× I cookies sono disabilitati! Questo sito richiede i cookies abilitati per funzionare correttamente
SHA256: 8d37ce3a9657488ecb702f8389b1fff79afd88e04206d0999b56637592c68a32
Nome del file: HamApps_JTAlert_2.12.7_Setup.exe
Rapporto rilevamento: 0 / 68
Data analisi: 2018-11-02 01:08:35 UTC ( 1 mese, 1 settimana fa ) Leggli gli ultimi
Antivirus Risultato Aggiornamento
Ad-Aware 20181101
AegisLab 20181101
AhnLab-V3 20181101
Alibaba 20180921
ALYac 20181102
Antiy-AVL 20181102
Arcabit 20181101
Avast 20181101
Avast-Mobile 20181101
AVG 20181101
Avira (no cloud) 20181102
Babable 20180918
Baidu 20181101
BitDefender 20181102
Bkav 20181101
CAT-QuickHeal 20181031
ClamAV 20181101
CMC 20181101
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181102
Cyren 20181101
DrWeb 20181101
eGambit 20181102
Emsisoft 20181102
Endgame 20180730
ESET-NOD32 20181102
F-Prot 20181102
F-Secure 20181102
Fortinet 20181102
GData 20181102
Ikarus 20181101
Sophos ML 20180717
Jiangmin 20181102
K7AntiVirus 20181101
K7GW 20181102
Kaspersky 20181102
Kingsoft 20181102
Malwarebytes 20181102
MAX 20181102
McAfee 20181101
McAfee-GW-Edition 20181101
Microsoft 20181101
eScan 20181101
NANO-Antivirus 20181101
Palo Alto Networks (Known Signatures) 20181102
Panda 20181101
Qihoo-360 20181102
Rising 20181101
SentinelOne (Static ML) 20181011
Sophos AV 20181101
SUPERAntiSpyware 20181031
Symantec 20181101
Symantec Mobile Insight 20181030
TACHYON 20181102
Tencent 20181102
TheHacker 20181031
TotalDefense 20181101
TrendMicro 20181101
TrendMicro-HouseCall 20181101
Trustlook 20181102
VBA32 20181101
VIPRE 20181101
ViRobot 20181101
Webroot 20181102
Yandex 20181101
Zillya 20181101
ZoneAlarm by Check Point 20181101
Zoner 20181102
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2018, HamApps by VK3AMA

Product HamApps JTAlert 2.12.7
File version 2.12.7
Description HamApps JTAlert 2.12.7 Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0000AA98
Number of sections 8
PE sections
Overlays
MD5 4b840548a7207782cd951088b511f337
File type data
Offset 95232
Size 7301597
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
GetACP
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetSystemDirectoryA
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetVersion
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 5
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 8
NEUTRAL 7
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2.12.7.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
HamApps JTAlert 2.12.7 Setup

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
52736

EntryPoint
0xaa98

MIMEType
application/octet-stream

LegalCopyright
Copyright 2018, HamApps by VK3AMA

FileVersion
2.12.7

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2.12.7

UninitializedDataSize
0

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
HamApps by VK3AMA

CodeSize
41472

ProductName
HamApps JTAlert 2.12.7

ProductVersionNumber
2.12.7.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 4c59b1e29a3cf6377a398b0a4d32dd24
SHA1 d8f8598aedc0003ead2ac01b35bdf15f0dadefbb
SHA256 8d37ce3a9657488ecb702f8389b1fff79afd88e04206d0999b56637592c68a32
ssdeep
196608:f4GmD0oCZKVOzFBl2mYv2Vmwe9ruxzxGqojTT:fnszCruEekzxGH

authentihash 268b520bbee32e84b8e64fe0256f0cb5b5c799d30e8b45c41f62e0e45f40aeb1
imphash 2fb819a19fe4dee5c03e8c6a79342f79
File size 7.1 MB ( 7396829 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (76.6%)
Win32 Executable Delphi generic (9.9%)
Win32 Dynamic Link Library (generic) (4.5%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-11-02 01:08:35 UTC ( 1 mese, 1 settimana fa )
Last submission 2018-12-03 17:00:41 UTC ( 1 settimana, 2 giorni fa )
Nomi dei files HamApps_JTAlert_2.12.7_Setup.exe
~~dug~HamApps_JTAlert_2.12.7_Setup.exe
HamApps_JTAlert_2.12.7_Setup.exe
Nessun commento. Nessun membro della Comunità di VirusTotal ha commentato questo item, sii il primo a farlo!

Lascia il tuo commento...

?
Posta commento

Non ti sei ancora collegato. Solo gli utenti registrati possono commentare, collegati ed esprimi il tuo giudizio!

Nessun voto. Nessuno ha ancora votato questo item, sii il primo a farlo!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Runtime DLLs