× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ea87066337daa4e15581de83a038255fb1225bda02375a67a889b5a16d807ac1
File name: rustup-init.exe
Detection ratio: 0 / 68
Analysis date: 2019-02-19 23:01:43 UTC ( 1 month ago )
Antivirus Result Update
Acronis 20190219
Ad-Aware 20190219
AegisLab 20190219
AhnLab-V3 20190219
Alibaba 20180921
ALYac 20190219
Antiy-AVL 20190219
Arcabit 20190219
Avast 20190219
Avast-Mobile 20190219
AVG 20190219
Avira (no cloud) 20190219
Babable 20180918
Baidu 20190215
BitDefender 20190219
Bkav 20190219
CAT-QuickHeal 20190219
ClamAV 20190219
CMC 20190219
Comodo 20190219
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190219
Cyren 20190219
DrWeb 20190219
eGambit 20190219
Emsisoft 20190219
Endgame 20190215
ESET-NOD32 20190219
F-Prot 20190219
F-Secure 20190219
Fortinet 20190219
GData 20190219
Ikarus 20190219
Sophos ML 20181128
Jiangmin 20190219
K7AntiVirus 20190219
K7GW 20190219
Kaspersky 20190219
Kingsoft 20190219
Malwarebytes 20190219
MAX 20190219
McAfee 20190219
McAfee-GW-Edition 20190219
Microsoft 20190219
eScan 20190219
NANO-Antivirus 20190219
Palo Alto Networks (Known Signatures) 20190219
Panda 20190219
Qihoo-360 20190219
Rising 20190219
SentinelOne (Static ML) 20190203
Sophos AV 20190219
SUPERAntiSpyware 20190213
Symantec 20190219
Symantec Mobile Insight 20190207
TACHYON 20190219
Tencent 20190219
TheHacker 20190217
Trapmine 20190123
TrendMicro-HouseCall 20190219
Trustlook 20190219
VBA32 20190219
VIPRE 20190218
ViRobot 20190219
Webroot 20190219
Yandex 20190219
Zillya 20190219
ZoneAlarm by Check Point 20190219
Zoner 20190219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-06 20:33:37
Entry Point 0x0043664F
Number of sections 4
PE sections
PE imports
RegDeleteValueW
CryptReleaseContext
RegCloseKey
CryptAcquireContextA
OpenProcessToken
RegSetValueExW
CryptGetHashParam
RegEnumKeyExW
RegOpenKeyExW
CryptGenRandom
SystemFunction036
CryptHashData
RegQueryValueExW
CryptDestroyHash
CryptCreateHash
CertEnumCertificatesInStore
CertGetEnhancedKeyUsage
CertGetNameStringA
CryptStringToBinaryA
CertDuplicateStore
CertDuplicateCertificateChain
CertCloseStore
CertOpenStore
CryptQueryObject
CertDuplicateCertificateContext
CertAddCertificateContextToStore
CertFindCertificateInStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertFreeCertificateContext
CertGetCertificateChain
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
GetStdHandle
GetDriveTypeW
CancelIoEx
VerifyVersionInfoA
FileTimeToSystemTime
GetOverlappedResult
WaitForSingleObject
CreateIoCompletionPort
CreateJobObjectW
EncodePointer
SetConsoleCursorPosition
SetInformationJobObject
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
ExpandEnvironmentStringsA
GetFileInformationByHandle
InitializeSListHead
SetStdHandle
LoadLibraryA
WideCharToMultiByte
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
FormatMessageW
AddVectoredExceptionHandler
FreeLibraryAndExitThread
GetTimeZoneInformation
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetQueuedCompletionStatusEx
PeekNamedPipe
DeviceIoControl
InitializeCriticalSection
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
InitializeCriticalSectionEx
VerSetConditionMask
FreeLibrary
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetFullPathNameW
CreateThread
SetEnvironmentVariableW
MoveFileExW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ExitThread
DecodePointer
TerminateProcess
GetModuleHandleExW
SetEndOfFile
GetCurrentThreadId
SleepEx
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
Process32First
LoadLibraryW
GetOEMCP
QueryPerformanceCounter
SetConsoleTextAttribute
TlsAlloc
FlushFileBuffers
FillConsoleOutputCharacterW
RtlUnwind
GetSystemDirectoryA
Process32Next
SetHandleInformation
OpenProcess
GetStartupInfoW
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
GetProcessHeap
AssignProcessToJobObject
GetFileSizeEx
GetModuleFileNameW
FreeEnvironmentStringsW
FindNextFileW
CreateHardLinkW
FindFirstFileW
DuplicateHandle
FindFirstFileExW
GetProcAddress
ReadConsoleW
GetFileInformationByHandleEx
SetFileInformationByHandle
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
SetFileCompletionNotificationModes
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
GetConsoleCP
CompareStringW
GetEnvironmentStringsW
WaitForSingleObjectEx
SwitchToThread
GetCurrentDirectoryW
GetCurrentProcessId
GetFinalPathNameByHandleW
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
RaiseException
GetCommandLineA
CopyFileExW
CancelIo
GetCurrentThread
GetTickCount64
QueryPerformanceFrequency
TlsFree
GetModuleHandleA
ReadFile
CreateNamedPipeW
RtlCaptureContext
CloseHandle
GetACP
GetModuleHandleW
GetFileAttributesExW
IsValidCodePage
GetTempPathW
PostQueuedCompletionStatus
CreateProcessW
Sleep
SysFreeString
SysStringLen
SHGetKnownFolderPath
ShellExecuteW
CommandLineToArgvW
AcquireCredentialsHandleA
InitializeSecurityContextW
AcceptSecurityContext
DeleteSecurityContext
QueryContextAttributesW
ApplyControlToken
FreeContextBuffer
DecryptMessage
EncryptMessage
FreeCredentialsHandle
SendMessageTimeoutA
GetUserProfileDirectoryW
getaddrinfo
WSARecv
ioctlsocket
WSAStartup
freeaddrinfo
send
getsockname
htons
WSASetLastError
select
getsockopt
closesocket
ntohl
WSASend
ntohs
WSAGetLastError
__WSAFDIsSet
connect
WSACleanup
WSAGetOverlappedResult
getpeername
recv
WSAIoctl
setsockopt
socket
bind
WSASocketW
StackWalk64
SymInitializeW
SymGetLineFromAddrW64
SymGetModuleBase64
SymFromAddrW
SymFunctionTableAccess64
CoInitializeEx
CoCreateInstance
CoTaskMemFree
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2018:12:06 21:33:37+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
4547584

LinkerVersion
14.15

ImageFileCharacteristics
Executable, Large address aware, 32-bit

EntryPoint
0x43664f

InitializedDataSize
1076736

SubsystemVersion
6.0

ImageVersion
0.0

OSVersion
6.0

UninitializedDataSize
0

File identification
MD5 2724bb360b15af13260862fe6760e2e4
SHA1 e289001c0f4569adb2e401820bcc245d0666f06a
SHA256 ea87066337daa4e15581de83a038255fb1225bda02375a67a889b5a16d807ac1
ssdeep
98304:zZ6PjcQG/NdUmsWSAa/Sqr0frnAbgT9ctTQBojJp:4P1GFdpIAa/afrnGqBoj

authentihash 4cdb30c2e48b195fee43eae55a0220a76b74a959e445eb5a4aedc9ba398824ac
imphash c2193550b9571c6fe3b6444fa804bb5c
File size 5.4 MB ( 5621248 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win64 Executable (generic) (45.0%)
Microsoft Visual C++ compiled executable (generic) (26.9%)
Win32 Dynamic Link Library (generic) (10.7%)
Win32 Executable (generic) (7.3%)
OS/2 Executable (generic) (3.3%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-07 07:02:13 UTC ( 3 months, 2 weeks ago )
Last submission 2019-02-14 17:07:22 UTC ( 1 month ago )
File names rustup-init.exe
rustc.exe
rustup-init.exe
rustdoc.exe
rustc.exe
rustup-init.exe
cargo.exe
rustup-init.exe
rustup.exe
cargo.exe
rustup.exe
rustup-init.exe
rustup-init.exe
rustc.exe
rustc.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!