× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: df0276104ea0ed9521dcf86980308e2f7fedd2de8f37865c5fbcae526cf9513b
File name: MultiMonHome.exe
Detection ratio: 0 / 57
Analysis date: 2016-12-12 17:45:08 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20161212
AegisLab 20161212
AhnLab-V3 20161212
Alibaba 20161212
ALYac 20161212
Antiy-AVL 20161212
Arcabit 20161212
Avast 20161212
AVG 20161212
Avira (no cloud) 20161212
AVware 20161212
Baidu 20161207
BitDefender 20161212
Bkav 20161212
CAT-QuickHeal 20161212
ClamAV 20161212
CMC 20161212
Comodo 20161212
CrowdStrike Falcon (ML) 20161024
Cyren 20161212
DrWeb 20161212
Emsisoft 20161212
ESET-NOD32 20161212
F-Prot 20161212
F-Secure 20161212
Fortinet 20161212
GData 20161212
Ikarus 20161212
Sophos ML 20161202
Jiangmin 20161212
K7AntiVirus 20161212
K7GW 20161212
Kaspersky 20161212
Kingsoft 20161212
Malwarebytes 20161212
McAfee 20161212
McAfee-GW-Edition 20161212
Microsoft 20161212
eScan 20161212
NANO-Antivirus 20161212
nProtect 20161212
Panda 20161212
Qihoo-360 20161212
Rising 20161212
Sophos AV 20161212
SUPERAntiSpyware 20161212
Symantec 20161212
Tencent 20161212
TheHacker 20161130
TotalDefense 20161212
TrendMicro 20161212
TrendMicro-HouseCall 20161212
Trustlook 20161212
VBA32 20161212
VIPRE 20161212
ViRobot 20161212
WhiteArmor 20161212
Yandex 20161212
Zillya 20161210
Zoner 20161212
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product MultiMon (Home Edition)
File version
Description MultiMon (Home Edition) Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signers
[+] Daniel Terhell
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 2/3/2016
Valid to 12:59 AM 2/3/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint A45891B6B0E25EF8FD418C22D2E87EBC1B6F28AE
Serial number 00 B3 94 17 E9 30 9A 4B 02 82 8D A5 05 ED 36 78 BD
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE?
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Packers identified
F-PROT INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-06 14:39:04
Entry Point 0x000117DC
Number of sections 8
PE sections
Overlays
MD5 83a29076b910fd2c2267c52f18b85a9b
File type data
Offset 131584
Size 1719960
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetSystemDirectoryW
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 8
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
64000

EntryPoint
0x117dc

MIMEType
application/octet-stream

TimeStamp
2016:04:06 15:39:04+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

FileDescription
MultiMon (Home Edition) Setup

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Resplendence Software Projects Sp.

CodeSize
66560

ProductName
MultiMon (Home Edition)

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 bca626486d151bbe9af170865d59888c
SHA1 cd51984872c8b60cb9d4c196360ea3a0d3317435
SHA256 df0276104ea0ed9521dcf86980308e2f7fedd2de8f37865c5fbcae526cf9513b
ssdeep
49152:qqpm/UgpFiHa3SUfsp2dEa1VNsbnoo/v12sO:5kt46CEs0rz/

authentihash 43e54431797e804238fc3f36cd532c641267e8bfa6504e1f663e7e0217d2854d
imphash 20dd26497880c05caed9305b3c8b9109
File size 1.8 MB ( 1851544 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (45.2%)
Win32 Dynamic Link Library (generic) (20.9%)
Win32 Executable (generic) (14.3%)
Win16/32 Executable Delphi generic (6.6%)
Generic Win/DOS Executable (6.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-12-12 17:45:08 UTC ( 7 months, 1 week ago )
Last submission 2017-06-13 19:08:51 UTC ( 1 month, 1 week ago )
File names MultiMonHome.exe
multimonlite.exe
MultiMonHome.exe
MultiMonHome(3.00).exe
MultiMonHome.exe
955680
MultiMonHome.exe
MultiMonHome (1).exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
MultiMonHome.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Runtime DLLs