× Obsługa plików cookie w przeglądarce jest wyłączona! Ta strona wymaga włączonej obsługi plików cookie, aby działać poprawnie
SHA256: bd76cc9a4f820932c2f843f199ea1b55be9b0fb913e435f3742072d3149d7d73
Nazwa pliku: ultimate_rt_eb.dll
Współczynnik wykrycia: 4 / 56
Data analizy: 2016-12-24 14:06:05 UTC ( 2 lata, 3 miesiące temu ) Zobacz najnowsze
Antywirus Wynik Uaktualnij
AegisLab Adwareare.Adware.Gen7!c 20161224
Avira (no cloud) ADWARE/Adware.Gen7 20161224
Bkav W32.eHeur.Malware03 20161224
Zillya Adware.BrowseFox.Win32.133595 20161223
Ad-Aware 20161224
AhnLab-V3 20161224
Alibaba 20161223
ALYac 20161224
Antiy-AVL 20161224
Arcabit 20161224
Avast 20161224
AVG 20161224
AVware 20161224
Baidu 20161207
BitDefender 20161224
CAT-QuickHeal 20161224
ClamAV 20161224
CMC 20161224
Comodo 20161224
CrowdStrike Falcon (ML) 20161024
Cyren 20161224
DrWeb 20161224
Emsisoft 20161224
ESET-NOD32 20161224
F-Prot 20161224
F-Secure 20161224
Fortinet 20161224
GData 20161224
Ikarus 20161224
Sophos ML 20161216
Jiangmin 20161224
K7AntiVirus 20161224
K7GW 20161224
Kaspersky 20161224
Kingsoft 20161224
Malwarebytes 20161224
McAfee 20161224
McAfee-GW-Edition 20161224
Microsoft 20161224
eScan 20161224
NANO-Antivirus 20161224
nProtect 20161224
Panda 20161224
Qihoo-360 20161224
Rising 20161224
Sophos AV 20161224
SUPERAntiSpyware 20161223
Symantec 20161224
Tencent 20161224
TheHacker 20161222
TrendMicro 20161224
TrendMicro-HouseCall 20161224
Trustlook 20161224
VBA32 20161223
VIPRE 20161224
ViRobot 20161224
WhiteArmor 20161221
Yandex 20161223
Zoner 20161224
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
FileVersionInfo properties
Product RPG Maker 2003
Original name ultimate_rt_eb.dll
File version 1.1.1.0
Description Ultimate Runtime DLL (RM2k3 custom version for Degica)
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Entry Point 0x00001420
Number of sections 11
PE sections
PE imports
CryptReleaseContext
RegCloseKey
CryptAcquireContextA
RegQueryValueExA
CryptGenRandom
RegSetValueExA
RegCreateKeyExA
SetBkMode
SelectObject
CreateFontA
AddFontMemResourceEx
TextOutA
SetStretchBltMode
SetBkColor
StretchBlt
SetTextColor
GetLastError
ReadConsoleInputA
GetStdHandle
EnterCriticalSection
SetConsoleMode
WriteConsoleInputA
FillConsoleOutputCharacterA
GetConsoleCP
GetLargestConsoleWindowSize
Beep
QueryPerformanceCounter
WaitForSingleObject
GetTickCount
TlsAlloc
SetConsoleCursorPosition
GlobalUnlock
GetModuleFileNameA
LockFile
VirtualQuery
GlobalSize
DeleteCriticalSection
GetCurrentProcess
UnlockFile
SizeofResource
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
LockResource
UnhandledExceptionFilter
MultiByteToWideChar
VirtualProtect
GetCommandLineA
GetProcAddress
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
WriteConsoleOutputA
QueryPerformanceFrequency
SetConsoleWindowInfo
WideCharToMultiByte
TlsFree
GetModuleHandleA
SetUnhandledExceptionFilter
WriteFile
TlsSetValue
CloseHandle
GetSystemTimeAsFileTime
PeekConsoleInputA
ScrollConsoleScreenBufferA
GlobalLock
FreeResource
GetFullPathNameA
TerminateProcess
InitializeCriticalSection
LoadResource
GlobalAlloc
GetPrivateProfileStringA
TlsGetValue
Sleep
SetConsoleCtrlHandler
GetCurrentThreadId
FindResourceA
LeaveCriticalSection
EmptyClipboard
MapVirtualKeyA
GetForegroundWindow
EndDialog
keybd_event
SetWindowPos
EnableWindow
VkKeyScanA
MessageBoxA
GetClipboardData
DialogBoxParamA
CheckDlgButton
GetAsyncKeyState
SetWindowTextA
SetClipboardData
GetDlgItem
InsertMenuA
IsDlgButtonChecked
CallWindowProcA
GetSystemMenu
CloseClipboard
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
strncmp
rand
_ultoa
fgetpos
srand
toupper
setlocale
realloc
fread
fclose
malloc
__doserrno
_stricmp
atexit
abort
fprintf
remove
strtoul
wcslen
fgets
fflush
fopen
feof
__pioinfo
_amsg_exit
_itoa
_errno
fwrite
_lock
_onexit
_get_osfhandle
fputs
_strdup
sprintf
vfprintf
_fileno
strlen
exit
__setusermatherr
log10
fsetpos
memset
modf
_unlock
free
ceil
islower
atoi
__dllonexit
strrchr
calloc
_write
_controlfp
_lseeki64
memmove
mbstowcs
floor
memcpy
tolower
_filelengthi64
_beginthreadex
freopen
_strnicmp
_initterm
isupper
strcmp
setvbuf
_iob
PE exports
Number of PE resources by type
RT_RCDATA 2
RT_DIALOG 1
RT_VERSION 1
Number of PE resources by language
GERMAN AUSTRIAN 2
NEUTRAL 2
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
2.24

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
1.1.1.0

UninitializedDataSize
38400

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
ASCII

InitializedDataSize
118784

EntryPoint
0x1420

OriginalFileName
ultimate_rt_eb.dll

MIMEType
application/octet-stream

FileVersion
1.1.1.0

TimeStamp
0000:00:00 00:00:00

FileType
Win32 DLL

PEType
PE32

ProductVersion
1.1.1.0

FileDescription
Ultimate Runtime DLL (RM2k3 custom version for Degica)

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
KADOKAWA GAMES

CodeSize
79360

OriginalAuthor
David 'Cherry' Trapp

ProductName
RPG Maker 2003

ProductVersionNumber
1.1.1.0

FileTypeExtension
dll

ObjectFileType
Dynamic link library

File identification
MD5 116065da96f68bf56a26dd04ed96a012
SHA1 412f54b5d830edf3a424af7e7fe9e0d84ddda463
SHA256 bd76cc9a4f820932c2f843f199ea1b55be9b0fb913e435f3742072d3149d7d73
ssdeep
3072:/fqSxBiK+C72NsTibHLsKIOcZlhAdFzrD/HMJwN:xvhOcZHAvfD/H

authentihash 484fb2f2c302d6657dcc9468b82eae64f9d888c1f2db79a3de669100f001a788
imphash e3d383026dda3993b831da5e8001a4ff
File size 117.0 KB ( 119808 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.1%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
pedll

VirusTotal metadata
First submission 2016-12-23 22:23:26 UTC ( 2 lata, 3 miesiące temu )
Last submission 2016-12-24 14:06:05 UTC ( 2 lata, 3 miesiące temu )
Nazwy plików ultimate_rt_eb.dll
Brak komentarzy. Żaden z członków społeczności VirusTotal nie skomentował tego. Bądź pierwszy, by to zrobić!

Skomentuj

?
Dodaj komentarz

Nie jesteś zalogowany. Tylko zarejestrowani użytkownicy mogą dodawać komentarze, zalogować się i mieć swój głos!

Brak ocen. Nikt jeszcze nie oddał swojego głosu, bądź pierwszy!