× Obsługa plików cookie w przeglądarce jest wyłączona! Ta strona wymaga włączonej obsługi plików cookie, aby działać poprawnie
SHA256: 70b0246f4aef095c3f81642e0f7ed6387af5c64e6cf8d0b719c5040d7f46780c
Nazwa pliku: odk14.3.0.4600setup.exe
Współczynnik wykrycia: 1 / 55
Data analizy: 2017-01-19 21:23:01 UTC ( 11 miesięcy temu ) Zobacz najnowsze
Antywirus Wynik Uaktualnij
Qihoo-360 HEUR/QVM06.1.0000.Malware.Gen 20170119
Ad-Aware 20170119
AegisLab 20170119
AhnLab-V3 20170119
Alibaba 20170119
ALYac 20170119
Antiy-AVL 20170119
Arcabit 20170119
Avast 20170119
AVG 20170119
Avira (no cloud) 20170119
AVware 20170119
Baidu 20170119
BitDefender 20170119
CAT-QuickHeal 20170119
ClamAV 20170119
CMC 20170119
Comodo 20170119
CrowdStrike Falcon (ML) 20161024
Cyren 20170119
DrWeb 20170119
Emsisoft 20170119
ESET-NOD32 20170119
F-Prot 20170119
F-Secure 20170119
Fortinet 20170119
GData 20170119
Ikarus 20170119
Sophos ML 20170111
Jiangmin 20170119
K7AntiVirus 20170119
K7GW 20170119
Kaspersky 20170119
Kingsoft 20170119
Malwarebytes 20170119
McAfee 20170119
McAfee-GW-Edition 20170119
Microsoft 20170119
eScan 20170119
NANO-Antivirus 20170119
nProtect 20170119
Panda 20170119
Rising 20170119
Sophos AV 20170119
SUPERAntiSpyware 20170119
Symantec 20170119
Tencent 20170119
TheHacker 20170117
TrendMicro 20170119
TrendMicro-HouseCall 20170119
Trustlook 20170119
VBA32 20170119
VIPRE 20170119
ViRobot 20170119
WhiteArmor 20170119
Yandex 20170118
Zillya 20170117
Zoner 20170119
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
FranmoSoftware - Maciej Opaliński

Product Odkurzacz
File version 14.3.0.4600
Description Instalator Odkurzacz 14.3
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0000AA98
Number of sections 8
PE sections
Overlays
MD5 3c706bfd73fe2458ab58e32a841712b3
File type data
Offset 85504
Size 6147654
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
GetACP
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetSystemDirectoryA
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
GetVersion
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
14.3.0.4600

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
43008

EntryPoint
0xaa98

MIMEType
application/octet-stream

LegalCopyright
FranmoSoftware - Maciej Opali ski

FileVersion
14.3.0.4600

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

ProductVersion
14.3

FileDescription
Instalator Odkurzacz 14.3

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
FranmoSoftware

CodeSize
41472

ProductName
Odkurzacz

ProductVersionNumber
14.3.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 8db1328790983f039ee00b58e81f3cbf
SHA1 ea5e79543fa351570c3f8805f8dbb87de3acc67f
SHA256 70b0246f4aef095c3f81642e0f7ed6387af5c64e6cf8d0b719c5040d7f46780c
ssdeep
98304:U5EhrngJNSDEijpHyfBixWiotC8RFemyJ8wKwfS3WJQnFb5x57K/ZfrtcxwUStyv:1mcltHyZiUZFeOZ0tkbT5EZDqrdV

authentihash 66be2a6f984584785e492b46e24954209d6f3ebc2aa575cadc4a71e631d56571
imphash 2fb819a19fe4dee5c03e8c6a79342f79
File size 5.9 MB ( 6233158 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (77.7%)
Win32 Executable Delphi generic (10.0%)
Win32 Dynamic Link Library (generic) (4.6%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-01-19 21:23:01 UTC ( 11 miesięcy temu )
Last submission 2017-12-09 19:59:16 UTC ( 6 dni, 3 godziny temu )
Nazwy plików odk14.3.0.4600setup.exe
odk14.3.0.4600setup(1).exe
odk_setup.exe
odkurzacz.exe
odk14.3.0.4600setup.exe
odk14.3.0.4600setup.exe
output.106536116.txt
odk14.3.0.4600setup.exe
odk14.3.0.4600setup.exe
odk14.3.0.4600setup.exe
odk14.3.0.4600setup.exe
odk14.3.0.4600setup_(www.programki.pl).exe
odk14.3.0.4600setup.exe
Brak komentarzy. Żaden z członków społeczności VirusTotal nie skomentował tego. Bądź pierwszy, by to zrobić!

Skomentuj

?
Dodaj komentarz

Nie jesteś zalogowany. Tylko zarejestrowani użytkownicy mogą dodawać komentarze, zalogować się i mieć swój głos!

Brak ocen. Nikt jeszcze nie oddał swojego głosu, bądź pierwszy!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Runtime DLLs
UDP communications