× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b6faf9dda5d56d1d332e9e2e1debd208d7813ab2d8ad51eb03ec93135c0336b9
File name: _74EF4B58104241FD94BEB19FBE37FE68
Detection ratio: 0 / 47
Analysis date: 2013-06-22 19:46:09 UTC ( 5 years, 10 months ago )
Antivirus Result Update
Yandex 20130622
AhnLab-V3 20130622
AntiVir 20130622
Antiy-AVL 20130622
Avast 20130622
AVG 20130622
BitDefender 20130622
ByteHero 20130613
CAT-QuickHeal 20130622
ClamAV 20130622
Commtouch 20130622
Comodo 20130622
DrWeb 20130622
Emsisoft 20130622
eSafe 20130620
ESET-NOD32 20130622
F-Prot 20130622
F-Secure 20130622
Fortinet 20130622
GData 20130622
Ikarus 20130622
Jiangmin 20130622
K7AntiVirus 20130621
K7GW 20130621
Kaspersky 20130622
Kingsoft 20130506
Malwarebytes 20130622
McAfee 20130622
McAfee-GW-Edition 20130622
Microsoft 20130622
eScan 20130622
NANO-Antivirus 20130622
Norman 20130622
nProtect 20130621
Panda 20130622
PCTools 20130521
Rising 20130621
Sophos AV 20130622
SUPERAntiSpyware 20130622
Symantec 20130622
TheHacker 20130622
TotalDefense 20130621
TrendMicro 20130622
TrendMicro-HouseCall 20130622
VBA32 20130621
VIPRE 20130622
ViRobot 20130622
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file.
FileVersionInfo properties
Copyright
© 2007-2008 Advanced Micro Devices, Inc.

Publisher Advanced Micro Devices, Inc.
Product AMD Desktop Component
Version 6.14.10.2001
Original name atiacmxx.dll
Internal name atiacmxx.dll
File version 6.14.10.2001
Description AMD Desktop Control Panel
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-07-23 01:36:27
Entry Point 0x000262A0
Number of sections 6
PE sections
PE imports
RegDeleteKeyA
SetSecurityDescriptorOwner
RegQueryValueExA
RegCloseKey
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
RegSetValueExA
InitializeAcl
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
SetThreadToken
RegEnumKeyExA
RegQueryInfoKeyA
RevertToSelf
GetObjectA
GetCurrentObject
DeleteDC
SelectObject
SetPixel
CreateCompatibleDC
GetPixel
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
HeapDestroy
DebugBreak
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
OpenFileMappingA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
LoadLibraryW
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
InitializeCriticalSection
LoadResource
FindClose
InterlockedDecrement
OutputDebugStringA
SetLastError
OutputDebugStringW
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
EnumSystemLocalesA
LoadLibraryExA
SetConsoleCtrlHandler
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FatalAppExitA
LeaveCriticalSection
GetModuleHandleA
SetUnhandledExceptionFilter
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
VirtualQuery
GetCurrentThreadId
GetProcAddress
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
DisableThreadLibraryCalls
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
FindFirstFileA
HeapValidate
GetTimeFormatA
CreateFileMappingA
FindNextFileA
IsValidLocale
GlobalLock
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
GetCPInfo
GetCommandLineA
GetCurrentThread
lstrcpynW
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
CloseHandle
lstrcpynA
GetACP
GetVersion
FindResourceA
GetEnvironmentStrings
IsValidCodePage
UnmapViewOfFile
VirtualFree
IsBadReadPtr
OpenEventA
VirtualAlloc
GetOEMCP
CompareStringA
Ord(161)
Ord(277)
Ord(6)
Ord(186)
Ord(7)
Ord(162)
Ord(163)
Ord(2)
RpcStringFreeA
UuidToStringA
ShellExecuteExA
DragQueryFileA
PathFileExistsA
InsertMenuA
wsprintfA
CreateMenu
LoadImageA
TranslateMessage
UnregisterClassA
DispatchMessageA
SetMenuItemBitmaps
LoadStringA
CharNextA
IsWindowUnicode
PeekMessageA
MsgWaitForMultipleObjects
GetMessageW
GetMessageA
GetSysColor
LoadBitmapA
DispatchMessageW
CoUnmarshalInterface
CreateStreamOnHGlobal
CoRegisterClassObject
CoTaskMemAlloc
CoRevokeClassObject
ReleaseStgMedium
CoTaskMemRealloc
CoCreateInstance
CoReleaseMarshalData
CoTaskMemFree
StringFromGUID2
CoMarshalInterface
PE exports
Number of PE resources by type
RT_BITMAP 3
REGISTRY 1
TYPELIB 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 5
ENGLISH CAN 2
PE resources
File identification
MD5 b3373a79cba7cbc387f49a320bc17d60
SHA1 43f54f1d74e66410a94781666f37c4ff4b52cb6e
SHA256 b6faf9dda5d56d1d332e9e2e1debd208d7813ab2d8ad51eb03ec93135c0336b9
ssdeep
12288:nmf/qfcMzVtwMDl4Vf6sJhKfzAlC4Q/xKW9nb2DTZU:nu5MJtpzVMAeWBbIU

File size 688.0 KB ( 704512 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID DirectShow filter (53.3%)
Windows ActiveX control (30.8%)
Win32 Executable MS Visual C++ (generic) (8.2%)
Windows Screen Saver (3.4%)
Win32 Dynamic Link Library (generic) (1.7%)
Tags
pedll

VirusTotal metadata
First submission 2009-11-01 21:19:20 UTC ( 9 years, 5 months ago )
Last submission 2013-06-22 19:46:09 UTC ( 5 years, 10 months ago )
File names vt-upload-HqciIM
atiacmxx.dll
_74EF4B58104241FD94BEB19FBE37FE68
atiacmxx.dll
atiacmxx.dll
atiacmxx.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!