× Cookies đã bị vô hiệu! Trang này yêu cầu kích hoạt cookies để có thể làm việc bình thường
SHA256: 02921a855855b89ce233dffd5fc22e7f1c511cf7569bf6ffba29792d6f521325
Tên tập tin: Rawnalyze_2.10.4.0.exe
Tỷ lệ phát hiện: 0 / 47
Ngày phân tích: 2014-03-10 06:28:43 UTC ( 3 năm, 11 tháng trước ) Xem mới nhất
Chương trình Kết quả Cập nhật
Ad-Aware 20140310
Yandex 20140309
AhnLab-V3 20140309
AntiVir 20140310
Antiy-AVL 20140310
Avast 20140310
AVG 20140309
Baidu-International 20140309
BitDefender 20140310
Bkav 20140310
ByteHero 20140310
CAT-QuickHeal 20140310
ClamAV 20140310
CMC 20140307
Commtouch 20140310
Comodo 20140310
DrWeb 20140310
Emsisoft 20140310
ESET-NOD32 20140309
F-Prot 20140310
F-Secure 20140309
Fortinet 20140310
GData 20140310
Ikarus 20140310
Jiangmin 20140310
K7AntiVirus 20140307
K7GW 20140307
Kaspersky 20140310
Kingsoft 20140310
Malwarebytes 20140310
McAfee 20140310
McAfee-GW-Edition 20140310
Microsoft 20140310
eScan 20140310
NANO-Antivirus 20140310
Norman 20140309
nProtect 20140310
Panda 20140309
Qihoo-360 20140310
Rising 20140309
Sophos AV 20140310
SUPERAntiSpyware 20140309
Symantec 20140310
TheHacker 20140309
TotalDefense 20140309
TrendMicro 20140310
TrendMicro-HouseCall 20140310
VBA32 20140308
VIPRE 20140310
ViRobot 20140310
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2007

Product Rawnalyze
Original name Rawnalyze.exe
Internal name RawProc
File version 2, 10, 4, 0
Description Rawnalyze Raw Image Data Analyzer
Comments Raw image data analyzer
Packers identified
PEiD Armadillo v2.53b3
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-01-06 01:30:15
Entry Point 0x0003E0C9
Number of sections 4
PE sections
PE imports
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
GetWindowExtEx
SetMapMode
SetBkMode
PatBlt
SaveDC
TextOutA
CreateFontIndirectA
LPtoDP
GetClipBox
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SelectObject
DeleteObject
IntersectClipRect
BitBlt
CreateDIBSection
SetTextColor
GetDeviceCaps
CreateBitmap
RectVisible
GetStockObject
CreateDIBitmap
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
GetTextExtentPointA
CreateCompatibleDC
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
GetTextColor
CreateSolidBrush
DPtoLP
Escape
GetViewportExtEx
GetBkColor
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
HeapDestroy
IsBadCodePtr
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
GlobalFindAtomA
HeapAlloc
GetVersionExA
GetModuleFileNameA
GetVolumeInformationA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetVersion
InterlockedIncrement
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GlobalLock
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetProfileStringA
CompareStringA
DuplicateHandle
GetProcAddress
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetCurrentThreadId
SizeofResource
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
ShellExecuteA
PathRemoveArgsA
PathFileExistsA
PathRemoveFileSpecA
PathAppendA
PathGetArgsA
SetFocus
SetDlgItemTextA
GetMessagePos
RedrawWindow
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
GetNextDlgTabItem
IsWindow
DispatchMessageA
EndPaint
GetWindowLongA
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
SetWindowContextHelpId
SetScrollPos
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetTopWindow
ExcludeUpdateRgn
GetActiveWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
MapDialogRect
UpdateWindow
SetPropA
CheckRadioButton
ShowWindow
GetPropA
GetNextDlgGroupItem
ValidateRect
EnableWindow
SetWindowPlacement
GetDlgItemTextA
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
SetClipboardData
GetWindowPlacement
IsIconic
RegisterClassA
TabbedTextOutA
DrawFocusRect
CreateWindowExA
CopyRect
GetSysColorBrush
IsWindowUnicode
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
BeginPaint
OffsetRect
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
PostMessageA
DrawIcon
GetMenuState
SetWindowLongA
RemovePropA
SetWindowTextA
ShowCaret
GetSubMenu
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
IsDlgButtonChecked
GetDesktopWindow
GetSystemMenu
GetDC
SetForegroundWindow
PostThreadMessageA
OpenClipboard
EmptyClipboard
ReleaseDC
IntersectRect
EndDialog
HideCaret
CharNextA
GetCapture
MessageBeep
CheckMenuItem
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
SetScrollInfo
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpA
SetRect
InvalidateRect
wsprintfA
DefDlgProcA
CallWindowProcA
GetClassNameA
GetFocus
CloseClipboard
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
GetOpenFileNameA
OleUninitialize
CLSIDFromString
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoGetClassObject
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemFree
CreateILockBytesOnHGlobal
CoTaskMemAlloc
Number of PE resources by type
RT_STRING 12
RT_BITMAP 12
RT_DIALOG 6
RT_CURSOR 2
RT_GROUP_CURSOR 1
RT_ICON 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 23
ENGLISH CAN 13
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
Raw image data analyzer

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.10.4.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Rawnalyze Raw Image Data Analyzer

CharacterSet
Unicode

InitializedDataSize
270336

EntryPoint
0x3e0c9

OriginalFileName
Rawnalyze.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2007

FileVersion
2, 10, 4, 0

TimeStamp
2010:01:06 02:30:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RawProc

ProductVersion
2, 10, 4, 0

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
CryptoBola

CodeSize
385024

ProductName
Rawnalyze

ProductVersionNumber
2.10.4.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 843f829e61a7bcef06cbf7febeec374c
SHA1 bf0002ba80ac513d198dad9eb3daecbfab27509a
SHA256 02921a855855b89ce233dffd5fc22e7f1c511cf7569bf6ffba29792d6f521325
ssdeep
6144:l78sAuv0MpndE6/lt/VvrmdNoM1FKlGBwC1Q0nSsQsUnL1TCU890GlFvV:+48MpndEult/XM/KlGesQ0ysUnL1Vu

authentihash 982f21a69484446bfa17e9db758f303fe44041e4d3b22812d383346be93f630b
imphash 994d6ee82f173af8ea3b3fb6478177bb
File size 624.0 KB ( 638976 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.8%)
Win64 Executable (generic) (31.7%)
Windows screen saver (15.0%)
Win32 Dynamic Link Library (generic) (7.5%)
Win32 Executable (generic) (5.1%)
Tags
peexe armadillo

VirusTotal metadata
First submission 2010-02-16 09:29:21 UTC ( 8 năm trước )
Last submission 2017-12-12 10:14:34 UTC ( 2 tháng, 2 tuần trước )
Tên tập tin Rawnalyze 2.10.4.0.exe
Rawnalyze_2.10.4.0.exe
file-6702800_exe
21F9C12600D9FA5EC06A090F283A1F00C5ECE342.exe
RawProc
Rawnalyze.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Chưa có ý kiến nào. Chưa có thành viên nào trong Cộng đồng VirusTotal bình luận về đối tượng này, hãy trở thành người đầu tiên đưa ra ý kiến!

Đưa ra ý kiến của bạn...

?
Gửi ý kiến

Bạn chưa đăng nhập.Chỉ có người dùng đã đăng ký mới có thể viết ý kiến, hãy đăng nhập và bắt đầu!

Chưa có đánh giá. Chưa có thành viên nào đánh giá về đối tượng này, hãy trở thành người đầu tiên đánh giá nó!