× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f0f3964a54736247760f2aaf65ca09f7c757f4ecd9320fbd96645a95f446da7c
File name: TimeTrackDemo.exe
Detection ratio: 0 / 56
Analysis date: 2014-11-30 22:29:58 UTC ( 3 years, 10 months ago )
Antivirus Result Update
Ad-Aware 20141130
AegisLab 20141130
Yandex 20141129
AhnLab-V3 20141130
ALYac 20141130
Antiy-AVL 20141130
Avast 20141130
AVG 20141130
Avira (no cloud) 20141130
AVware 20141121
Baidu-International 20141130
BitDefender 20141130
Bkav 20141127
ByteHero 20141130
CAT-QuickHeal 20141129
ClamAV 20141130
CMC 20141127
Comodo 20141130
Cyren 20141130
DrWeb 20141130
Emsisoft 20141130
ESET-NOD32 20141130
F-Prot 20141130
F-Secure 20141130
Fortinet 20141129
GData 20141130
Ikarus 20141130
Jiangmin 20141129
K7AntiVirus 20141128
K7GW 20141129
Kaspersky 20141130
Kingsoft 20141130
Malwarebytes 20141130
McAfee 20141130
McAfee-GW-Edition 20141130
Microsoft 20141130
eScan 20141130
NANO-Antivirus 20141130
Norman 20141130
nProtect 20141128
Panda 20141130
Qihoo-360 20141130
Rising 20141129
Sophos AV 20141130
SUPERAntiSpyware 20141130
Symantec 20141130
Tencent 20141130
TheHacker 20141130
TotalDefense 20141130
TrendMicro 20141130
TrendMicro-HouseCall 20141130
VBA32 20141128
VIPRE 20141130
ViRobot 20141130
Zillya 20141130
Zoner 20141127
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c) 2011 Jolly Inc. All rights reserved.

Publisher Jolly Technologies
Product Time Track 6.7 Demo
Original name Setup.exe
Internal name Setup
File version 6.7.3
Description Time Track Installer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-02-28 22:03:46
Entry Point 0x000339C7
Number of sections 4
PE sections
PE imports
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
EqualSid
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
BitBlt
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetThreadContext
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetExitCodeProcess
LocalFree
ResumeThread
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
WriteProcessMemory
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
RaiseException
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
ExitThread
SetThreadContext
TerminateProcess
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
VirtualProtectEx
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
FindNextFileA
DuplicateHandle
SearchPathA
ExpandEnvironmentStringsA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
SizeofResource
CompareFileTime
LockResource
SetFileTime
lstrlenW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
QueryPerformanceFrequency
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetVersion
GetEnvironmentStrings
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
GetOEMCP
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
UuidToStringA
RpcStringFreeA
UuidCreate
ShellExecuteExA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
ClientToScreen
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
MoveWindow
KillTimer
CharUpperA
ShowWindow
DefWindowProcA
FindWindowA
SetWindowPos
GetDesktopWindow
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
LoadStringA
PostMessageA
DrawIcon
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
SendDlgItemMessageA
GetDC
ReleaseDC
GetDlgCtrlID
GetClassInfoA
DestroyIcon
wsprintfA
CharPrevA
GetWindowPlacement
SendMessageA
SubtractRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
CharLowerBuffA
LoadCursorA
ScreenToClient
SetRect
GetWindowLongA
GetWindowTextLengthA
SetTimer
GetClientRect
LoadIconA
GetMessageA
SetWindowTextA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
StgIsStorageFile
StgOpenStorage
Number of PE resources by type
RT_DIALOG 6
RT_ICON 4
RT_STRING 3
GIF 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

InitializedDataSize
102400

ImageVersion
0.0

ProductName
Time Track 6.7 Demo

FileVersionNumber
12.0.0.58851

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Time Track Installer

CharacterSet
Unicode

LinkerVersion
6.0

OriginalFilename
Setup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.7.3

TimeStamp
2007:02:28 23:03:46+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

FileAccessDate
2014:11:30 23:30:47+01:00

ProductVersion
6.7.3

SubsystemVersion
4.0

OSVersion
4.0

FileCreateDate
2014:11:30 23:30:47+01:00

FileOS
Win32

LegalCopyright
(c) 2011 Jolly Inc. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Jolly Technologies

CodeSize
258048

FileSubtype
0

ProductVersionNumber
12.0.0.0

EntryPoint
0x339c7

ObjectFileType
Dynamic link library

File identification
MD5 1c9a41e56712890a4bd5a6f05061b457
SHA1 21fb4742b70ecfbe080137b596925b5d266d57d3
SHA256 f0f3964a54736247760f2aaf65ca09f7c757f4ecd9320fbd96645a95f446da7c
ssdeep
1572864:rux609jok2AK38Ec8ELgkJBMvBKMH0HvjYx:r+Dojc8srMJujYx

authentihash 445dea91922593743ff98002bcb2450afac5d122ca6144e27c4bcf81a5383d04
imphash 98a302f6bbeb0a006f303a0b09de7e12
File size 56.6 MB ( 59368255 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (48.1%)
Win32 Executable MS Visual C++ (generic) (34.9%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Generic Win/DOS Executable (2.2%)
Tags
peexe

VirusTotal metadata
First submission 2014-11-30 22:29:58 UTC ( 3 years, 10 months ago )
Last submission 2014-11-30 22:29:58 UTC ( 3 years, 10 months ago )
File names Setup.exe
TimeTrackDemo.exe
Setup
F0F3964A54736247760F2AAF65CA09F7C757F4ECD9320FBD96645A95F446DA7C.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!