× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f00e9a1b374df552bef4322cf746b5633a9b9e816211c386c1a1c32e5445ed59
File name: CopyFolder.exe
Detection ratio: 0 / 55
Analysis date: 2017-01-09 19:46:45 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20170109
AegisLab 20170109
AhnLab-V3 20170109
Alibaba 20170109
ALYac 20170109
Antiy-AVL 20170109
Arcabit 20170109
Avast 20170109
AVG 20170109
Avira (no cloud) 20170109
AVware 20170109
Baidu 20170109
BitDefender 20170109
Bkav 20170109
CAT-QuickHeal 20170109
ClamAV 20170109
CMC 20170109
Comodo 20170109
CrowdStrike Falcon (ML) 20161024
Cyren 20170109
DrWeb 20170109
Emsisoft 20170109
ESET-NOD32 20170109
F-Prot 20170109
F-Secure 20170109
Fortinet 20170109
GData 20170109
Ikarus 20170109
Sophos ML 20161216
Jiangmin 20170109
K7AntiVirus 20170109
K7GW 20170109
Kaspersky 20170109
Kingsoft 20170109
Malwarebytes 20170109
McAfee 20170108
McAfee-GW-Edition 20170109
Microsoft 20170109
eScan 20170109
NANO-Antivirus 20170109
nProtect 20170109
Panda 20170109
Qihoo-360 20170109
Rising 20170109
Sophos AV 20170109
SUPERAntiSpyware 20170109
Tencent 20170109
TheHacker 20170108
TrendMicro 20170109
TrendMicro-HouseCall 20170109
Trustlook 20170109
VBA32 20170109
VIPRE 20170109
ViRobot 20170109
WhiteArmor 20170109
Yandex 20170109
Zillya 20170109
Zoner 20170109
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2017 by David Wincelberg

Product CopyFolder
Original name CopyFolder.exe
Internal name CopyFolder
File version 1, 8, 0, 0
Description CopyFolder (filtered backup)
Comments Fee: $9.99
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-01-09 18:48:05
Entry Point 0x000493D5
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
GetFileSecurityA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
PropertySheetA
CreatePropertySheetPageA
Ord(17)
ImageList_Destroy
DestroyPropertySheetPage
GetWindowExtEx
SetMapMode
PatBlt
SaveDC
TextOutA
CreateFontIndirectA
GetTextMetricsA
GetClipBox
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
IntersectClipRect
BitBlt
SetTextColor
DPtoLP
GetDeviceCaps
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
ExtTextOutA
PtVisible
GetTextExtentPointA
CreateCompatibleDC
ScaleViewportExtEx
SelectObject
GetTextExtentPoint32A
SetWindowExtEx
CreateSolidBrush
SetViewportExtEx
Escape
SetBkColor
CopyMetaFileA
DeleteObject
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
SetEvent
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
LocalAlloc
lstrcatA
SetErrorMode
GetLogicalDrives
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
GetProcessVersion
InterlockedExchange
WriteFile
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
MoveFileA
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
GetProfileIntA
SetLastError
GetSystemTime
DeviceIoControl
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
GetVolumeInformationA
GetPrivateProfileStringA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
CreateThread
SetFileAttributesA
GlobalAddAtomA
SetUnhandledExceptionFilter
GetCurrentProcess
MulDiv
ExitThread
SetEnvironmentVariableA
GlobalMemoryStatus
GlobalAlloc
SetEndOfFile
GetVersion
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GlobalSize
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetPrivateProfileIntA
CreateDirectoryA
DeleteFileA
GetProcAddress
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
GetTempFileNameA
FindNextFileA
TerminateProcess
DuplicateHandle
GlobalLock
GetModuleFileNameA
GetTimeZoneInformation
CreateEventA
GlobalFindAtomA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
WritePrivateProfileStringA
LockResource
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
OpenMutexA
SuspendThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetCurrentThreadId
OpenEventA
GetEnvironmentStrings
WideCharToMultiByte
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
SHGetFileInfoA
DragFinish
DragQueryPoint
SHBrowseForFolderA
DragQueryFileA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
SetFocus
GetMessagePos
SetMenuItemBitmaps
MoveWindow
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
ClientToScreen
GetWindowLongA
GrayStringA
WindowFromPoint
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetClassInfoA
wvsprintfA
GetMenu
UnregisterClassA
IsClipboardFormatAvailable
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
LoadAcceleratorsA
GetWindowTextLengthA
GetActiveWindow
LockWindowUpdate
ShowCaret
GetTopWindow
GetWindowTextA
PtInRect
GetMessageA
GetParent
UpdateWindow
SetPropA
ShowWindow
GetPropA
GetMenuState
GetTabbedTextExtentA
EnableWindow
SetWindowPlacement
ExcludeUpdateRgn
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
GetWindowPlacement
IsIconic
RegisterClassA
TabbedTextOutA
GetSubMenu
SetTimer
FillRect
CopyRect
GetSysColorBrush
IsWindowUnicode
EndPaint
DestroyWindow
IsDialogMessageA
MapWindowPoints
PostMessageA
BeginPaint
OffsetRect
ReleaseCapture
CopyIcon
KillTimer
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
DrawIcon
SetWindowLongA
CheckDlgButton
RemovePropA
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetLastActivePopup
CreateWindowExA
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
InsertMenuA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuItemCount
IsDlgButtonChecked
ValidateRect
GetSystemMenu
GetDC
SetForegroundWindow
PostThreadMessageA
GetAsyncKeyState
MapDialogRect
IntersectRect
EndDialog
LoadMenuA
HideCaret
CharNextA
GetCapture
SetWindowTextA
MessageBeep
RemoveMenu
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
IsRectEmpty
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpA
SetRect
InvalidateRect
wsprintfA
DrawTextA
TranslateAcceleratorA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
CreateStreamOnHGlobal
OleUninitialize
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
OleFlushClipboard
ReleaseStgMedium
CoCreateInstance
CoFreeUnusedLibraries
DoDragDrop
CoRegisterMessageFilter
OleIsCurrentClipboard
OleDuplicateData
CoTaskMemFree
OleInitialize
Number of PE resources by type
RT_DIALOG 49
RT_STRING 14
Struct(240) 9
RT_BITMAP 4
RT_ICON 2
RT_CURSOR 2
RT_GROUP_CURSOR 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 85
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
Fee: $9.99

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.8.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
CopyFolder (filtered backup)

CharacterSet
Unicode

InitializedDataSize
266240

EntryPoint
0x493d5

OriginalFileName
CopyFolder.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2017 by David Wincelberg

FileVersion
1, 8, 0, 0

TimeStamp
2017:01:09 19:48:05+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
CopyFolder

ProductVersion
1, 8, 0, 0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
FileJockey Software

CodeSize
462848

ProductName
CopyFolder

ProductVersionNumber
1.8.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 32e7cfede54974fc1e82b9e94516af80
SHA1 0e14a79976e151837813cc67cee7d63b049f9b5b
SHA256 f00e9a1b374df552bef4322cf746b5633a9b9e816211c386c1a1c32e5445ed59
ssdeep
12288:TvPqkHCbPN4KnlOj/v+TbIXjpOBnTcMp:7BHFjn+EjpO9

authentihash 7c3b49618bbeb19e2027dcb88902bf6578164ec5cf0a99d5670f06adca6243e7
imphash 623e46163417c989a57f4dbe632acb59
File size 700.0 KB ( 716800 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (38.7%)
Win64 Executable (generic) (34.3%)
Windows screen saver (16.2%)
Win32 Executable (generic) (5.6%)
Generic Win/DOS Executable (2.4%)
Tags
peexe

VirusTotal metadata
First submission 2017-01-09 19:46:45 UTC ( 7 months, 1 week ago )
Last submission 2017-01-09 19:46:45 UTC ( 7 months, 1 week ago )
File names CopyFolder
CopyFolder.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Opened mutexes
Runtime DLLs
UDP communications