× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e60005c19a68384404429ca4f0f6af3f2c25861c656690de2bbdc7b1d895bc9c
File name: arpegi.exe
Detection ratio: 0 / 71
Analysis date: 2019-04-21 22:50:03 UTC ( 4 weeks, 1 day ago ) View latest
Antivirus Result Update
Acronis 20190419
Ad-Aware 20190421
AegisLab 20190421
AhnLab-V3 20190421
Alibaba 20190402
ALYac 20190421
Antiy-AVL 20190419
Arcabit 20190422
Avast 20190421
Avast-Mobile 20190415
AVG 20190421
Avira (no cloud) 20190421
Babable 20180918
Baidu 20190318
BitDefender 20190421
Bkav 20190420
CAT-QuickHeal 20190421
ClamAV 20190421
CMC 20190321
Comodo 20190421
CrowdStrike Falcon (ML) 20190212
Cybereason 20190417
Cylance 20190422
Cyren 20190421
DrWeb 20190421
eGambit 20190422
Emsisoft 20190421
Endgame 20190403
ESET-NOD32 20190421
F-Prot 20190422
F-Secure 20190421
FireEye 20190421
Fortinet 20190421
GData 20190422
Ikarus 20190421
Sophos ML 20190313
Jiangmin 20190421
K7AntiVirus 20190421
K7GW 20190421
Kaspersky 20190421
Kingsoft 20190422
Malwarebytes 20190421
MAX 20190422
McAfee 20190421
McAfee-GW-Edition 20190421
Microsoft 20190421
eScan 20190421
NANO-Antivirus 20190421
Palo Alto Networks (Known Signatures) 20190422
Panda 20190421
Qihoo-360 20190422
Rising 20190421
SentinelOne (Static ML) 20190420
Sophos AV 20190421
SUPERAntiSpyware 20190418
Symantec 20190421
Symantec Mobile Insight 20190418
TACHYON 20190421
Tencent 20190422
TheHacker 20190421
TotalDefense 20190416
Trapmine 20190325
TrendMicro 20190421
TrendMicro-HouseCall 20190421
Trustlook 20190422
VBA32 20190419
ViRobot 20190421
Webroot 20190422
Yandex 20190419
Zillya 20190419
ZoneAlarm by Check Point 20190421
Zoner 20190421
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
AnalogX, LLC. All rights reserved.

Product Arpeggiator Installer
Original name arpegi.exe
Description AnalogX Arpeggiator Installer
Signature verification Signed file, verified signature
Signing date 3:16 AM 5/24/2009
Signers
[+] AnalogX, LLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Go Daddy Secure Certification Authority
Valid from 06:07 PM 05/21/2009
Valid to 04:58 PM 05/21/2010
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 11CD73F5EE4BDD37E241EE5C9055011498C82AFD
Serial number 00 AE 55 A5 F8 0E E0
[+] Go Daddy Secure Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 02:54 AM 11/16/2006
Valid to 02:54 AM 11/16/2026
Valid usage All
Algorithm sha1RSA
Thumbprint 7C4656C3061F7F4C0D67B319A855F60EBC11FC44
Serial number 03 01
[+] Go Daddy Class 2 Certification Authority
Status Valid
Issuer Go Daddy Class 2 Certification Authority
Valid from 05:06 PM 06/29/2004
Valid to 05:06 PM 06/29/2034
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 2796BAE63F1801E277261BA0D77770028F20EEE4
Serial number 00
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 12:00 AM 06/15/2007
Valid to 11:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 01:00 AM 12/04/2003
Valid to 12:59 AM 12/04/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 01/01/1997
Valid to 12:59 AM 01/01/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-05-24 01:13:39
Entry Point 0x00012357
Number of sections 4
PE sections
Overlays
MD5 8ddfcc34c3802d47be8904ffc2b37b4e
File type data
Offset 158208
Size 201472
Entropy 7.99
PE imports
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
InitCommonControlsEx
AddFontResourceA
DeleteDC
RemoveFontResourceA
SelectObject
BitBlt
GdiFlush
CreateDIBSection
CreateCompatibleDC
DeleteObject
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
InitializeCriticalSection
AllocConsole
TlsGetValue
SetLastError
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
FindClose
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
SetUnhandledExceptionFilter
GetCurrentProcess
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetProcAddress
GetProcessHeap
CompareStringW
FindFirstFileA
CompareStringA
GetTimeZoneInformation
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentProcessId
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetConsoleTitleA
CloseHandle
GetACP
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
GetMessageA
GetParent
UpdateWindow
EndDialog
BeginPaint
EnumWindows
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetSysColorBrush
GetSystemMetrics
IsWindow
GetWindowRect
DispatchMessageA
EndPaint
SetDlgItemTextA
GetUpdateRect
ShowWindowAsync
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowLongA
TranslateMessage
DialogBoxParamA
RegisterClassExA
SetWindowTextA
DestroyIcon
SendDlgItemMessageA
SendMessageA
GetWindowTextA
GetClientRect
GetDlgItem
CreateDialogParamA
InvalidateRect
GetWindowLongA
CreateWindowExA
LoadCursorA
LoadIconA
GetDesktopWindow
GetClassNameA
SetForegroundWindow
UnregisterClassA
DestroyWindow
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 5
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
AnalogX Arpeggiator Installer

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
34816

EntryPoint
0x12357

OriginalFileName
arpegi.exe

MIMEType
application/octet-stream

LegalCopyright
AnalogX, LLC. All rights reserved.

TimeStamp
2009:05:24 03:13:39+02:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AnalogX, LLC

CodeSize
122368

ProductName
Arpeggiator Installer

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 52326560ba5a4b5a8c1f129c073a8995
SHA1 e84fbe2c907f7cc9362b0d60063aaa98153c4d68
SHA256 e60005c19a68384404429ca4f0f6af3f2c25861c656690de2bbdc7b1d895bc9c
ssdeep
6144:CefdDoDLhnowxc2tDvJQTG0jp0jQ9p6c789Xtsp+VkvgZ6JuDOYkkLd+eRE:7RoDLvO2tD2zpd8hSp+mgLO0Ld+9

authentihash c9098a31096dcc9ee2c16a44ccd94ec17299d2f61b7daaacd3946574b264a377
imphash 56ed6084c5ecd8784553be57502cda76
File size 351.3 KB ( 359680 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2010-01-31 10:38:10 UTC ( 9 years, 3 months ago )
Last submission 2018-05-22 08:01:02 UTC ( 12 months ago )
File names arpegi.exe
122543
E60005C19A68384404429CA4F0F6AF3F2C25861C656690DE2BBDC7B1D895BC9C
e60005c19a68384404429ca4f0f6af3f2c25861c656690de2bbdc7b1d895bc9c
arpegi.exe
arpegi.exe
1340476277-arpegi.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Shell commands
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.