× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e09f78e60b5be25a6af0381b71a90b8aa625f2ea42ecd427638edf2abb7130f0
File name: DOSBox.exe
Detection ratio: 0 / 46
Analysis date: 2013-08-22 19:21:38 UTC ( 8 months ago ) View latest
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20130822
Agnitum 20130822
AhnLab-V3 20130822
AntiVir 20130822
Antiy-AVL 20130822
Avast 20130822
BitDefender 20130822
ByteHero 20130814
CAT-QuickHeal 20130822
ClamAV 20130822
Commtouch 20130822
Comodo 20130822
DrWeb 20130822
ESET-NOD32 20130822
Emsisoft 20130822
F-Prot 20130822
F-Secure 20130822
Fortinet 20130822
GData 20130822
Ikarus 20130822
Jiangmin 20130822
K7AntiVirus 20130822
K7GW 20130822
Kaspersky 20130822
Kingsoft 20130723
Malwarebytes 20130822
McAfee 20130822
McAfee-GW-Edition 20130822
MicroWorld-eScan 20130822
Microsoft 20130822
NANO-Antivirus 20130822
Norman 20130822
PCTools 20130822
Panda 20130822
Rising 20130822
SUPERAntiSpyware 20130822
Sophos 20130822
Symantec 20130822
TheHacker 20130822
TotalDefense 20130822
TrendMicro 20130822
TrendMicro-HouseCall 20130822
VBA32 20130822
VIPRE 20130822
ViRobot 20130822
nProtect 20130822
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © 2002-2010 DOSBox Team

Publisher DOSBox Team
Product DOSBox DOS Emulator
Original name dosbox.exe
Internal name DOSBox
File version 0, 74, 0, 0
Description DOSBox DOS Emulator
Comments © 2002-2010 DOSBox Team, published under GNU GPL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-05-12 10:04:38
Link date 11:04 AM 5/12/2010
Entry Point 0x00001210
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
DeviceIoControl
ReadFile
GetStartupInfoA
GetLastError
SetEvent
FreeLibrary
ExitProcess
TlsAlloc
GetVersionExA
GetModuleFileNameA
LoadLibraryA
GetAtomNameA
GetVolumeInformationA
SetConsoleCtrlHandler
WaitForSingleObject
AddAtomA
FindAtomA
ClearCommBreak
TlsGetValue
GetCommandLineA
GetProcAddress
SetCommTimeouts
GetCommModemStatus
SetFilePointer
CreateSemaphoreA
TlsFree
GetModuleHandleA
FindFirstFileA
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
SetConsoleTitleA
CloseHandle
FreeConsole
FindNextFileA
ClearCommError
EscapeCommFunction
SetPriorityClass
GetDriveTypeA
LocalFree
AllocConsole
ReleaseSemaphore
ResetEvent
SetCommState
GetCommState
CreateEventA
FindClose
InterlockedDecrement
Sleep
FormatMessageA
TlsSetValue
CreateFileA
VirtualAlloc
SetLastError
InterlockedIncrement
glVertex2f
glTexCoord2f
glTexSubImage2D
glClearColor
glDisable
glCallList
glBegin
glBindTexture
glTexImage2D
glGetString
glEnable
glClear
glLoadIdentity
wglGetProcAddress
glDeleteTextures
glShadeModel
glViewport
glEnableClientState
glNewList
glGenLists
glGenTextures
glTexParameteri
glMatrixMode
glEnd
glGetIntegerv
glIsList
glEndList
glDeleteLists
SDL_CDName
SDL_JoystickGetAxis
SDL_ShowCursor
SDL_ReadLE32
SDL_LockYUVOverlay
SDL_CDOpen
SDL_JoystickNumHats
SDL_ReadBE32
SDL_JoystickNumButtons
SDL_OpenAudio
SDL_CreateRGBSurfaceFrom
SDL_DisplayYUVOverlay
SDL_GetKeyName
SDL_JoystickNumAxes
SDL_UpdateRects
SDL_SetVideoMode
SDL_LockSurface
SDL_strlcat
SDL_FillRect
SDL_GL_SetAttribute
SDL_WaitEvent
SDL_UnlockYUVOverlay
SDL_CDStop
SDL_PollEvent
SDL_VideoModeOK
SDL_SetError
SDL_Flip
SDL_RWFromFile
SDL_UpperBlit
SDL_CDPlay
SDL_MapRGB
SDL_FreeYUVOverlay
SDL_SetPalette
SDL_InitSubSystem
SDL_GetModState
SDL_CreateRGBSurface
SDL_UnlockAudio
SDL_CDEject
SDL_SetModuleHandle
SDL_WM_GrabInput
SDL_NumJoysticks
SDL_WM_SetIcon
SDL_JoystickUpdate
SDL_strlcpy
SDL_ThreadID
SDL_CDStatus
SDL_CDClose
SDL_mutexP
SDL_JoystickEventState
SDL_Delay
SDL_GetError
SDL_WM_SetCaption
SDL_GetTicks
SDL_SetAlpha
SDL_mutexV
SDL_GL_SwapBuffers
SDL_UnlockSurface
SDL_JoystickGetButton
SDL_JoystickGetHat
SDL_JoystickClose
SDL_CreateMutex
SDL_CDPause
SDL_PauseAudio
SDL_LockAudio
SDL_JoystickName
SDL_Init
SDL_CreateYUVOverlay
SDL_Quit
SDL_DestroyMutex
SDL_FreeSurface
SDL_VideoDriverName
SDL_JoystickOpen
SDL_CDResume
SDL_CDNumDrives
SDL_QuitSubSystem
SDLNet_ResolveHost
SDLNet_CheckSockets
SDLNet_TCP_Send
SDLNet_TCP_GetPeerAddress
SDLNet_UDP_Open
SDLNet_DelSocket
SDLNet_TCP_Accept
SDLNet_TCP_Close
SDLNet_UDP_Recv
SDLNet_UDP_Close
SDLNet_TCP_Recv
SDLNet_FreeSocketSet
SDLNet_AllocSocketSet
SDLNet_TCP_Open
SDLNet_UDP_Send
SDLNet_AddSocket
SDLNet_Init
SDLNet_UDP_Bind
SHGetSpecialFolderPathA
GetKeyboardLayout
wsprintfA
GetSystemMetrics
GetKeyboardLayoutNameA
midiOutLongMsg
midiOutShortMsg
midiOutGetNumDevs
midiOutPrepareHeader
midiOutOpen
mciGetErrorStringA
midiOutUnprepareHeader
midiOutGetDevCapsA
mciSendCommandA
midiOutClose
getpeername
getsockname
__p__fmode
fseek
__p__environ
fclose
_fstat
fflush
strtol
fputc
strtok
strtod
fwrite
fputs
realloc
_setjmp
localtime
ceil
_strupr
strrchr
_write
strcoll
memcpy
strstr
memmove
signal
remove
sin
freopen
strcmp
memchr
strncmp
_assert
fgetc
memset
strcat
_stricmp
atexit
_setmode
fgets
strchr
fopen
ftell
exit
sprintf
_unlink
fmod
strcspn
gmtime
free
ungetc
__getmainargs
_execlp
_stat
cos
_vsnprintf
putchar
_read
strcpy
__mb_cur_max
acos
strftime
_iob
rand
toupper
_putenv
raise
setlocale
pow
_getcwd
strxfrm
ldexp
_lseek
_access
printf
_rmdir
strncpy
_cexit
log
puts
qsort
_onexit
putc
memcmp
_isctype
_pctype
getenv
atoi
strspn
_strnicmp
vsprintf
rename
malloc
sscanf
fread
abort
fprintf
tan
strlen
strncat
_fdopen
_errno
getc
sqrt
_strdup
_ctype
_mkdir
longjmp
tolower
atan
strpbrk
calloc
setbuf
_chsize
floor
exp
time
setvbuf
__set_app_type
PE exports
Number of PE resources by type
RT_ICON 5
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
ExifTool file metadata
SubsystemVersion
4.0

Comments
2002-2010 DOSBox Team, published under GNU GPL

InitializedDataSize
3726336

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
0.74.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
DOSBox DOS Emulator

CharacterSet
Unicode

LinkerVersion
2.56

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Copyright 2002-2010 DOSBox Team

FileVersion
0, 74, 0, 0

TimeStamp
2010:05:12 11:04:38+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DOSBox

FileAccessDate
2014:04:13 03:19:03+01:00

ProductVersion
0, 74, 0, 0

UninitializedDataSize
30231552

OSVersion
4.0

FileCreateDate
2014:04:13 03:19:03+01:00

OriginalFilename
dosbox.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
DOSBox Team

CodeSize
3013632

ProductName
DOSBox DOS Emulator

ProductVersionNumber
0.74.0.0

EntryPoint
0x1210

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 33294e0a8b970b8de45ce446e2add783
SHA1 c30c133f95547c6d91907c17073945ed93a580e4
SHA256 e09f78e60b5be25a6af0381b71a90b8aa625f2ea42ecd427638edf2abb7130f0
ssdeep
49152:wBuV+Pi+HXGT4RSQR13bK3cFXzF5quE4OyQveR+86yd8cbjABtAQo3SNTdd6YUq:jUiYPSQR13bCcBquE4OyUeR5jAJo3S/

imphash a072b350a585657aacf318262e0d2071
File size 3.6 MB ( 3727360 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.7%)
Win32 Executable MS Visual C++ (generic) (26.6%)
Win64 Executable (generic) (23.6%)
Win32 Dynamic Link Library (generic) (5.6%)
Win32 Executable (generic) (3.8%)
Tags
peexe

VirusTotal metadata
First submission 2010-06-17 21:04:11 UTC ( 3 years, 10 months ago )
Last submission 2014-04-13 02:18:31 UTC ( 1 week, 1 day ago )
File names file-3423181_exe
33294e0a8b970b8de45ce446e2add783
smona131945322160383319879
smona132492182124584956465
smona132042031938932587547
smona132233292262443747146
START.EXE
smona131878197052137572543
smona131824381517192595256
DK_test.exe
Start.exe
DosBox.exe
33294e0a8b970b8de45ce446e2add783
START.exe
smona132447140059291604253
smona130719358082461213647
smona132782344182334828145
smona132546053810186043379
smona130684230249167271222
smona131993476017192311775
smona132357349981189047022
DOSBox.exe
smona132147436293639798559
DOSBox
AlbionStart.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!