× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ef08c5bb32fc468fc4467e4b1facd1d16bbb988e35a01d38b756168322eb8eff
File name: tsnp2std.exe
Detection ratio: 0 / 66
Analysis date: 2018-01-23 21:56:10 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware 20180123
AegisLab 20180123
AhnLab-V3 20180123
Alibaba 20180123
ALYac 20180123
Antiy-AVL 20180123
Arcabit 20180123
Avast 20180123
Avast-Mobile 20180123
AVG 20180123
Avira (no cloud) 20180123
AVware 20180123
Baidu 20180123
BitDefender 20180123
Bkav 20180122
CAT-QuickHeal 20180123
ClamAV 20180123
CMC 20180123
Comodo 20180123
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180123
Cyren 20180123
DrWeb 20180123
eGambit 20180123
Emsisoft 20180123
Endgame 20171130
ESET-NOD32 20180123
F-Prot 20180123
F-Secure 20180123
Fortinet 20180123
GData 20180123
Ikarus 20180123
Sophos ML 20180121
Jiangmin 20180123
K7AntiVirus 20180123
K7GW 20180123
Kaspersky 20180123
Kingsoft 20180123
Malwarebytes 20180123
MAX 20180123
McAfee 20180123
McAfee-GW-Edition 20180123
Microsoft 20180123
eScan 20180123
NANO-Antivirus 20180123
nProtect 20180123
Palo Alto Networks (Known Signatures) 20180123
Panda 20180123
Qihoo-360 20180123
Rising 20180123
SentinelOne (Static ML) 20180115
Sophos AV 20180123
SUPERAntiSpyware 20180123
Symantec 20180123
Symantec Mobile Insight 20180123
Tencent 20180123
TheHacker 20180119
TrendMicro 20180123
TrendMicro-HouseCall 20180123
Trustlook 20180123
VBA32 20180123
VIPRE 20180123
ViRobot 20180123
Webroot 20180123
Yandex 20180112
Zillya 20180123
ZoneAlarm by Check Point 20180123
Zoner 20180123
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2005

Product tsnp2std
Original name tsnp2std.exe
Internal name tsnp2std
File version 1, 1, 6, 10
Description tsnp2std Microsoft
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-05-12 03:19:52
Entry Point 0x0000D390
Number of sections 4
PE sections
PE imports
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
Ord(17)
ImageList_Destroy
GetWindowExtEx
SetMapMode
SetBkMode
PatBlt
SaveDC
TextOutA
LPtoDP
GetClipBox
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SelectObject
IntersectClipRect
BitBlt
SetTextColor
GetObjectA
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
GetTextExtentPointA
CreateCompatibleDC
ScaleViewportExtEx
GetBkColor
SetWindowExtEx
GetTextColor
CreateSolidBrush
DPtoLP
Escape
GetViewportExtEx
DeleteObject
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
HeapDestroy
IsBadCodePtr
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetEnvironmentVariableA
GlobalFindAtomA
HeapAlloc
GetVersionExA
GetModuleFileNameA
GetVolumeInformationA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetVersion
LeaveCriticalSection
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetProcAddress
CompareStringW
lstrcpyW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
DuplicateHandle
GlobalLock
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LocalReAlloc
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetCurrentThreadId
SizeofResource
HeapCreate
VirtualFree
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
Ord(250)
Shell_NotifyIconA
MapWindowPoints
GetMessagePos
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
SetWindowContextHelpId
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
GetSysColor
CopyAcceleratorTableA
ClientToScreen
GetActiveWindow
GetSubMenu
ExcludeUpdateRgn
GetTopWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
ShowWindow
GetPropA
GetNextDlgGroupItem
GetMenuState
EnableWindow
LoadImageA
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
GetWindowPlacement
IsIconic
RegisterClassA
TabbedTextOutA
DrawFocusRect
SetTimer
CopyRect
GetSysColorBrush
IsWindowUnicode
PtInRect
IsChild
IsDialogMessageA
SetFocus
BeginPaint
OffsetRect
KillTimer
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
PostMessageA
SetWindowLongA
RemovePropA
SetWindowTextA
ShowCaret
GetWindowLongA
GetLastActivePopup
CreateWindowExA
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemCount
IsDlgButtonChecked
ValidateRect
GetSystemMenu
GetDC
SetForegroundWindow
PostThreadMessageA
MapDialogRect
IntersectRect
EndDialog
LoadMenuA
HideCaret
CharNextA
GetCapture
FindWindowA
MessageBeep
CheckMenuItem
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
RemoveMenu
GetKeyState
SystemParametersInfoA
DestroyIcon
IsWindowVisible
GetDesktopWindow
WinHelpA
SetRect
InvalidateRect
wsprintfA
DrawTextA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoUninitialize
CoCreateInstance
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
Number of PE resources by type
RT_ICON 14
RT_STRING 14
RT_DIALOG 6
RT_GROUP_ICON 6
RT_BITMAP 5
RT_MENU 3
RT_CURSOR 3
RT_GROUP_CURSOR 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
CHINESE SIMPLIFIED 47
CHINESE TRADITIONAL 5
ENGLISH US 3
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
126976

ImageVersion
0.0

ProductName
tsnp2std

FileVersionNumber
1.1.6.10

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
tsnp2std Microsoft

CharacterSet
Unicode

LinkerVersion
6.0

FileTypeExtension
exe

OriginalFileName
tsnp2std.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1, 1, 6, 10

TimeStamp
2007:05:12 04:19:52+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
tsnp2std

ProductVersion
1, 1, 6, 10

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright (C) 2005

MachineType
Intel 386 or later, and compatibles

CodeSize
155648

FileSubtype
0

ProductVersionNumber
1.1.6.10

EntryPoint
0xd390

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 fd15fd49e6922deb21d41d63fd679d6a
SHA1 d0830335ca1c9ff324b0600268d897cd592e4f0b
SHA256 ef08c5bb32fc468fc4467e4b1facd1d16bbb988e35a01d38b756168322eb8eff
ssdeep
3072:uiO2hTS2+le5xI7eI3ewWsbT33VEQpEpWpajvaifZZZfo57hoYDJSn9T6vVX:Lj0e5xIPewrbb6uWZC57BUnwt

authentihash e3bd6260de509eafd311e54edabdadd9039fb31c4d3938040a45e07b8e650fc7
imphash 410be001f2e58942790330b57f526ea8
File size 264.0 KB ( 270336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.8%)
Win64 Executable (generic) (31.7%)
Windows screen saver (15.0%)
Win32 Dynamic Link Library (generic) (7.5%)
Win32 Executable (generic) (5.1%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2009-02-12 21:58:47 UTC ( 10 years, 2 months ago )
Last submission 2018-01-23 21:56:10 UTC ( 1 year, 2 months ago )
File names tsnp2std.exe
file-2958609_exe
tsnp2std.exe
TSNP2STD.EXE
tsnp2std.exe
tsnp2std.exe
tsnp2std.exe
tsnp2std.exe
FD15FD49E6922DEB21D41D63FD679D6A
tsnp2std.exe
tsnp2std.exe
tsnp2std
.
tsnp2std.exe
tsnp2std.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!