
_mbsnbcmp
_malloc_crt
malloc
wcstoul
fread
_waccess
abort
fprintf
isdigit
_amsg_exit
?terminate@@YAXXZ
_ismbcspace
_lock
vsprintf_s
_strdup
towlower
_wfopen_s
_decode_pointer
wcsrchr
_wcsicmp
longjmp
_localtime64_s
_unlock
_adjust_fdiv
fwprintf
__CppXcptFilter
wcsstr
_wtol
_wtoi
IUnknown_Release_Proxy
CStdStubBuffer_CountRefs
RpcNetworkIsProtseqValidW
IUnknown_QueryInterface_Proxy
NdrStubCall2
CStdStubBuffer_Disconnect
RpcStringBindingParseW
NdrDllCanUnloadNow
RpcBindingToStringBindingW
RpcMgmtSetComTimeout
IUnknown_AddRef_Proxy
RpcStringBindingComposeW
NdrCStdStubBuffer_Release
RpcBindingFree
CStdStubBuffer_Connect
MesDecodeBufferHandleCreate
RpcBindingReset
NdrDllGetClassObject
NdrOleFree
RpcStringFreeW
NdrOleAllocate
NdrClientCall2
RpcSsDestroyClientContext
MesEncodeIncrementalHandleCreate
CStdStubBuffer_DebugServerQueryInterface
RpcCancelThread
CStdStubBuffer_Invoke
RpcRaiseException
RpcBindingSetOption
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
RpcBindingSetAuthInfoExW
CStdStubBuffer_DebugServerRelease
NdrCStdStubBuffer2_Release
RpcBindingFromStringBindingW
UuidCreate
RpcMgmtSetCancelTimeout
wnsprintfW
StrDupW
StrDupA
StrCmpNA
StrChrW
RedrawWindow
SetDlgItemTextA
GetMessagePos
SendNotifyMessageA
DestroyWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
GetNextDlgTabItem
IsWindow
DispatchMessageA
EndPaint
ScrollWindowEx
GetWindowLongA
SetMenuItemInfoA
CharUpperBuffA
GrayStringA
DrawIcon
CharUpperBuffW
SetMenuItemInfoW
SendMessageW
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
ShowWindow
GetWindowTextLengthA
SendMessageA
UnregisterClassW
GetClassInfoW
DrawTextW
SetScrollPos
InSendMessage
CharPrevExA
CallNextHookEx
LoadAcceleratorsA
IsClipboardFormatAvailable
GetSysColor
LoadImageW
GetTopWindow
OpenClipboard
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
GetQueueStatus
PtInRect
GetMessageA
GetClassInfoExW
UpdateWindow
SetPropA
GetPropW
EnumWindows
CheckRadioButton
GetDialogBaseUnits
SetClassLongA
GetPropA
SetPropW
ValidateRect
CharToOemBuffA
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
CharUpperW
GetDlgItemTextA
PeekMessageA
ChildWindowFromPoint
IsCharAlphaA
TranslateMessage
IsWindowEnabled
GetWindow
GetDlgItemInt
RegisterClassW
CharNextExA
LoadStringA
SetParent
GetMenuStringW
CharLowerA
IsZoomed
GetWindowPlacement
LoadStringW
SetWindowLongW
GetKeyboardLayoutList
DrawMenuBar
IsIconic
RegisterClassA
TabbedTextOutA
DrawFocusRect
SetTimer
GetActiveWindow
GetKeyboardLayout
FillRect
EnumThreadWindows
CopyRect
DeferWindowPos
IsWindowUnicode
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsDialogMessageA
MapWindowPoints
CharPrevA
DrawEdge
PostMessageA
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
KillTimer
LoadImageA
GetMonitorInfoA
TrackMouseEvent
RegisterWindowMessageA
DefWindowProcA
GetClipboardData
GetParent
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
SetWindowLongA
PostMessageW
InvalidateRect
CheckDlgButton
CreateDialogParamW
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
SetClipboardData
GetLastActivePopup
GetMessageTime
SetWindowTextW
CreateWindowExA
GetDlgItem
SetCursor
BringWindowToTop
ClientToScreen
GetClassLongA
InsertMenuA
GetAsyncKeyState
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
DialogBoxIndirectParamW
GetMenuItemCount
IsDlgButtonChecked
BeginDeferWindowPos
GetMenuState
IsDialogMessageW
LoadIconW
GetMenuItemID
InsertMenuW
SetForegroundWindow
NotifyWinEvent
DialogBoxIndirectParamA
GetMenuItemInfoW
EmptyClipboard
DrawTextA
GetScrollRange
EndDialog
ModifyMenuW
CharNextA
CreateDialogIndirectParamA
FindWindowA
ScreenToClient
CreatePopupMenu
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
MessageBoxW
AppendMenuA
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
DialogBoxParamW
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
MsgWaitForMultipleObjectsEx
DispatchMessageW
SetDlgItemTextW
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
RealGetWindowClassW
IsWindowVisible
WinHelpW
GetDesktopWindow
WinHelpA
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
MonitorFromRect
ModifyMenuA
CallWindowProcW
IsCharUpperA
TranslateAcceleratorA
DefDlgProcA
SetFocus
CreateIcon
CallWindowProcA
GetClassNameA
GetFocus
RegisterClassExW
CloseClipboard
GetDlgItemTextW
IsCharAlphaNumericA
DefDlgProcW
GetClientRect
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoUninitialize
CoUnmarshalHresult
CoMarshalInterThreadInterfaceInStream
CoMarshalHresult
DoDragDrop
CoRegisterMessageFilter
StgCreateDocfile
StringFromGUID2
CreateStreamOnHGlobal
RevokeDragDrop
ReleaseStgMedium
CoCreateGuid
ReadClassStm
CoGetInterfaceAndReleaseStream
StringFromCLSID
CoDisconnectObject
HWND_UserUnmarshal
StgCreateDocfileOnILockBytes
CLSIDFromString
CoTaskMemRealloc
CreateILockBytesOnHGlobal
CoGetClassObject
ProgIDFromCLSID
CoWaitForMultipleHandles
CoInitialize
OleInitialize
CoLockObjectExternal
StringFromIID
CoCreateInstance
StgOpenStorage
HWND_UserFree
CoCreateFreeThreadedMarshaler
CoUnmarshalInterface
CoTaskMemAlloc
WriteClassStm
CreateOleAdviseHolder
CoFileTimeToDosDateTime
CLSIDFromProgID
CoRevokeClassObject
HWND_UserMarshal
CoDosDateTimeToFileTime
HWND_UserSize
CoGetMalloc
CoReleaseMarshalData
CoTaskMemFree
RegisterDragDrop
CoMarshalInterface
PE exports
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
294912

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
12.0.6670.5002

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Extended MAPI 1.0 for Windows NT

CharacterSet
Windows, Latin1

LinkerVersion
8.0

EntryPoint
0x1c30

FileType
Win32 DLL

OriginalFileName
MAPI32.DLL

MIMEType
application/octet-stream

LegalCopyright
2006 Microsoft Corporation. All rights reserved.

LegalTrademarks2
Windows is a registered trademark of Microsoft Corporation.

FileVersion
12.0.6670.5002

LegalTrademarks1
Microsoft is a registered trademark of Microsoft Corporation.

TimeStamp
2012:11:30 21:22:31+01:00

LegalTrademarks3
Microsoft Office Outlook is a registered trademark of Microsoft Corporation.

PEType
PE32

InternalName
MAPI32.DLL

ProductVersion
12.0.6670.5002

SubsystemVersion
5.1

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
2783232

ProductName
MAPI32

ProductVersionNumber
12.0.6670.0

FileTypeExtension
dll

ObjectFileType
Unknown

CarbonBlack CarbonBlack acts as a surveillance camera for computers
File identification
MD5 b6fcab5092be93ba44daddf8c42e1295
SHA1 b84021361d71223a55435dc0d1b95feac29eda56
SHA256 b63dfdbfbb79f88688c63ee119215ebcdf6f65d8c54011fd6a6d246dbf301725
ssdeep
49152:+oOY5sTTAPguXQQmZrOHO3GRXsGIBsgGBQvrhoAv4qHQwcg07y5TdOgvDz:+oqTcI9rOug8GIBsgGSzhoAv4sQdgnJ5

authentihash 2e18a5a5c3ea4c63fbba74ffac56b9eb11f24f820ee230ad3e94fe6895d07e54
imphash b606d2c0d3f70016230bfee94e242240
File size 2.9 MB ( 3019888 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (console) Intel 80386 32-bit

TrID Windows ActiveX control (74.5%)
Win32 Executable MS Visual C++ (generic) (19.9%)
Win32 Executable (generic) (2.8%)
Generic Win/DOS Executable (1.2%)
DOS Executable Generic (1.2%)
Tags
pedll signed overlay

VirusTotal metadata
First submission 2013-06-21 07:34:22 UTC ( 4 years, 8 months ago )
Last submission 2016-06-03 20:12:15 UTC ( 1 year, 8 months ago )
File names sbs_ve_ambr_20150907225210.044_ 268167
sbs_ve_ambr_20150901001236.114_ 65091
sbs_ve_ambr_20151112163248.919_ 136416
sbs_ve_ambr_20151105215549.499_ 95249
sbs_ve_ambr_20151028234203.114_ 87134
sbs_ve_ambr_20150625210907.775_ 6315
sbs_ve_ambr_20151026221827.934_ 1519361
sbs_ve_ambr_20151113170114.082_ 480713
sbs_ve_ambr_20150611194858.537_ 2501581
sbs_ve_ambr_20150707221432.562_ 180528
sbs_ve_ambr_20150614204501.945_ 108071
sbs_ve_ambr_20150818154033.371_ 192
sbs_ve_ambr_20150903195944.746_ 2476262
sbs_ve_ambr_20150905231827.922_ 43828
sbs_ve_ambr_20160118015512.816_ 29756
sbs_ve_ambr_20151002221329.794_ 16887
sbs_ve_ambr_20150608203824.359_ 122427
sbs_ve_ambr_20161006021507.094_ 136770
sbs_ve_ambr_20151106181247.438_ 291076
sbs_ve_ambr_20160007014920.734_ 41126
sbs_ve_ambr_20150815225428.140_ 610068
sbs_ve_ambr_20151001012723.465_ 26501
sbs_ve_ambr_20160126204842.113_ 89890
sbs_ve_ambr_20150623223514.724_ 373870
sbs_ve_ambr_20150609221022.296_ 326040
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!