× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d2fb5ef7828894a00d2e7d90cf75e8fae22deca7a7dcdb7c752abd139cbb23e4
File name: testv.php?l=ing2.class
Detection ratio: 5 / 66
Analysis date: 2018-04-05 22:41:30 UTC ( 10 months, 3 weeks ago ) View latest
Antivirus Result Update
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20170201
Fortinet W32/Zbot.PKJO!tr 20180405
Kaspersky UDS:DangerousObject.Multi.Generic 20180405
Palo Alto Networks (Known Signatures) generic.ml 20180405
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180405
Ad-Aware 20180405
AegisLab 20180405
AhnLab-V3 20180405
Alibaba 20180404
ALYac 20180405
Antiy-AVL 20180405
Arcabit 20180405
Avast 20180405
Avast-Mobile 20180405
AVG 20180405
Avira (no cloud) 20180405
AVware 20180405
Baidu 20180404
BitDefender 20180405
Bkav 20180405
CAT-QuickHeal 20180405
ClamAV 20180405
CMC 20180405
Comodo 20180405
Cybereason 20180225
Cylance 20180405
Cyren 20180405
DrWeb 20180405
eGambit 20180405
Emsisoft 20180405
Endgame 20180403
ESET-NOD32 20180405
F-Prot 20180405
F-Secure 20180405
GData 20180405
Ikarus 20180405
Sophos ML 20180121
Jiangmin 20180405
K7AntiVirus 20180404
K7GW 20180405
Kingsoft 20180405
Malwarebytes 20180405
MAX 20180405
McAfee 20180405
McAfee-GW-Edition 20180405
Microsoft 20180405
eScan 20180405
NANO-Antivirus 20180405
nProtect 20180405
Panda 20180405
Qihoo-360 20180405
Rising 20180405
SentinelOne (Static ML) 20180225
Sophos AV 20180405
SUPERAntiSpyware 20180405
Symantec 20180405
Symantec Mobile Insight 20180401
Tencent 20180405
TheHacker 20180404
TrendMicro 20180405
TrendMicro-HouseCall 20180405
Trustlook 20180405
VBA32 20180405
VIPRE 20180405
ViRobot 20180405
WhiteArmor 20180405
Yandex 20180405
Zillya 20180405
Zoner 20180405
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2001 ExtensionEngine Hunt. All rights reserved.

Product Act Compare
Internal name Act Compare
File version 0, 5, 7143, 5802
Description Act Compare
Comments qua
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-04-05 11:22:13
Entry Point 0x001542C3
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
ImageList_GetIconSize
GetFileTitleW
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
EndDoc
SetPaletteEntries
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
Escape
ScaleViewportExtEx
SetWindowExtEx
SetViewportExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
CreateFontIndirectW
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
SetAbortProc
FrameRgn
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
SelectPalette
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
DeleteObject
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetSystemPaletteEntries
StartPage
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
IntersectClipRect
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
SelectObject
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
AbortDoc
SetPolyFillMode
CopyMetaFileW
Ellipse
CreateSolidBrush
Polyline
DPtoLP
StartDocW
CreateCompatibleBitmap
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
FileTimeToSystemTime
DeactivateActCtx
WaitForSingleObject
EncodePointer
GetFileAttributesW
DuplicateHandle
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
LoadLibraryExW
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
InterlockedExchange
WriteFile
FormatMessageW
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
GetFullPathNameW
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GlobalFindAtomW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
QueryPerformanceFrequency
HeapSetInformation
EnumSystemLocalesA
SetThreadPriority
ActivateActCtx
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
CreateSemaphoreW
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
VirtualQuery
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
CopyFileW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
LCMapStringW
GetStartupInfoW
GetUserDefaultLCID
GetTempFileNameW
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
FindFirstFileW
IsValidLocale
lstrcmpW
GetProcAddress
GlobalAlloc
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
SetFilePointer
ReadFile
SetUnhandledExceptionFilter
GlobalFlags
CloseHandle
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
IsValidCodePage
HeapCreate
FindResourceExW
Sleep
IsBadReadPtr
VirtualAlloc
TransparentBlt
AlphaBlend
LresultFromObject
CreateStdAccessibleObject
AccessibleObjectFromWindow
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VariantInit
DragQueryFileW
DragFinish
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHBrowseForFolderW
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
PathFindExtensionW
PathFindFileNameW
RedrawWindow
GetForegroundWindow
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
CharUpperW
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
SetScrollPos
IsWindow
GrayStringW
EndPaint
WindowFromPoint
CharUpperBuffW
SendMessageW
SetActiveWindow
GetDC
GetAsyncKeyState
MapDialogRect
GetDlgCtrlID
DefFrameProcW
IsDialogMessageW
GetClassInfoW
GetMenuItemInfoW
DefWindowProcW
SetMenuDefaultItem
MoveWindow
GetNextDlgTabItem
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
TrackPopupMenu
ClientToScreen
GetActiveWindow
MapVirtualKeyExW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
GetTopWindow
DrawTextW
CopyImage
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
EqualRect
SetClassLongW
EnumWindows
GetWindowTextW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetMenuState
GetCursorPos
PeekMessageW
TranslateMDISysAccel
InsertMenuItemW
SetWindowPlacement
CopyAcceleratorTableW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
RegisterClassW
GetIconInfo
SetParent
SetClipboardData
ScrollWindow
IsZoomed
GetWindowPlacement
DestroyWindow
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
GetScrollPos
DrawFocusRect
SetTimer
GetKeyboardLayout
FillRect
MonitorFromPoint
CreateAcceleratorTableW
GetSysColorBrush
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
GetMenuStringW
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
IsIconic
BeginPaint
OffsetRect
DefMDIChildProcW
ReleaseCapture
CopyIcon
KillTimer
MapVirtualKeyW
CheckMenuRadioItem
MapWindowPoints
GetClassInfoExW
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
DrawIcon
IntersectRect
RemovePropW
SendDlgItemMessageW
PostMessageW
InvalidateRect
GetScrollInfo
DrawTextExW
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
GetMessageTime
BeginDeferWindowPos
SetWindowTextW
CreateMenu
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ScreenToClient
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
DestroyAcceleratorTable
CheckDlgButton
ValidateRect
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
NotifyWinEvent
OpenClipboard
EmptyClipboard
CreateDialogIndirectParamW
ReleaseDC
GetScrollRange
SetLayeredWindowAttributes
EndDialog
ModifyMenuW
HideCaret
CopyRect
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
MessageBoxW
GetMenu
UnhookWindowsHookEx
SetRectEmpty
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
EnumDisplayMonitors
IsWindowVisible
WinHelpW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
DispatchMessageW
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
ShowOwnedPopups
CallWindowProcW
GetClassNameW
GetClientRect
MonitorFromWindow
IsRectEmpty
IsMenu
GetFocus
EnableWindow
CloseClipboard
TranslateAcceleratorW
SetMenu
SetCursor
PlaySoundW
DocumentPropertiesW
AddPrinterDriverExW
WaitForPrinterChange
EnumPortsW
ReadPrinter
AddMonitorW
DeletePortW
GetPrinterDataExW
WritePrinter
GetPrinterDataW
SetFormW
AddJobW
ResetPrinterW
OpenPrinterW
DeletePrinter
DeletePrinterDataExW
GetPrinterW
ConfigurePortW
AddPrinterConnectionW
EnumPrinterDriversW
EnumPrinterDataExW
DeleteMonitorW
DeletePrintProvidorW
EnumFormsW
EnumPrinterDataW
XcvDataW
GetPrintProcessorDirectoryW
DeletePrinterConnectionW
SetPortW
GetPrinterDriverW
StartPagePrinter
EnumPrintersW
SetPrinterDataExW
DeletePrinterDataW
SetJobW
EnumMonitorsW
GetJobW
ScheduleJob
FlushPrinter
AddPrintProcessorW
DeletePrinterDriverW
GetFormW
AddPrinterDriverW
EnumJobsW
AbortPrinter
EndPagePrinter
AddPortW
DeleteFormW
EnumPrinterKeyW
AddPrintProvidorW
PrinterMessageBoxW
EnumPrintProcessorsW
DeletePrinterDriverExW
DeletePrintProcessorW
DeletePrinterKeyW
ClosePrinter
GetPrinterDriverDirectoryW
StartDocPrinterW
FindClosePrinterChangeNotification
SetPrinterDataW
EnumPrintProcessorDatatypesW
EndDocPrinter
AddPrinterW
AddFormW
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleLockRunning
CoUninitialize
OleTranslateAccelerator
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
CreateStreamOnHGlobal
IsAccelerator
RegisterDragDrop
RevokeDragDrop
OleGetClipboard
OleDuplicateData
CLSIDFromString
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
OleCreateMenuDescriptor
ReleaseStgMedium
CoTaskMemFree
SfcGetNextProtectedFile
Number of PE resources by type
RT_ICON 9
RT_DIALOG 7
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 20
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

Comments
qua

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.5.7143.5802

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Act Compare

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
1187328

EntryPoint
0x1542c3

MIMEType
application/octet-stream

LegalCopyright
Copyright 2001 ExtensionEngine Hunt. All rights reserved.

FileVersion
0, 5, 7143, 5802

TimeStamp
2011:04:05 13:22:13+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
Act Compare

ProductVersion
0, 5, 7143, 5802

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
ExtensionEngine Hunt

CodeSize
1564160

ProductName
Act Compare

ProductVersionNumber
0.5.7143.5802

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 93dd751039942e422bb8c75888455b61
SHA1 ca77ab5b520752c4e94c057606bead69989e0c22
SHA256 d2fb5ef7828894a00d2e7d90cf75e8fae22deca7a7dcdb7c752abd139cbb23e4
ssdeep
49152:4PP8bhe51xUELu7TSkYvDtTbA2fya8XHi5vmYS+pUav4aZVdOqpl1HC:Moe5oEMSkYJTbA2qa8XHi5vmPMVZTOqp

authentihash e3a41abc9cbd2ab7ecc5abddbc1a2d443efcfea380a2d0e779147203b06d366d
imphash 37336553557e6b0fa067af9476640c03
File size 2.6 MB ( 2689024 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-04-05 19:09:47 UTC ( 10 months, 3 weeks ago )
Last submission 2018-05-25 07:33:03 UTC ( 9 months ago )
File names testv.php?l=ing2.class
.
ing1.class
ing2.class
apssents.exe
ing5.class
apssents.exe
Act Compare
apssents.exe
apssents.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Code injections in the following processes
Runtime DLLs