× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 7e2ccb867ac750b6c69a2364272fc7797d94042fc243a0bd4af95fba4e69f075
Nombre: ConnectServer.exe
Detecciones: 0 / 67
Fecha de análisis: 2018-10-07 16:36:15 UTC ( hace 5 meses, 2 semanas ) Ver el más reciente
Antivirus Resultado Actualización
Ad-Aware 20181007
AegisLab 20181007
AhnLab-V3 20181007
Alibaba 20180921
ALYac 20181007
Antiy-AVL 20181007
Arcabit 20181007
Avast 20181007
Avast-Mobile 20181007
AVG 20181007
Avira (no cloud) 20181007
AVware 20180925
Babable 20180918
Baidu 20180930
BitDefender 20181007
Bkav 20181005
CAT-QuickHeal 20181007
ClamAV 20181007
CMC 20181007
Comodo 20181007
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181007
Cyren 20181007
DrWeb 20181007
eGambit 20181007
Emsisoft 20181007
Endgame 20180730
ESET-NOD32 20181007
F-Prot 20181007
F-Secure 20181007
Fortinet 20181007
GData 20181007
Ikarus 20181007
Sophos ML 20180717
Jiangmin 20181007
K7AntiVirus 20181007
K7GW 20181007
Kaspersky 20181007
Kingsoft 20181007
Malwarebytes 20181007
MAX 20181007
McAfee 20181007
McAfee-GW-Edition 20181007
Microsoft 20181007
eScan 20181007
NANO-Antivirus 20181007
Palo Alto Networks (Known Signatures) 20181007
Panda 20181007
Qihoo-360 20181007
Rising 20181007
SentinelOne (Static ML) 20180926
Sophos AV 20181007
SUPERAntiSpyware 20181006
Symantec 20181006
Symantec Mobile Insight 20181001
TACHYON 20181007
Tencent 20181007
TheHacker 20181001
TrendMicro 20181007
TrendMicro-HouseCall 20181007
Trustlook 20181007
VBA32 20181005
VIPRE 20181007
ViRobot 20181007
Webroot 20181007
Yandex 20181005
Zillya 20181005
ZoneAlarm by Check Point 20181007
Zoner 20181006
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © SetecSoft 2018

Product ConnectServer
Original name ConnectServer.exe
Internal name ConnectServer
File version 1.0.0.0
Description ConnectServer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-04 17:32:21
Entry Point 0x000089BE
Number of sections 5
PE sections
PE imports
SetBkMode
CreateFontA
GetStockObject
TextOutA
CreateSolidBrush
SelectObject
DeleteObject
SetTextColor
GetLastError
EnterCriticalSection
TerminateThread
WaitForSingleObject
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
GetLocalTime
GetQueuedCompletionStatus
GetCurrentProcess
SetThreadPriority
GetCurrentProcessId
ReleaseSemaphore
CreateIoCompletionPort
CreateDirectoryA
UnhandledExceptionFilter
SetErrorMode
GetStartupInfoW
InterlockedCompareExchange
GetSystemInfo
EncodePointer
CreateSemaphoreA
CreateThread
SetFilePointer
HeapSetInformation
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
DecodePointer
TerminateProcess
InitializeCriticalSection
DeleteCriticalSection
Sleep
CreateFileA
GetTickCount
GetCurrentThreadId
LeaveCriticalSection
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
??1_Container_base12@std@@QAE@XZ
malloc
?what@exception@std@@UBEPBDXZ
memset
fclose
_time64
__dllonexit
_controlfp_s
_invoke_watson
fread
_onexit
_fmode
_cexit
?terminate@@YAXXZ
fopen
?_type_info_dtor_internal_method@type_info@@QAEXXZ
strtol
??2@YAPAXI@Z
_lock
memcpy
vsprintf_s
_amsg_exit
exit
_XcptFilter
_commode
_ftelli64
__setusermatherr
strcpy_s
_initterm_e
_acmdln
_CxxThrowException
_ismbblead
_localtime64_s
_unlock
_crt_debugger_hook
??3@YAXPAX@Z
asctime_s
free
__CxxFrameHandler3
_except_handler4_common
_fseeki64
__getmainargs
_initterm
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
memmove
??0exception@std@@QAE@ABQBD@Z
_configthreadlocale
_exit
__set_app_type
GetMessageA
UpdateWindow
EndDialog
PostQuitMessage
DefWindowProcA
ShowWindow
DispatchMessageA
MessageBoxA
TranslateMessage
DialogBoxParamA
GetDC
RegisterClassExA
ReleaseDC
SetWindowTextA
LoadStringA
GetClientRect
CreateWindowExA
LoadAcceleratorsA
wsprintfA
SetTimer
LoadCursorA
LoadIconA
TranslateAcceleratorA
FillRect
DestroyWindow
recvfrom
WSASocketA
htonl
socket
WSAAccept
bind
WSARecv
WSASend
WSAStartup
inet_ntoa
htons
closesocket
WSAGetLastError
listen
MiniDumpWriteDump
Number of PE resources by type
RT_ICON 10
RT_GROUP_ICON 2
RT_DIALOG 1
RT_MANIFEST 1
RT_STRING 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 17
PORTUGUESE BRAZILIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ConnectServer

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
228352

EntryPoint
0x89be

OriginalFileName
ConnectServer.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright SetecSoft 2018

FileVersion
1.0.0.0

TimeStamp
2018:10:04 18:32:21+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ConnectServer

ProductVersion
1.0.0.0

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SetecSoft Group

CodeSize
34304

ProductName
ConnectServer

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 456dfb408edce20a704ee9e96bea1c27
SHA1 0744c9e468ff4321a87aab123267b8fa3a3f4911
SHA256 7e2ccb867ac750b6c69a2364272fc7797d94042fc243a0bd4af95fba4e69f075
ssdeep
3072:/5xaZeN2OpfK8PI+NpYf1lmhOK8PI+NpYf1lmh+:/5xaIsOpfHsdgwHsdg

authentihash 9cd694df17e7b25288c3abb75a153eda95beb5c8f81a9c5e1a8414f906c1dfec
imphash 45cb4a02a5d2ac7c2d40e3d25fdc6171
Tamaño del fichero 257.5 KB ( 263680 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-07 16:36:15 UTC ( hace 5 meses, 2 semanas )
Last submission 2018-10-07 16:36:15 UTC ( hace 5 meses, 2 semanas )
Nombres ConnectServer.exe
ConnectServer
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!