× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: d09c382fb515bebc9f63a3376a6a0a4083fa401a6dfeb2673efe1491b3d28135
Nombre: USB File Resc v11.1
Detecciones: 3 / 65
Fecha de análisis: 2017-09-15 23:32:52 UTC ( hace 1 semana )
Antivirus Resultado Actualización
Cylance Unsafe 20170916
TrendMicro-HouseCall Suspicious_GEN.F47V0914 20170915
Webroot 20170916
Ad-Aware 20170915
AegisLab 20170915
AhnLab-V3 20170915
Alibaba 20170911
ALYac 20170916
Antiy-AVL 20170915
Arcabit 20170915
Avast 20170915
Avast-Mobile 20170829
AVG 20170915
Avira (no cloud) 20170915
AVware 20170915
Baidu 20170915
BitDefender 20170916
CAT-QuickHeal 20170915
ClamAV 20170915
CMC 20170915
Comodo 20170915
CrowdStrike Falcon (ML) 20170804
Cyren 20170915
DrWeb 20170915
Emsisoft 20170915
Endgame 20170821
ESET-NOD32 20170915
F-Prot 20170915
F-Secure 20170915
Fortinet 20170915
GData 20170915
Ikarus 20170915
Sophos ML 20170914
Jiangmin 20170915
K7AntiVirus 20170915
K7GW 20170915
Kaspersky 20170915
Kingsoft 20170916
Malwarebytes 20170915
MAX 20170915
McAfee 20170915
McAfee-GW-Edition 20170915
Microsoft 20170915
eScan 20170915
NANO-Antivirus 20170915
nProtect 20170915
Palo Alto Networks (Known Signatures) 20170916
Panda 20170915
Qihoo-360 20170916
Rising 20170915
SentinelOne (Static ML) 20170806
Sophos AV 20170915
SUPERAntiSpyware 20170915
Symantec 20170915
Symantec Mobile Insight 20170915
Tencent 20170916
TheHacker 20170911
TotalDefense 20170915
TrendMicro 20170915
Trustlook 20170916
VBA32 20170915
VIPRE 20170915
ViRobot 20170915
WhiteArmor 20170829
Yandex 20170908
Zillya 20170915
ZoneAlarm by Check Point 20170915
Zoner 20170915
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
CopyRight 2013 - 2016 @ Streuner Corp.

Product USB File Resc v11.1.0.7
Original name USB File Resc
Internal name USB File Resc v11.1
File version 11.01.00.07
Description Desinfecta tu USB del odioso virus del acceso directo.
Comments Soporte: usb.file.resc@gmail.com
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-11-16 22:57:01
Entry Point 0x0000A13C
Number of sections 9
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetStdHandle
lstrlenA
GetFileAttributesA
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
GetVersionExA
GetModuleFileNameA
RtlUnwind
GetStartupInfoA
LoadLibraryExA
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
DeleteFileA
GetWindowsDirectoryA
UnhandledExceptionFilter
GetCPInfo
GetCommandLineA
GetProcAddress
GetFullPathNameA
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindFirstFileA
WriteFile
EnumCalendarInfoA
CloseHandle
lstrcpynA
GetACP
GetDiskFreeSpaceA
FreeResource
SetEnvironmentVariableA
SetFileAttributesA
GetExitCodeProcess
CreateProcessA
GetEnvironmentVariableA
LoadResource
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
FindResourceA
VirtualAlloc
GetCurrentProcessId
SysFreeString
CharPrevA
GetSystemMetrics
LoadStringA
CharNextA
MessageBoxA
CharToOemA
GetKeyboardType
DestroyWindow
Number of PE resources by type
RT_STRING 5
RT_RCDATA 2
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 2
PE resources
ExifTool file metadata
LegalTrademarks
Programa 100 por ciento gratuito. Prohibida su venta

SubsystemVersion
4.0

Comments
Soporte: usb.file.resc@gmail.com

LinkerVersion
2.25

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.1.0.7

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Desinfecta tu USB del odioso virus del acceso directo.

CharacterSet
Windows, Latin1

InitializedDataSize
209408

EntryPoint
0xa13c

OriginalFileName
USB File Resc

MIMEType
application/octet-stream

LegalCopyright
CopyRight 2013 - 2016 @ Streuner Corp.

FileVersion
11.01.00.07

TimeStamp
2012:11:16 23:57:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
USB File Resc v11.1

ProductVersion
11.01.00.07

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Streuner Corporation

CodeSize
35328

ProductName
USB File Resc v11.1.0.7

ProductVersionNumber
11.1.0.7

FileTypeExtension
exe

ObjectFileType
Unknown

File identification
MD5 8caf6a54488b7df593a60789d83aeb2a
SHA1 ead3567d6f7779f80551cf8014948582be0fc11e
SHA256 d09c382fb515bebc9f63a3376a6a0a4083fa401a6dfeb2673efe1491b3d28135
ssdeep
3072:ltZiKHRqZgUJElxIP4xsPtWu1PtWuB2dYM9Aq:ltZRdUWUPjPtWu1PtWuYf9R

authentihash 275835aa8c7045200222b758184ceb7f3d02fcf3e609c1c04bcb05e5724b6d01
imphash 77abcad8d2a58839860bba9dc40f29e1
Tamaño del fichero 240.0 KB ( 245760 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (57.2%)
Win32 Executable (generic) (18.2%)
Win16/32 Executable Delphi generic (8.3%)
Generic Win/DOS Executable (8.0%)
DOS Executable Generic (8.0%)
Tags
peexe

VirusTotal metadata
First submission 2016-10-02 22:13:22 UTC ( hace 11 meses, 3 semanas )
Last submission 2017-07-31 20:44:54 UTC ( hace 1 mes, 3 semanas )
Nombres USB File Resc
USB+File+Resc+v11.1.0.7.exe
usb-file-resc_11.1.0.7.exe
USB+File+Resc+v11.1.0.7.exe
usb-file-resc_11.1.0.7.exe
USB File Resc v11.1
usb-file-resc_11.1.0.7.exe
USB_.exe
USB+File+Resc+v11.1.0.7.exe
USB File Resc_11.1.0.7.exe
usb-file-resc_11.1.0.7.exe
USB+File+Resc+v11.1.0.7.exe
USB File Resc v11.1.0.7.exe
usb-file-resc_11.1.0.7 (1).exe
usb-file-resc_11.1.0.7.exe
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Deleted files
Created processes
Opened mutexes
Runtime DLLs
UDP communications