× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b9446da5c8fce7755d7981b76b1b89c5388c1fe99e5f9d4ac74bcb4035957237
File name: ExecutionLock.EXE
Detection ratio: 0 / 54
Analysis date: 2016-08-01 09:31:59 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware 20160801
AegisLab 20160801
AhnLab-V3 20160731
Alibaba 20160801
ALYac 20160801
Antiy-AVL 20160801
Arcabit 20160801
Avast 20160801
AVG 20160801
Avira (no cloud) 20160801
AVware 20160801
Baidu 20160801
BitDefender 20160801
Bkav 20160801
CAT-QuickHeal 20160801
ClamAV 20160801
CMC 20160801
Comodo 20160801
Cyren 20160801
DrWeb 20160801
Emsisoft 20160801
ESET-NOD32 20160801
F-Prot 20160801
F-Secure 20160801
Fortinet 20160801
GData 20160801
Ikarus 20160801
Jiangmin 20160801
K7AntiVirus 20160801
K7GW 20160801
Kaspersky 20160801
Kingsoft 20160801
Malwarebytes 20160801
McAfee 20160801
McAfee-GW-Edition 20160731
Microsoft 20160801
eScan 20160801
NANO-Antivirus 20160801
nProtect 20160729
Panda 20160731
Qihoo-360 20160801
Sophos AV 20160801
SUPERAntiSpyware 20160801
Symantec 20160801
Tencent 20160801
TheHacker 20160729
TrendMicro 20160801
TrendMicro-HouseCall 20160801
VBA32 20160801
VIPRE 20160801
ViRobot 20160801
Yandex 20160731
Zillya 20160731
Zoner 20160801
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 8:43 PM 5/18/2016
Signers
[+] abylonsoft_CodeSign
Status The certificate or certificate chain is based on an untrusted root.
Issuer abylonsoft_CodeSign
Valid from 7:25 AM 8/20/2013
Valid to 7:25 AM 8/15/2033
Valid usage All
Algorithm sha1RSA
Thumbprint CC68F476D61874C54A99714B3FC72D48B9803103
Serial number 05 23 14 9B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-05-18 18:15:51
Entry Point 0x00029076
Number of sections 6
.NET details
Module Version ID 23a141e3-198f-47b8-b586-c06a23bc5ba1
PE sections
Overlays
MD5 07ef7b5b9e537cb108dae739fbee0163
File type data
Offset 1453056
Size 3944
Entropy 7.30
PE imports
SetSecurityDescriptorOwner
OpenServiceA
QueryServiceConfigA
AddAccessDeniedAce
CopySid
DuplicateTokenEx
OpenServiceW
QueryServiceConfigW
ControlService
InitializeAcl
LookupPrivilegeValueW
LsaNtStatusToWinError
DeleteService
GetAclInformation
LsaOpenPolicy
QueryServiceConfig2A
CloseServiceHandle
OpenProcessToken
LsaClose
QueryServiceStatus
AddAccessAllowedAce
IsValidSid
LsaRemoveAccountRights
LookupAccountNameW
EqualSid
SetSecurityDescriptorSacl
GetTokenInformation
SetSecurityDescriptorDacl
AddAce
EnumServicesStatusExW
GetSecurityDescriptorDacl
LsaAddAccountRights
GetUserNameA
GetLengthSid
GetAce
CreateProcessAsUserW
LogonUserW
RevertToSelf
StartServiceW
AdjustTokenPrivileges
EnumDependentServicesW
OpenSCManagerW
InitializeSecurityDescriptor
QueryServiceStatusEx
LogonUserA
ImpersonateLoggedOnUser
ChangeServiceConfigW
SetSecurityDescriptorGroup
?LRTrim@TLSTools@@SGPADPAD_N@Z
?GetLSOwnerHandle@@YGPAUTLSOwner@@PBDPAU1@PA_N_NPAD@Z
?Clear@TLSList@@UAGXXZ
XLS_BTN_CHECKUPDATE
??2TLSTree@@SGPAXI@Z
?Is64@TLSSystem@@SG_NPAUTLSOwner@@_NPAX@Z
?Release@TLSOwner@@QAGKXZ
?DYN_DoGetFrmDlgProgress@TAbylonDyn@@QAGPAXPAUTLSOwner@@PAX@Z
Ord(615)
?IsWriteProtected@TLSTools@@SG_NPAUTLSOwner@@PBD_N2@Z
Ord(925)
?LS_TRACE_LOG@@YA_NPAXHPBDZZ
?DoCopyDirs@TLSTree@@QAG_NPBD0_N@Z
?RmvFile@TLSFile@@QAG_NPBDK_N@Z
??2TLSList@@SGPAXI@Z
?SetTempPath@TLSFile@@QAG_NPBD@Z
?SetFileAttrib@TLSFile@@SG_NPAUTLSOwner@@PBDK_N@Z
XLS_INFO_NOUPDATEAVAIBLE
Ord(1949)
XLS_ASK_UPDATETOPAY
XLS_TXT_EXTENDEDVIEW
?GetRegText@TLSReg@@QAG_NQAUHKEY__@@PBD1PAEKKPAK_NK@Z
?GetLinkProperties@TShellAPI@@QAG_NPAUHWND__@@PBDPAD2222PAH@Z
?GetErrTxt@TLSTools@@SGPADKPAD@Z
XLS_TXT_ENTFERNT
?BringWindowToTop@TLSSystem@@SG_NPAUTLSOwner@@PAUHWND__@@_N@Z
?MovFile@TLSFile@@QAG_NPBD0P6G_N0KKPAX@Z_N3_N@Z
XLS_BTN_BZN_RUN
Ord(13)
?GetDomUsrNam@TLSTools@@QAG_NPAD@Z
?IsCorrectFileName@TLSFile@@SG_NPAUTLSOwner@@PAD_N_N3@Z
?DirExist@TLSFile@@SG_NPAUTLSOwner@@PBD@Z
Ord(1953)
?OnCreateDir@TLSTree@@UAG_NPBD@Z
XLS_TXT_TWITTERLINK
?RelativPath@TLSFile@@QAG_NPBDPAD@Z
?CpyFile@TLSFile@@QAG_NPBD0P6G_N0KKPAX@Z_N@Z
?IsDirectory@TLSFile@@SG_NPAUTLSOwner@@PBD_N@Z
?OnVirtualDirOut@TLSTree@@UAG_NPBD0@Z
?LSCoInitialize@TLSSystem@@SG_NPAUTLSOwner@@@Z
?APMSwitchToSystem@TLSSystem@@SGX_NPAX@Z
??3TLSTree@@SGXPAX@Z
Ord(1029)
?LSIPCGetMessage@TLSTools@@SG_NUtagMSG@@PAPAXPAK2_N@Z
?PrepareProgamParameter@TLSTools@@SG_NPAD@Z
?IsDirectory@TLSFile@@QAG_NPBD_N@Z
?FreeWCHandle@@YG_NPAX@Z
??0TLSDirFile@@QAE@PAUTLSOwner@@P6G_NPBDKPAX@Z2_N@Z
?GetDomainName@TLSTools@@SG_NPAUTLSOwner@@PAD@Z
??3TLSStringList@@SGXPAX@Z
XLS_TXT_INFO_APP_RUNONCE
?GetProcessFileFromID@TLSTools@@QAG_NKPAD0@Z
Ord(882)
?CheckAndCorrectRegKey@TLSReg@@QAG_NPAD_N@Z
Ord(1021)
Ord(983)
?IsValidHandle@TLSSystem@@SG_NPAX@Z
?GetOwnNam@TLSTools@@QAG_NPAD@Z
?OnDirIn@TLSTree@@EAG_NPBD@Z
?OnError@TLSTree@@UAG_NPBD@Z
??3TAbylonDyn@@SGXPAX@Z
XLS_TXT_BZN_EXECUTIONLOCK
?LSOLEUninitialize@TLSSystem@@SG_NPA_N@Z
?OnDirOut@TLSTree@@EAG_NPBD@Z
?FreeFileAPI@TLSFile@@QAG_NPBDPAX@Z
?SetGlobalSemaLock@TLSSystem@@SGPAXPAUTLSOwner@@PBDK@Z
?Add@TLSList@@QAG_NPAX@Z
??2TAbylonDyn@@SGPAXI@Z
?OnCount@TLSDirFile@@UAG_NPBDK@Z
?OnMemoryError@@YGXPBD@Z
?ShellCmd@TShellAPI@@QAG_NQAUHWND__@@PBD11_N22PA_N12@Z
?FileExists@TLSFile@@QAG_NPBD@Z
?OnRemoveDirs@TLSTree@@UAG_NPBDK@Z
XLS_BTN_CONTROL_STOP
XLS_TXT_AKTIVIERT
XLS_BTN_BZN_PROCESSES
?APMSwitchToUser@TLSSystem@@SG_NPAUTLSOwner@@PA_NPAPAX1K@Z
??0TLSDirX3@@QAE@PAUTLSOwner@@_N@Z
Ord(1026)
Ord(1198)
??3TLSHash@@SGXPAX@Z
?LSCreateFile@TLSFile@@SGPAXPAUTLSOwner@@PBDKKPAU_SECURITY_ATTRIBUTES@@KKPAX@Z
??2TLSHash@@SGPAXI@Z
XLS_TXT_FACEBOOKLINK
?Release@TAbylonDyn@@QAGKXZ
??3TLSList@@SGXPAX@Z
?IsProcessRunning@TLSTools@@SG_NPAUTLSOwner@@KPBDPA_N@Z
XLS_TXT_INFO_APP_USER
Ord(1134)
?ReplaceBackSlashToSlash@TLSTools@@SG_NPAD@Z
?APMGetAbylonRootPath@TAbylonDyn@@SG_NPAUTLSOwner@@PAD@Z
?IsVisualStyles@TLSSystem@@SG_NPAUTLSOwner@@@Z
?RmvCharFromString@TLSTools@@SG_NPADD@Z
?LS_TRACE_INIT@@YGPAVTLSLog@@PAUTLSOwner@@PAXHPBD_N@Z
?LSIPCFreeMessage@TLSTools@@SG_NPAE@Z
?IsUserLoggedOn@TLSTools@@QAG_NPA_N@Z
Ord(1028)
?ProcessMsg@TLSTools@@SG_NPAUHWND__@@II@Z
?DYN_DoShowAbout@TAbylonDyn@@SG_NPAUTLSOwner@@PAXPBD_N@Z
?OnVirtualCreateDir@TLSTree@@UAG_NPBDPAD@Z
?IsReadOnlyFlag@TLSFile@@SG_NPAUTLSOwner@@PBD@Z
?IsUserLoggedOn@TLSTools@@SG_NPAUTLSOwner@@PA_N@Z
XLS_IsTrialOK
?GetRegSubVals@TLSReg@@QAG_NQAUHKEY__@@PBDPAUtag_TLSLngFil@@PAK_NK@Z
??1TLSList@@UAE@XZ
??2TLSStringList@@SGPAXI@Z
?GetTmpPth@TLSFile@@QAG_NPAUTLSOwner@@PAD_N@Z
?DYN_DoSetFileSecurity@TAbylonDyn@@SG_NPAUTLSOwner@@PAUtag_TLSSelFil@@KPBD_N_NPAUTDynInf@@@Z
?LS_TRACE_CLOSE@@YG_NPAUTLSOwner@@@Z
Ord(960)
?CountFiles@TLSDirFile@@QAGKPBD0PA_K_N@Z
XLS_TXT_DEAKTIVIERT
Ord(1027)
XLS_TXT_ALLUSERS
?GetWCHandle@@YG_NPAPAXPAX@Z
XLS_BTN_BZN_AUTOSTART
??1TAbylonDyn@@UAE@XZ
?OnFile@TLSDirFile@@EAG_NPBD@Z
?IsVistaBased@TLSSystem@@SG_NPAUTLSOwner@@@Z
?StdErrorMsg@TLSError@@SG_NPAUTLSOwner@@PAUHWND__@@_N2PBD@Z
?DYN_DoFreeFrmDlgProgress@TAbylonDyn@@QAG_NPAX@Z
XLS_TXT_INFO_APP_SERCVICE
?ReadFile@TLSFile@@QAG_NPBDPAPAXPAKK_N3@Z
XLS_INFO_APPBLOCKER
XLS_BTN_BZN_SERVICE
Ord(19)
Ord(1)
?DYN_DoSaveFileAs@TAbylonDyn@@SG_NPAUTLSOwner@@PAXPADPBDPA_N_N@Z
Ord(1956)
?GetProcessIDFromFile@TLSTools@@QAGKPBDPA_N@Z
?SetRegText@TLSReg@@QAG_NQAUHKEY__@@PBD1QAEKK_NK@Z
?IsApplicationRun@TLSTools@@SG_NPBD@Z
?LSOLEInitialize@TLSSystem@@SG_NPAUTLSOwner@@@Z
?OnCopyDirs@TLSTree@@UAG_NPBDK@Z
?Release@TLSList@@QAGKXZ
?OnAskShouldDelete@TLSTree@@UAG_NPBD@Z
Ord(18)
?OnDirIn@TLSDirFile@@EAG_NPBD@Z
?ClearLSError@@YGXPAUTLSErrHandler@@@Z
??0TLSTree@@QAE@PAUTLSOwner@@_N111@Z
XLS_ASK_UPDATE
?Clear@TLSStringList@@UAGXXZ
??2TLSDirFile@@SGPAXI@Z
?Release@TLSTools@@QAGKXZ
Ord(1024)
??0TLSStringList@@QAE@PAUTLSOwner@@@Z
Ord(26)
?Release@TLSHash@@QAGKXZ
?GetWindowsOS@TLSTools@@SGKPAUTLSOwner@@@Z
?Release@TLSFile@@QAGKXZ
?WalkTree@TLSDirX@@IAG_NUTDirWalk@@_N@Z
Ord(1141)
?CreateDir@TLSFile@@QAG_NPBD@Z
?IsExtension@TLSTools@@SG_NPBD0@Z
?OnVirtualDirIn@TLSTree@@UAG_NPBDPAD@Z
?GetUsrNam@TLSTools@@QAG_NPAD@Z
XLS_BTN_CONTROL_START
?Is64BitTask@TLSSystem@@SG_NPAUTLSOwner@@@Z
?DelRegKey@TLSReg@@QAG_NQAUHKEY__@@PBD_NK@Z
?DirExist@TLSFile@@QAG_NPBD@Z
?RemovePathSlash@TLSTools@@SG_NPAD@Z
?FileSize@TLSFile@@QAG_KPBDPAX@Z
?ReplaceExtension@TLSTools@@SG_NPBDPAD@Z
?SetDefError@@YGXPAUTLSErrHandler@@_NPBDHH2@Z
XLS_TXT_INFO_APP_AUTOSTART
?GetString@TLSStringList@@QAGPADK@Z
?OnFile@TLSTree@@EAG_NPBD@Z
Ord(1025)
?Release@TLSStringList@@QAGKXZ
?DYN_Init@TAbylonDyn@@SG_NPAUTDynInf@@_N@Z
?DatTimStrNow@TLSTools@@SGPADQADK@Z
Ord(472)
?Text2Bin@TLSTools@@SG_NPBDKPAEPAK@Z
Ord(1038)
?DownloadFile@TLSFile@@QAG_NPBD0H0PA_K@Z
XLS_INFO_APPBLOCKER_WARNING
Ord(3)
?Bin2Text@TLSTools@@SG_NPBEKPADPAK@Z
Ord(1947)
?IsSubStringInString@TLSTools@@SG_NPBD0PAK_N2@Z
?GetFileTimeString@TLSFile@@QAG_NPBU_FILETIME@@PAD@Z
XLS_ASK_SYSTEM_CHANGE_WARNING
??1TLSTree@@UAE@XZ
?IsNTBasedSystem@TLSTools@@SG_NPAUTLSOwner@@@Z
?GetCallParam@TLSTools@@SG_NPBDPAD1@Z
?AddRef@TLSOwner@@QAGKXZ
?SplitPath@TLSTools@@SG_NPBDPAD11@Z
?HashDataHex@@YG_NPAXPBEKPADPAKI@Z
?OnAskDeleteFile@TLSTree@@UAG_NPBD@Z
??1TLSDirFile@@UAE@XZ
Ord(947)
XLS_TXT_INFO_APP_EXECUTED
XLS_BTN_SUPPORT
?GetCount@TLSList@@QAGKXZ
?IsXP@TLSSystem@@SG_NPAUTLSOwner@@@Z
?LSSleep@TLSTools@@SGXK@Z
?Release@TShellAPI@@QAGKXZ
?AddString@TLSStringList@@QAG_NPBD@Z
Ord(967)
?GetFolderItems@TLSFile@@QAG_NPBDPAUtag_TLSLngFil@@PAK0@Z
?IsSystemUser@TLSTools@@SG_NPAUTLSOwner@@@Z
??1TLSStringList@@UAE@XZ
Ord(1022)
?StdBootAskMsg@TLSError@@SG_NPAUTLSOwner@@PAUHWND__@@_NPBD3@Z
?AddRef@TLSStringList@@QAGKXZ
XLS_IsRegOK
?DYN_DoInputYesNoAll@TAbylonDyn@@SG?AW4tag_TLSEvent@@PAUTLSOwner@@PAXPBD2PA_N1_N@Z
XLS_TXT_INFO_APP_RUN
?Release@TLSReg@@QAGKXZ
?RmvExtension@TLSTools@@SG_NPAD@Z
?GetFilAttr@TLSFile@@QAG_NPBDPAUTLSFilAttr@@@Z
Ord(24)
Ord(1023)
??1TLSDirX3@@UAE@XZ
?StdHinweisMsg@TLSError@@SG_NPAUTLSOwner@@PAUHWND__@@PBD22@Z
??3TLSDirFile@@SGXPAX@Z
XLS_BTN_LIZENZ_NOW
?WaitForThread@TLSTools@@SG_NPAUTLSOwner@@PAXPA_N_N@Z
?RmvGlobalSemaLock@TLSSystem@@SG_NPAUTLSOwner@@PAX@Z
??0TAbylonDyn@@QAE@PAUTLSOwner@@PBD_N@Z
??1TLSHash@@UAE@XZ
XLS_BTN_UPDATEVIEW
?GetHWNDFromProcessFile@TLSTools@@SGPAUHWND__@@PAUTLSOwner@@PBD@Z
Ord(602)
?LSCoUninitialize@TLSSystem@@SG_NPA_N@Z
XLS_BTN_BZN_RUNONCE
?DYN_IsAdminUser@TAbylonDyn@@SG_NPAUTLSOwner@@PBD1_N@Z
?FileExists@TLSFile@@SG_NPAUTLSOwner@@PBD@Z
?StdAskMsg@TLSError@@SG_NPAUTLSOwner@@PAUHWND__@@PBD2222PA_N22PAUTLSErrorInf@@@Z
?Get@TLSList@@QAGPAXK@Z
?OnDirOut@TLSDirFile@@EAG_NPBD@Z
?ReplaceSlashToBackSlash@TLSTools@@SG_NPAD@Z
?OnVirtualCopy@TLSTree@@UAG_NPBD0K@Z
?GetShellFolder@TShellAPI@@QAG_NPADK@Z
?HashFileTxt@TLSHash@@QAG_NPBDPADPAK1212@Z
?IsAppRun@TLSSystem@@SG_NPAUTLSOwner@@@Z
??0TLSList@@QAE@PAUTLSOwner@@@Z
?StartProcess@TLSTools@@QAG_NPBD_NI0PAPAX_N1@Z
??0TLSHash@@QAE@PAUTLSOwner@@@Z
?Ansi2UniCod@TLSTools@@SG_NPBDPA_W@Z
Ord(624)
?DelRegVal@TLSReg@@QAG_NQAUHKEY__@@PBD1_NK@Z
FLS_GETABYVER
Ord(48)
__stricmp
Ord(35)
?APMGetAbylonRootPath@TAbylonReg@@SG_NPAUTLSOwner@@PADPA_N@Z
??1TAbylonTools@@UAE@XZ
?APMSetVistaAppCompatFlags@TAbylonReg@@SG_NPAUTLSOwner@@PBD@Z
?CheckAndAddCtrlSer@TAbylonTools@@QAG_N_N@Z
??2TAbylonTools@@SGPAXI@Z
?DoGetUserConfigXML@TAbylonReg@@SG_NPAUTLSOwner@@PAUTUserConfigXML@@PBD_N@Z
?DoCloseLSNotifyThread@@YG_NPAUTLSOwner@@PAK@Z
?DoStartLSNotifyThread@@YG_NPAUTLSOwner@@P6G_N0PAKPAX@Z21@Z
?IsCTRLServiceStarted@TAbylonReg@@SG_NPAUTLSOwner@@@Z
?DoCallAsAdmin@TAbylonReg@@SG_NPAUTLSOwner@@PBD1_N@Z
?APMAddRootCertificate@TKeyMgmt@@SG_NPAUTLSOwner@@PBDPAUHKEY__@@_N@Z
?DoExecutePipeCall@TAbylonReg@@SG_NPAUTLSOwner@@PBUtag_TLSLngFil@@K_N@Z
?DoAPMInitApp@TAbylonReg@@SG_NPAUTLSOwner@@@Z
?APMSetAbylonRootPath@TAbylonReg@@SG_NPAUTLSOwner@@PBD@Z
?GetRegAccess@TAbylonReg@@SGKPAUTLSOwner@@PA_NQAUHKEY__@@@Z
?DYN_DoInputDlgRegistry@TAbylonTools@@SG_NPAUTLSOwner@@PAX_N@Z
?APMGetWindowsRect@TAbylonReg@@SG_NPAUTLSOwner@@PBDPAK2222@Z
?APMSetRegVal@TAbylonReg@@SG_NPAUTLSOwner@@PBD11KQAUHKEY__@@@Z
?APMGetRegVal@TAbylonReg@@SG_NPAUTLSOwner@@PADPBD2KQAUHKEY__@@@Z
??3TAbylonTools@@SGXPAX@Z
?DoAPMCopyModulesToSystem32@TAbylonReg@@SG_NPAUTLSOwner@@PBD1@Z
?DoStopCTRLService@TAbylonReg@@SG_NPAUTLSOwner@@@Z
?IsCTRLServiceInstalled@TAbylonReg@@SG_NPAUTLSOwner@@@Z
?DoSetLSNotifyEvent@@YG_NPAUTLSOwner@@K_N@Z
?DoCheckAndSetVersion@TAbylonReg@@SG_NPAUTLSOwner@@_N@Z
?APMCloseAllApp@TAbylonReg@@SG_NPAUTLSOwner@@PAUHWND__@@@Z
?DoStartCTRLService@TAbylonReg@@SG_NPAUTLSOwner@@@Z
?APMSetWindowsRect@TAbylonReg@@SG_NPAUTLSOwner@@PBDKKKKK@Z
?APMOpenHomepage@TAbylonReg@@SG_NPAUTLSOwner@@PBD_N@Z
??0TAbylonTools@@QAE@PAUTLSOwner@@_N@Z
?CheckAndRmvCtrlSer@TAbylonTools@@QAG_NXZ
GetLastError
HeapFree
IsProcessorFeaturePresent
DosDateTimeToFileTime
TerminateThread
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
GlobalUnlock
GetModuleFileNameA
LoadLibraryA
GetLocalTime
GetCurrentProcess
FileTimeToDosDateTime
CompareFileTime
GetPrivateProfileStringA
GetLocaleInfoA
LocalAlloc
OpenProcess
SetFileTime
GetWindowsDirectoryA
UnhandledExceptionFilter
InterlockedDecrement
GetStartupInfoW
GlobalLock
GetProcessHeap
GetFileTime
GetShortPathNameA
CreateThread
FindFirstFileA
SetUnhandledExceptionFilter
CloseHandle
GetSystemTimeAsFileTime
HeapReAlloc
SetHandleInformation
GetModuleHandleW
FileTimeToLocalFileTime
GetExitCodeProcess
LocalFree
TerminateProcess
GetCPInfoExA
GlobalAlloc
LocalFileTimeToFileTime
FindClose
GetLongPathNameA
Sleep
SetThreadPriority
GetTickCount
GetCurrentThreadId
GetProcAddress
GetCurrentProcessId
InterlockedIncrement
?__ExceptionPtrCopy@@YAXPAXPBX@Z
?_Xout_of_range@std@@YAXPBD@Z
?__ExceptionPtrDestroy@@YAXPAX@Z
?_Xbad_alloc@std@@YAXXZ
?_Xlength_error@std@@YAXPBD@Z
DragAcceptFiles
DragQueryFileW
DragFinish
DragQueryFileA
CharLowerA
CharUpperA
IsWindow
SetUserObjectSecurity
MessageBoxA
wsprintfW
ShowWindow
GetProcessWindowStation
GetUserObjectSecurity
GetThreadDesktop
PostMessageW
UnloadUserProfile
LoadUserProfileW
_purecall
__CxxQueryExceptionSize
__CxxDetectRethrow
__CxxRegisterExceptionObject
_CxxThrowException
memmove
__std_exception_copy
_except_handler4_common
__CxxExceptionFilter
__FrameUnwindFilter
strrchr
__std_exception_destroy
__CxxUnregisterExceptionObject
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
malloc
_callnewh
free
_cexit
_register_onexit_function
_seh_filter_dll
_invalid_parameter_noinfo_noreturn
terminate
_execute_onexit_table
abort
exit
_initialize_onexit_table
_initialize_narrow_environment
_crt_at_quick_exit
_crt_atexit
fwrite
fopen
fclose
__stdio_common_vsprintf
strcat_s
memset
strncpy
_stricmp
_CorExeMain
DoDragDrop
Number of PE resources by type
RT_ICON 12
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
GERMAN 13
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:05:18 19:15:51+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
164352

LinkerVersion
14.0

EntryPoint
0x29076

InitializedDataSize
1291776

SubsystemVersion
5.1

ImageVersion
0.0

OSVersion
5.1

UninitializedDataSize
0

File identification
MD5 352040360a88c292a87086a874fb6341
SHA1 48e8712543814372db56090076e2081bc86eedf8
SHA256 b9446da5c8fce7755d7981b76b1b89c5388c1fe99e5f9d4ac74bcb4035957237
ssdeep
24576:inb07VwoRVsx7e4559mzlOcWeSn2S4559H:inFj5ffcS2z5fH

authentihash 6ed35bbfaecce0ef514483de8fd9f3cddf6d9a552b09a0c5d1adeb193c6354de
imphash 1c7726fc915f9c0838459a6a70ba35c3
File size 1.4 MB ( 1457000 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe assembly signed overlay

VirusTotal metadata
First submission 2016-08-01 09:31:59 UTC ( 2 years, 6 months ago )
Last submission 2016-08-01 09:31:59 UTC ( 2 years, 6 months ago )
File names ExecutionLock.EXE
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!