0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is goodware. 0 VT Community user(s) with a total of 0 reputation credit(s) say(s) this sample is malware.
File name: IRW.exe
Submission date: 2011-03-25 07:53:26 (UTC)
Current status: queued (#9) queued (#9) analysing finished
Result: 0/ 41 (0.0%)
VT Community
not reviewed
Safety score: -
Compact Print results Antivirus Version Last Update Result
AhnLab-V3 2011.03.23.01 2011.03.23 -
AntiVir 7.11.5.43 2011.03.23 -
Antiy-AVL 2.0.3.7 2011.03.22 -
Avast 4.8.1351.0 2011.03.23 -
Avast5 5.0.677.0 2011.03.23 -
AVG 10.0.0.1190 2011.03.23 -
BitDefender 7.2 2011.03.23 -
CAT-QuickHeal 11.00 2011.03.23 -
ClamAV 0.96.4.0 2011.03.23 -
Commtouch 5.2.11.5 2011.03.22 -
Comodo 8073 2011.03.23 -
DrWeb 5.0.2.03300 2011.03.23 -
eSafe 7.0.17.0 2011.03.22 -
eTrust-Vet 36.1.8231 2011.03.23 -
F-Prot 4.6.2.117 2011.03.22 -
F-Secure 9.0.16440.0 2011.03.23 -
Fortinet 4.2.254.0 2011.03.23 -
GData 21 2011.03.23 -
Ikarus T3.1.1.97.0 2011.03.23 -
Jiangmin 13.0.900 2011.03.23 -
K7AntiVirus 9.94.4188 2011.03.23 -
McAfee 5.400.0.1158 2011.03.23 -
McAfee-GW-Edition 2010.1C 2011.03.23 -
Microsoft 1.6603 2011.03.23 -
NOD32 5977 2011.03.23 -
Norman 6.07.03 2011.03.22 -
nProtect 2011-02-10.01 2011.02.15 -
Panda 10.0.3.5 2011.03.22 -
PCTools 7.0.3.5 2011.03.21 -
Prevx 3.0 2011.03.25 -
Rising 23.50.01.06 2011.03.22 -
Sophos 4.63.0 2011.03.23 -
SUPERAntiSpyware 4.40.0.1006 2011.03.23 -
Symantec 20101.3.0.103 2011.03.23 -
TheHacker 6.7.0.1.155 2011.03.23 -
TrendMicro 9.200.0.1012 2011.03.23 -
TrendMicro-HouseCall 9.200.0.1012 2011.03.23 -
VBA32 3.12.14.3 2011.03.23 -
VIPRE 8790 2011.03.23 -
ViRobot 2011.3.23.4372 2011.03.23 -
VirusBuster 13.6.264.0 2011.03.22 -
Additional informationShow all
MD5 : ac71a4692c95fcc29930e4839dba8cd8
SHA1 : cdcc870c2a17151ba99f0235f193834828c8cd80
SHA256: 97ab1842ed3498b4a26f65bb260130da0a496cd2df9965a9b370bde8f7f654fc
ssdeep: 768:9PqeH3SXb9+yV2QbYSnY9kRiiaEzklmE69ekEjBqVL5CJX59j:EeSLEuVbFekRoEzk4E6gk
OwlQ5t
File size : 106496 bytes
First seen: 2009-05-13 14:31:05
Last seen : 2011-03-25 07:53:26
TrID:
Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%)
sigcheck:
publisher....: Apple Inc.
copyright....: Copyright (c) 2006-2007 Apple Inc. All Rights Reserved.
product......: Boot Camp
description..: IR Remote Application
original name: IRW.exe
internal name: IRW
file version.: 1.2.0.5
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
PEInfo: PE structure information
[[ basic data ]]
entrypointaddress: 0x1C97
timedatestamp....: 0x45D11647 (Tue Feb 13 01:37:11 2007)
machinetype......: 0x14c (I386)
[[ 4 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
.text, 0x1000, 0x72E4, 0x8000, 6.23, ebd98f4dabcf2266468cee6cb5119026
.rdata, 0x9000, 0x2006, 0x3000, 4.15, 73891128228eb5b638153e60c6911e71
.data, 0xC000, 0x1B5C, 0x1000, 2.11, a6d63f647567a4e10130f4098b77554c
.rsrc, 0xE000, 0xC170, 0xD000, 0.51, 9058c8050d7dec30086b1df5e99dfaa5
[[ 3 import(s) ]]
KERNEL32.dll: Process32FirstW, Process32NextW, GetLastError, WaitForMultipleObjects, CreateFileW, CreateEventW, DeviceIoControl, GetCurrentThreadId, CreateThread, TerminateThread, CloseHandle, CreateToolhelp32Snapshot, HeapSize, RtlUnwind, HeapReAlloc, VirtualAlloc, InitializeCriticalSection, LoadLibraryA, GetLocaleInfoA, Sleep, EnterCriticalSection, LeaveCriticalSection, GetStringTypeW, GetStringTypeA, LCMapStringW, WideCharToMultiByte, LCMapStringA, GetSystemTimeAsFileTime, GetCurrentProcessId, HeapFree, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, GetModuleHandleA, GetProcAddress, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, FreeEnvironmentStringsA, MultiByteToWideChar, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, HeapDestroy, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount
USER32.dll: EndDialog, PostQuitMessage, EndPaint, BeginPaint, DefWindowProcW, DestroyWindow, DialogBoxParamW, UpdateWindow, ShowWindow, CreateWindowExW, RegisterClassExW, LoadCursorW, SetFocus, DispatchMessageW, SetForegroundWindow, TranslateMessage, AttachThreadInput, TranslateAcceleratorW, GetParent, GetMessageW, GetWindowThreadProcessId, GetForegroundWindow, MessageBoxW, LoadAcceleratorsW, LoadStringW, EnumWindows, LoadIconW
SHELL32.dll: ShellExecuteExW
ExifTool:
file metadata
CharacterSet: Unicode
CodeSize: 32768
CompanyName: Apple Inc.
EntryPoint: 0x1c97
FileDescription: IR Remote Application
FileFlagsMask: 0x0017
FileOS: Win32
FileSize: 104 kB
FileSubtype: 0
FileType: Win32 EXE
FileVersion: 1.2.0.5
FileVersionNumber: 1.2.0.5
ImageVersion: 0.0
InitializedDataSize: 73728
InternalName: IRW
LanguageCode: English (U.S.)
LegalCopyright: Copyright 2006-2007 Apple Inc. All Rights Reserved.
LinkerVersion: 8.0
MIMEType: application/octet-stream
MachineType: Intel 386 or later, and compatibles
OSVersion: 4.0
ObjectFileType: Executable application
OriginalFilename: IRW.exe
PEType: PE32
ProductName: Boot Camp
ProductVersion: 1.2 beta
ProductVersionNumber: 1.2.0.0
Subsystem: Windows GUI
SubsystemVersion: 4.0
TimeStamp: 2007:02:13 02:37:11+01:00
UninitializedDataSize: 0
Symantec reputation:Suspicious.Insight
VT Community
Malwarebytes' Anti-Malware 1.50.1.1100
http://www.malwarebytes.org
Verze databáze: 6164
Windows 5.1.2600 Service Pack 2
Internet Explorer 8.0.6001.18702
25.3.2011 9:05:48
mbam-log-2011-03-25 (09-05-45).txt
Typ kontroly: Rychlý test
Testované objekty: 150394
Uplynulý čas: 4 minut, 22 sekund
Infikované procesy v paměti: 0
Infikované moduly v paměti: 0
Infikované klíče v registru: 0
Infikované hodnoty v registru: 0
Infikované datové položky v registru: 0
Infikované složky: 0
Infikované soubory: 1
Infikované procesy v paměti:
(Žádné škodlivé položky nebyly zjištěny)
Infikované moduly v paměti:
(Žádné škodlivé položky nebyly zjištěny)
Infikované klíče v registru:
(Žádné škodlivé položky nebyly zjištěny)
Infikované hodnoty v registru:
(Žádné škodlivé položky nebyly zjištěny)
Infikované datové položky v registru:
(Žádné škodlivé položky nebyly zjištěny)
Infikované složky:
(Žádné škodlivé položky nebyly zjištěny)
Infikované soubory:
c:\WINDOWS\svchost.com (Virus.Neshta) -> No action taken.