× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: 4c7d140ad8f0151f25766b65ddbe8eb150bed1e1ba71d00288c16796e806b8bc
Имя файла: zoom.playermax.v9.01-patch.exe
Показатель выявления: 26 / 51
Дата анализа: 2014-04-22 13:11:55 UTC (4 лет, 2 месяцев назад) Показать последний анализ
Антивирус Результат Дата обновления
Ad-Aware Gen:Variant.Kazy.345 20140422
AhnLab-V3 Packed/Win32.Morphine 20140422
Antiy-AVL RiskWare[RiskTool:not-a-virus]/Win32.Patcher 20140422
Avast Win32:Patcher-AK [PUP] 20140422
BitDefender Gen:Variant.Kazy.345 20140422
CMC RiskTool.Win32.Patcher!O 20140422
Commtouch W32/Agent.EWQQ-1275 20140422
Comodo TrojWare.Win32.Agent.WFN 20140422
Emsisoft Gen:Variant.Kazy.345 (B) 20140422
ESET-NOD32 a variant of Win32/HackTool.Patcher.AD 20140422
F-Prot W32/Agent.KFY 20140422
F-Secure Gen:Variant.Kazy.3314 20140422
Fortinet Riskware/GamePatcher 20140422
GData Gen:Variant.Kazy.345 20140422
Jiangmin Risktool.Patcher.fq 20140422
K7AntiVirus Trojan ( 0040f3a51 ) 20140421
K7GW Trojan ( 0040f3a51 ) 20140421
Malwarebytes PUP.RiskwareTool.CK 20140422
McAfee Artemis!5A1BC7E261AE 20140422
McAfee-GW-Edition Heuristic.LooksLike.Win32.Suspicious.B 20140422
Microsoft HackTool:Win32/Keygen 20140422
eScan Gen:Variant.Kazy.345 20140422
Norman Suspicious_Gen.WV 20140422
Sophos AV Troj/Agent-WFN 20140422
Symantec Suspicious.Cloud 20140422
VIPRE Trojan.Win32.Agent.wfn (v) 20140422
AegisLab 20140422
Yandex 20140421
AntiVir 20140422
AVG 20140422
Baidu-International 20140422
Bkav 20140422
ByteHero 20140422
CAT-QuickHeal 20140422
ClamAV 20140422
DrWeb 20140422
Ikarus 20140422
Kaspersky 20140422
Kingsoft 20140422
NANO-Antivirus 20140422
nProtect 20140422
Panda 20140421
Qihoo-360 20140422
Rising 20140422
SUPERAntiSpyware 20140422
TheHacker 20140421
TotalDefense 20140422
TrendMicro 20140422
TrendMicro-HouseCall 20140422
VBA32 20140422
ViRobot 20140422
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-03-06 01:38:04
Entry Point 0x0000102B
Number of sections 5
PE sections
PE imports
GetTempPathA
SizeofResource
lstrcatA
GetModuleHandleA
LoadResource
DeleteFileA
FreeLibrary
RtlMoveMemory
WriteFile
ExitProcess
CloseHandle
CreateFileA
FlushFileBuffers
GetProcAddress
FindResourceA
VirtualAlloc
LoadLibraryA
Number of PE resources by type
RT_ICON 1
RT_MANIFEST 1
RT_RCDATA 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 4
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2012:03:06 02:38:04+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
512

LinkerVersion
10.0

FileTypeExtension
exe

InitializedDataSize
135168

SubsystemVersion
5.0

EntryPoint
0x102b

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 5a1bc7e261ae150debb2bc7337d065c4
SHA1 c3b1b51c4de4a13b83ee9456e7807ec4e1f682c0
SHA256 4c7d140ad8f0151f25766b65ddbe8eb150bed1e1ba71d00288c16796e806b8bc
ssdeep
3072:ubvJ4frsOqpRdWGx3Y1VFsHGE2ioz/7oMSTGK459M8Qx:m4Ts3JdKVCHGf7fSTGK4591E

authentihash 575cbb6658b62a60a7021502472a4c2237fdd12ded6e509c8a78c199624582ee
imphash dc73a9bd8de0fd640549c85ac4089b87
Размер файла 133.5 KБ ( 136704 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2014-04-22 09:44:00 UTC (4 лет, 2 месяцев назад)
Last submission 2016-12-29 17:24:56 UTC (1 год, 6 месяцев назад)
Имена файлов zoom.playermax.v9.01-patch.exe
zoom.playermax.v9.01-patch.exe
zoom.playermax.v9.01-patch.exe
zoom.playermax.v9.01-patch.exe
ZoomPlayerMax_901Final_Patch.exe
file-6878437_exe
zoom.playermax.v9.01-patch.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Deleted files
Runtime DLLs