× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7c5d185235e8515e546d720e565a3efbc4e1b169852453726d5673dca0ed2d4
File name: ceTRNRnqgD3-2.dll
Detection ratio: 8 / 57
Analysis date: 2016-09-12 15:35:40 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Baidu Win32.Trojan.WisdomEyes.151026.9950.9971 20160912
Bkav HW32.Packed.38BC 20160912
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20160725
Sophos ML trojan.win32.skeeyah.a!rfn 20160912
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20160911
Rising Malware.Generic!4ISnBIWlqyQ@6 (thunder) 20160912
Symantec Heur.AdvML.B 20160912
Tencent Win32.Trojan.Raas.Auto 20160912
Ad-Aware 20160912
AegisLab 20160912
AhnLab-V3 20160912
Alibaba 20160912
ALYac 20160912
Antiy-AVL 20160912
Arcabit 20160912
Avast 20160912
AVG 20160912
Avira (no cloud) 20160912
AVware 20160912
BitDefender 20160912
CAT-QuickHeal 20160912
ClamAV 20160912
CMC 20160912
Comodo 20160912
Cyren 20160912
DrWeb 20160912
Emsisoft 20160912
ESET-NOD32 20160912
F-Prot 20160912
F-Secure 20160912
Fortinet 20160912
GData 20160912
Ikarus 20160912
Jiangmin 20160912
K7AntiVirus 20160912
K7GW 20160912
Kaspersky 20160912
Kingsoft 20160912
Malwarebytes 20160912
McAfee 20160912
Microsoft 20160912
eScan 20160912
NANO-Antivirus 20160912
nProtect 20160912
Panda 20160912
Qihoo-360 20160912
Sophos AV 20160912
SUPERAntiSpyware 20160912
TheHacker 20160911
TrendMicro 20160912
TrendMicro-HouseCall 20160912
VBA32 20160912
VIPRE 20160912
ViRobot 20160912
Yandex 20160911
Zillya 20160911
Zoner 20160912
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© WelltonWay. All rights reserved.

Product PVRX2
Original name PVRX2.exe
Internal name PVRX2.exe
File version 1.0.0.0
Description PVRX2
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-09-12 12:34:29
Entry Point 0x00009509
Number of sections 7
PE sections
Overlays
MD5 0890fea9403d71a839d505e7775f8093
File type data
Offset 130560
Size 4219
Entropy 7.95
PE imports
CryptDestroyKey
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
RegQueryValueExA
RegCreateKeyW
CryptReleaseContext
LookupPrivilegeValueW
RegEnumKeyW
RegRestoreKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
OpenProcessToken
RegOpenKeyExW
RegOpenKeyW
RegOpenKeyExA
RegQueryValueW
CryptVerifySignatureW
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
GetUserNameA
CryptDestroyHash
CryptAcquireContextW
CryptGetUserKey
RegDeleteValueW
RegSetValueExW
GetSaveFileNameW
GetFileTitleW
CommDlgExtendedError
SetGraphicsMode
Polygon
TextOutW
CreateFontIndirectW
GetGlyphOutlineW
CreatePen
SaveDC
GdiFlush
GetTextMetricsA
CombineRgn
GetClipBox
ExtTextOutW
ModifyWorldTransform
GetPixel
Rectangle
SetMapMode
GetBrushOrgEx
OffsetViewportOrgEx
DeleteDC
RestoreDC
SetBkMode
GetCharacterPlacementW
CreateBitmap
SetWorldTransform
DeleteObject
GetObjectW
CreateDCW
CreateDIBSection
RealizePalette
SetTextColor
CreatePatternBrush
GetDeviceCaps
GetClipRgn
BitBlt
GetOutlineTextMetricsA
GetTextExtentPoint32W
RectVisible
CreatePalette
GetStockObject
EnumFontFamiliesExW
SelectPalette
GetFontData
PtVisible
GetDIBits
ExtCreateRegion
SetTextAlign
ScaleViewportExtEx
SelectClipRgn
CreateCompatibleDC
CreateFontW
Escape
ScaleWindowExtEx
SetBrushOrgEx
CreateRectRgn
SelectObject
SetPolyFillMode
Ellipse
SetWindowExtEx
CreateSolidBrush
SetViewportExtEx
SetViewportOrgEx
SetPixelV
SetBkColor
GetBkColor
CreateCompatibleBitmap
ImmReleaseContext
ImmGetContext
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetDateFormatA
GetFileAttributesW
DuplicateHandle
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
SetErrorMode
GetLogicalDrives
FreeEnvironmentStringsW
CheckNameLegalDOS8Dot3A
GetLocaleInfoW
EnumResourceLanguagesW
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetProfileIntW
GetSystemTimeAsFileTime
GlobalMemoryStatusEx
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
GetExitCodeProcess
GetTimeZoneInformation
LoadResource
GlobalHandle
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
WritePrivateProfileStringW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
LocalLock
FindAtomA
RemoveDirectoryW
GlobalFindAtomA
HeapAlloc
GetModuleFileNameA
GetConsoleFontSize
SetProcessWorkingSetSize
OpenWaitableTimerA
ActivateActCtx
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
SetFilePointerEx
GetSystemPowerStatus
MoveFileW
GetModuleHandleA
GlobalAddAtomW
CreateThread
CreatePipe
GetExitCodeThread
CreateSemaphoreW
ConvertDefaultLocale
CreateMutexW
MulDiv
GetFileInformationByHandle
ExitThread
WriteConsoleA
SetCurrentDirectoryW
VirtualQuery
CopyFileW
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
SetEndOfFile
GetVersion
InterlockedIncrement
WriteConsoleW
AreFileApisANSI
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
RtlUnwind
GlobalFindAtomW
GetStartupInfoA
UnlockFile
GetFileSize
LCMapStringW
OpenProcess
GetPrivateProfileIntA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
AddAtomW
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
CompareStringA
GetComputerNameA
FindFirstFileW
lstrcmpW
SetEvent
CreateEventW
CreateFileW
VirtualProtectEx
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GlobalGetAtomNameW
SystemTimeToFileTime
GlobalDeleteAtom
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
LockFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetCurrentThreadId
FreeResource
GetFileAttributesExW
SetStdHandle
GetEnvironmentStrings
WideCharToMultiByte
UnmapViewOfFile
FindResourceW
VirtualFree
Sleep
VirtualAlloc
GetTimeFormatA
LoadRegTypeLib
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SysStringLen
UnRegisterTypeLib
RegisterTypeLib
SafeArrayGetElement
SystemTimeToVariantTime
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayGetUBound
SafeArrayGetVartype
VariantTimeToSystemTime
LoadTypeLib
SysFreeString
SafeArrayCopy
VariantInit
VarUI4FromStr
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
SHGetFolderLocation
SHQueryRecycleBinW
SHEmptyRecycleBinW
SHCreateDirectoryExW
SHBrowseForFolderW
DragQueryFileW
SHFileOperationW
Shell_NotifyIconW
SHGetPathFromIDListW
ExtractIconExW
SHGetDesktopFolder
SHGetMalloc
CommandLineToArgvW
DragFinish
PathFindFileNameW
SHCopyKeyW
PathIsUNCW
StrCatW
PathFindExtensionW
PathStripToRootW
PathMakeSystemFolderW
PathUnmakeSystemFolderW
RedrawWindow
GetForegroundWindow
RegisterWindowMessageW
UnregisterHotKey
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
EndDialog
WindowFromPoint
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
GetDC
GetAsyncKeyState
ReleaseDC
GetDlgCtrlID
SendMessageW
UnregisterClassA
IsDialogMessageW
GetMenuStringW
SendMessageA
UnregisterClassW
GetClientRect
SetCaretPos
AllowSetForegroundWindow
DrawTextW
GetNextDlgTabItem
InSendMessage
CallNextHookEx
ClientToScreen
GetTopWindow
RegisterHotKey
OpenClipboard
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetActiveWindow
PtInRect
DrawEdge
GetParent
UpdateWindow
GetPropW
EqualRect
GetMenuState
CreateCaret
MapVirtualKeyExW
GetMessageW
ShowWindow
GetCaretPos
DrawFrameControl
SetPropW
PostThreadMessageW
PeekMessageW
SetWindowsHookExW
EnableWindow
CharUpperW
LoadIconW
TranslateMessage
IsWindowEnabled
GetWindow
DestroyCaret
SetClipboardData
GetIconInfo
MsgWaitForMultipleObjects
SetParent
RegisterClassW
GetWindowPlacement
LoadStringW
SetWindowLongW
IsIconic
TrackPopupMenuEx
GetSubMenu
SetTimer
ShowOwnedPopups
FillRect
CopyRect
DeferWindowPos
GetDialogBaseUnits
CreateWindowExW
RemovePropW
GetWindowLongW
GetCursorPos
CharNextW
DragDetect
MapWindowPoints
VkKeyScanExW
GetMonitorInfoW
BeginPaint
OffsetRect
DefWindowProcW
DrawIcon
KillTimer
TrackMouseEvent
GetComboBoxInfo
CharPrevW
GetClipboardData
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
IntersectRect
CharLowerW
SendDlgItemMessageW
PostMessageW
InvalidateRect
CheckDlgButton
CreatePopupMenu
CheckMenuItem
DrawFocusRect
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ScreenToClient
TrackPopupMenu
DialogBoxIndirectParamW
GetMenuItemCount
GetDesktopWindow
GetKeyboardLayout
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
SetFocus
GetMenuItemInfoW
EmptyClipboard
GetCaretBlinkTime
CreateDialogIndirectParamW
DrawTextExW
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
FindWindowW
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
GetMenu
RegisterClassExW
SetMenu
SetRectEmpty
AppendMenuW
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
UpdateLayeredWindow
GetDoubleClickTime
TabbedTextOutW
DestroyIcon
EnumDisplayMonitors
IsWindowVisible
WinHelpW
UnpackDDElParam
SystemParametersInfoW
DispatchMessageW
FrameRect
SetRect
DeleteMenu
MonitorFromRect
CallWindowProcW
GetClassNameW
DestroyWindow
GetClassInfoW
ValidateRect
IsRectEmpty
GetFocus
InsertMenuItemW
CloseClipboard
TranslateAcceleratorW
UnhookWindowsHookEx
SetCursor
InternetTimeFromSystemTimeW
HttpQueryInfoW
InternetOpenW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetTimeToSystemTimeW
InternetGetConnectedState
InternetGetLastResponseInfoW
HttpOpenRequestW
HttpAddRequestHeadersW
mixerGetLineControlsW
mixerGetControlDetailsW
mciGetErrorStringW
mixerOpen
mixerSetControlDetails
mciSendCommandW
mixerClose
mixerGetDevCapsW
mixerGetLineInfoW
GdipDrawImageRectRect
GdipGetFontStyle
GdipDrawRectangleI
GdipSetClipRect
GdipSaveGraphics
GdipGetGenericFontFamilySansSerif
GdipTranslateMatrix
GdipSetPenBrushFill
GdipCreateBitmapFromScan0
GdipGetImageVerticalResolution
GdipDisposeImage
GdipImageSelectActiveFrame
GdipGetFamilyName
GdipGetFontSize
GdipGetCompositingMode
GdipGetTextRenderingHint
GdipGetCellAscent
GdipGetClipBounds
GdipSetStringFormatAlign
GdipImageGetFrameCount
GdipGetImageWidth
GdipDrawImageI
GdipDrawImageRectRectI
GdipCreateFont
GdipCloneBrush
GdipCloneStringFormat
GdipCreateLineBrushFromRectWithAngleI
GdipFree
GdipGetImageRawFormat
GdipGetImageHeight
GdipDeleteStringFormat
GdipTranslateWorldTransform
GdipSetPenDashStyle
GdipSetTextRenderingHint
GdipCreateBitmapFromHICON
GdipGetImageHorizontalResolution
GdipSetImageAttributesColorMatrix
GdipSaveImageToFile
GdipMeasureString
GdipTransformMatrixPoints
GdipBitmapSetResolution
GdiplusStartup
GdipGetFamily
GdipFillPath
GdipCreateBitmapFromStream
GdipGetImageThumbnail
GdipGetImageEncoders
GdipFillRectangleI
GdipDisposeImageAttributes
GdipSetCompositingMode
GdipClosePathFigure
GdipCreateMatrix
GdipDrawLine
GdipRotateMatrix
GdipGetImageGraphicsContext
GdipRestoreGraphics
GdipGetImageEncodersSize
GdipBitmapLockBits
GdipClonePen
GdipGetCellDescent
GdipStringFormatGetGenericDefault
GdipDrawPath
GdipDeleteFontFamily
GdipCloneFontFamily
GdipCreatePath
GdipBitmapUnlockBits
GdipFillRectangle
GdipDeleteFont
GdipSetPixelOffsetMode
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipDrawLineI
GdipBitmapGetPixel
GdipCreateFontFamilyFromName
GdipSetStringFormatFlags
GdipDeleteBrush
GdipRotateWorldTransform
GdipInvertMatrix
GdipAddPathArcI
GdipSetMatrixElements
GdipSetClipRectI
GdipStringFormatGetGenericTypographic
GdipGetStringFormatFlags
GdipGetClipBoundsI
GdipGetImagePixelFormat
GdipCreateSolidFill
GdipSetSmoothingMode
GdipSetStringFormatTrimming
GdipGetEmHeight
GdipGetDC
GdipDeleteMatrix
GdipGetLineSpacing
GdipDeleteGraphics
GdipTransformPath
GdipCreateImageAttributes
GdipCreateFromHDC
GdipCreatePen1
GdipDrawRectangle
GdipAlloc
GdipDeletePath
GdipDeletePen
GdipSetInterpolationMode
GdipDrawString
GdipCloneImage
GdipReleaseDC
_exit
isalpha
_CIcos
_wtoi
CreateStreamOnHGlobal
OleLockRunning
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoRevokeClassObject
CoCreateInstance
OleSetContainedObject
CoTaskMemRealloc
CLSIDFromProgID
RegisterDragDrop
CoLockObjectExternal
RevokeDragDrop
CoRegisterClassObject
CoCreateInstanceEx
CoCreateGuid
CoTaskMemFree
CLSIDFromString
StringFromGUID2
OleInitialize
OleUIBusyW
SnmpUtilOidCpy
SnmpUtilOidNCmp
SnmpUtilVarBindFree
CreateURLMonikerEx
PE exports
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.1

InitializedDataSize
134656

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Unicode

LinkerVersion
4.0

EntryPoint
0x9509

OriginalFileName
PVRX2.exe

MIMEType
application/octet-stream

LegalCopyright
WelltonWay. All rights reserved.

FileVersion
1.0.0.0

TimeStamp
2016:09:12 13:34:29+01:00

FileType
Win32 DLL

PEType
PE32

InternalName
PVRX2.exe

ProductVersion
1.0.0.0

FileDescription
PVRX2

OSVersion
4.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
WelltonWay

CodeSize
68608

ProductName
PVRX2

ProductVersionNumber
1.0.0.0

FileTypeExtension
dll

ObjectFileType
Executable application

AssemblyVersion
1.0.0.0

File identification
MD5 51cab6c8538e134e687a6dd8bb4c18f8
SHA1 0438340c0b0ad71e25fb2fa6de3934d413f4b9cc
SHA256 a7c5d185235e8515e546d720e565a3efbc4e1b169852453726d5673dca0ed2d4
ssdeep
3072:016VCm2PMJCH8hkbj8+0K3GFVvuJyIktXWRgk0F/u:m2C+C6wGUQpWx

authentihash e6afc8499ef1a71167e9b3c2549ceff12440c6f54268277585df0fb341623c77
imphash 01205d91155a6e3272718f488540b362
File size 131.6 KB ( 134779 bytes )
File type Win32 DLL
Magic literal
PE32 executable for MS Windows (DLL) (GUI) Intel 80386 32-bit

TrID InstallShield setup (38.9%)
Win32 Executable MS Visual C++ (generic) (28.2%)
Win64 Executable (generic) (25.0%)
Win32 Executable (generic) (4.0%)
Generic Win/DOS Executable (1.8%)
Tags
pedll overlay

VirusTotal metadata
First submission 2016-09-12 14:22:37 UTC ( 1 year, 1 month ago )
Last submission 2016-09-13 14:55:47 UTC ( 1 year, 1 month ago )
File names 5WKizSgIo.dll.4012.dr
ceTRNRnqgD3.dll.xxx
PVRX2.exe
5W3I2mAtu.dll.1272.dr
u.exe
CZN7mqMMCF.dll.2080.dr
ceTRNRnqgD3-2.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!