× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 69cff155949efa78487523f620c1eedf50ce638477ccfcc45ccaf6c13775a38a
File name: PuTTY
Detection ratio: 0 / 59
Analysis date: 2017-03-14 08:29:13 UTC ( 9 měsíců ago )
Antivirus Result Update
Ad-Aware 20170314
AegisLab 20170314
AhnLab-V3 20170314
Alibaba 20170228
ALYac 20170314
Antiy-AVL 20170314
Arcabit 20170314
Avast 20170314
AVG 20170314
Avira (no cloud) 20170314
AVware 20170314
Baidu 20170314
BitDefender 20170314
Bkav 20170313
CAT-QuickHeal 20170314
ClamAV 20170314
Comodo 20170314
CrowdStrike Falcon (ML) 20170130
Cyren 20170314
DrWeb 20170314
Emsisoft 20170314
Endgame 20170222
ESET-NOD32 20170314
F-Prot 20170314
F-Secure 20170314
Fortinet 20170314
GData 20170314
Ikarus 20170313
Sophos ML 20170203
Jiangmin 20170314
K7AntiVirus 20170314
K7GW 20170314
Kaspersky 20170314
Kingsoft 20170314
Malwarebytes 20170314
McAfee 20170314
McAfee-GW-Edition 20170314
Microsoft 20170314
eScan 20170314
NANO-Antivirus 20170314
nProtect 20170314
Palo Alto Networks (Known Signatures) 20170314
Panda 20170313
Qihoo-360 20170314
Rising 20170314
Sophos AV 20170314
SUPERAntiSpyware 20170314
Symantec 20170313
Tencent 20170314
TheHacker 20170311
TotalDefense 20170314
TrendMicro 20170314
TrendMicro-HouseCall 20170314
Trustlook 20170314
VBA32 20170313
VIPRE 20170314
ViRobot 20170314
Webroot 20170314
WhiteArmor 20170303
Yandex 20170312
ZoneAlarm by Check Point 20170314
Zoner 20170314
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 1997-2016 Simon Tatham.

Product PuTTY suite
Original name PuTTY
Internal name PuTTY
File version Development snapshot 2016-03-18.0fadffe (file config 0.10.1)
Description SSH, Telnet and Rlogin client
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-11-05 23:10:55
Entry Point 0x000EA520
Number of sections 6
PE sections
PE imports
SetSecurityDescriptorDacl
SetSecurityDescriptorOwner
RegOpenKeyA
RegCloseKey
RegSetValueExA
CopySid
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetUserNameA
RegDeleteKeyA
RegEnumKeyA
EqualSid
GetLengthSid
RegDeleteValueA
Ord(15)
Ord(14)
Ord(17)
Ord(13)
GetOpenFileNameA
ChooseColorA
GetSaveFileNameA
ChooseFontA
SetMapMode
CreatePen
GetBkMode
GetCharWidth32W
TextOutA
CreateFontIndirectA
GetTextMetricsA
GetClipBox
UpdateColors
GetPixel
Rectangle
GetDeviceCaps
ExcludeClipRect
TranslateCharsetInfo
LineTo
GetTextExtentExPointA
DeleteDC
SetBkMode
GetCharacterPlacementW
GetCharWidthW
SetPixel
IntersectClipRect
GetCharWidthA
RealizePalette
SetTextColor
GetObjectA
MoveToEx
ExtTextOutW
SetPaletteEntries
CreateBitmap
CreateFontA
CreatePalette
GetStockObject
SelectPalette
ExtTextOutA
UnrealizeObject
SetTextAlign
GetDCOrgEx
CreateCompatibleDC
SelectObject
GetTextExtentPoint32A
GetCharABCWidthsFloatA
CreateSolidBrush
Polyline
SetBkColor
GetCharWidth32A
DeleteObject
CreateCompatibleBitmap
ImmReleaseContext
ImmGetCompositionStringW
ImmSetCompositionFontA
ImmSetCompositionWindow
ImmGetContext
GetStdHandle
ReleaseMutex
GetOverlappedResult
WaitForSingleObject
HeapDestroy
EncodePointer
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
IsDBCSLeadByteEx
WideCharToMultiByte
GetProcAddress
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetThreadTimes
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
ConnectNamedPipe
GetEnvironmentVariableA
OutputDebugStringW
FindClose
InterlockedDecrement
FormatMessageA
OutputDebugStringA
SetLastError
GetSystemTime
GetModuleFileNameW
Beep
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
HeapSetInformation
EnumSystemLocalesA
SetConsoleCtrlHandler
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FatalAppExitA
CreateMutexA
GetModuleHandleA
GlobalMemoryStatus
CreateThread
CreatePipe
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetCommState
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetDateFormatA
SetHandleInformation
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetStartupInfoW
GetCPInfo
GetUserDefaultLCID
GetProcessHeap
CompareStringW
FindFirstFileA
WaitNamedPipeA
HeapValidate
GetTimeFormatA
CreateFileMappingA
FindNextFileA
IsValidLocale
ExpandEnvironmentStringsA
SetCommTimeouts
GetTimeZoneInformation
SetCommState
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
UnmapViewOfFile
lstrlenA
GlobalFree
GetConsoleCP
GetProcessTimes
GlobalAlloc
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
CreateNamedPipeA
GetCurrentProcessId
HeapQueryInformation
GetCurrentDirectoryA
ClearCommBreak
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
SetCommBreak
ReadFile
CloseHandle
GetACP
GlobalLock
GetModuleHandleW
GetSystemTimeAdjustment
CreateProcessA
IsValidCodePage
HeapCreate
IsBadReadPtr
GetOEMCP
ShellExecuteA
SetDlgItemTextA
GetForegroundWindow
PostQuitMessage
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GetMessageTime
SetActiveWindow
DispatchMessageW
GetCursorPos
ReleaseDC
SendMessageA
GetClientRect
DefWindowProcW
GetWindowTextLengthA
TrackPopupMenu
GetActiveWindow
ShowCursor
MsgWaitForMultipleObjects
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
UpdateWindow
CheckRadioButton
CreateCaret
ShowWindow
SetClassLongA
PeekMessageW
EnableWindow
SetWindowPlacement
GetDlgItemTextA
PeekMessageA
TranslateMessage
DestroyCaret
RegisterClassW
GetQueueStatus
SetClipboardData
IsZoomed
GetWindowPlacement
IsIconic
RegisterClassA
GetWindowLongA
SetTimer
GetKeyboardLayout
FlashWindow
CreateWindowExW
CreateMenu
IsDialogMessageA
SetFocus
DrawEdge
SetCapture
BeginPaint
OffsetRect
SetCaretPos
KillTimer
GetClipboardOwner
RegisterWindowMessageA
DefWindowProcA
ToAsciiEx
GetClipboardData
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
PostMessageA
ReleaseCapture
SetWindowLongA
SetKeyboardState
GetScrollInfo
CreatePopupMenu
ShowCaret
GetLastActivePopup
CreateWindowExA
GetDlgItem
CreateDialogParamA
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
GetKeyboardState
IsDlgButtonChecked
CheckDlgButton
GetDesktopWindow
GetSystemMenu
GetDC
SetForegroundWindow
OpenClipboard
EmptyClipboard
GetCaretBlinkTime
MapDialogRect
IntersectRect
EndDialog
HideCaret
GetCapture
FindWindowA
MessageBeep
CheckMenuItem
AppendMenuA
RegisterClipboardFormatA
MessageBoxIndirectA
MoveWindow
MessageBoxA
DialogBoxParamA
GetSysColor
SetScrollInfo
SystemParametersInfoA
GetDoubleClickTime
WinHelpA
DeleteMenu
InvalidateRect
SetWindowTextA
DefDlgProcA
CloseClipboard
SetCursor
PlaySoundA
EnumPrintersA
EndPagePrinter
StartPagePrinter
StartDocPrinterA
OpenPrinterA
WritePrinter
EndDocPrinter
ClosePrinter
CoCreateInstance
CoUninitialize
CoInitialize
Number of PE resources by type
RT_ICON 12
RT_DIALOG 4
RT_MANIFEST 2
RT_GROUP_ICON 2
RT_VERSION 1
Number of PE resources by language
ENGLISH UK 20
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.67.1018.0

UninitializedDataSize
0

LanguageCode
English (British)

FileFlagsMask
0x000b

CharacterSet
Unicode

InitializedDataSize
382976

EntryPoint
0xea520

OriginalFileName
PuTTY

MIMEType
application/octet-stream

LegalCopyright
Copyright 1997-2016 Simon Tatham.

FileVersion
Development snapshot 2016-03-18.0fadffe (file config 0.10.1)

TimeStamp
2016:11:06 00:10:55+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
PuTTY

ProductVersion
Development snapshot 2016-03-18.0fadffe (file config 0.10.1)

FileDescription
SSH, Telnet and Rlogin client

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Simon Tatham

CodeSize
1338368

ProductName
PuTTY suite

ProductVersionNumber
0.67.1018.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 f05cb04553b745524b33cffb8db1e923
SHA1 7ab2951b9255916e46a63f1e4feb914348dd9bec
SHA256 69cff155949efa78487523f620c1eedf50ce638477ccfcc45ccaf6c13775a38a
ssdeep
24576:h2Uukkq7oas8AX5WV+MJ2yXg/SK9ZQaDr8gQAF6mon6d:h2UWV8AUP2m1Ws6

authentihash 2d6c0676e84e647659fc742e7ad3c0babb5efaacf4e871eaf08d1c17d810d001
imphash 6e024993d0c7d8857cab4d1e0578e7e9
File size 1.6 MB ( 1695232 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-11-05 23:25:58 UTC ( 1 rok, 1 měsíc ago )
Last submission 2017-03-14 08:29:13 UTC ( 9 měsíců ago )
File names PuTTY
putty.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Runtime DLLs