File Rt32_pm.dll received on 11.02.2008 11:16:14 (CET)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED 


Result: 0/36 (0%)
Loading server information... 
Your file is queued in position: ___.
Estimated start time is between ___ and ___ .
Do not close the window until scan is complete. 
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file. 
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated. 
 Compact Print results  Your file has expired or does not exists. 
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished. 
 Email:  
  

Antivirus Version Last Update Result 
AhnLab-V3 2008.11.1.0 2008.11.01 - 
AntiVir 7.9.0.10 2008.10.31 - 
Authentium 5.1.0.4 2008.11.01 - 
Avast 4.8.1248.0 2008.11.01 - 
AVG 8.0.0.161 2008.11.02 - 
BitDefender 7.2 2008.11.02 - 
CAT-QuickHeal 9.50 2008.11.01 - 
ClamAV 0.94.1 2008.11.02 - 
DrWeb 4.44.0.09170 2008.11.02 - 
eSafe 7.0.17.0 2008.10.30 - 
eTrust-Vet 31.6.6185 2008.11.01 - 
Ewido 4.0 2008.11.01 - 
F-Prot 4.4.4.56 2008.11.01 - 
F-Secure 8.0.14332.0 2008.11.02 - 
Fortinet 3.117.0.0 2008.10.31 - 
GData 19 2008.11.02 - 
Ikarus T3.1.1.44.0 2008.11.02 - 
K7AntiVirus 7.10.514 2008.11.01 - 
Kaspersky 7.0.0.125 2008.11.02 - 
McAfee 5421 2008.11.02 - 
Microsoft 1.4005 2008.11.02 - 
NOD32 3575 2008.10.31 - 
Norman 5.80.02 2008.10.31 - 
Panda 9.0.0.4 2008.11.01 - 
PCTools 4.4.2.0 2008.11.01 - 
Prevx1 V2 2008.11.02 - 
Rising 21.01.62.00 2008.11.02 - 
SecureWeb-Gateway 6.7.6 2008.11.02 - 
Sophos 4.35.0 2008.11.02 - 
Sunbelt 3.1.1767.2 2008.10.31 - 
Symantec 10 2008.11.02 - 
TheHacker 6.3.1.1.135 2008.10.31 - 
TrendMicro 8.700.0.1004 2008.10.31 - 
VBA32 3.12.8.9 2008.11.02 - 
ViRobot 2008.10.31.1446 2008.10.31 - 
VirusBuster 4.5.11.0 2008.11.01 - 
Additional information 
File size: 77824 bytes 
MD5...: 40cb3045a54129eb268a068a179198f4 
SHA1..: e00f108dc811b8fe209dc396749a4be9370c15cc 
SHA256: 4b6584f0318461a1afae8f85529007c65706ce503b6a71cbb3a8bdfb7dd8b689 
SHA512: 0760cf32085837a12c1351cd6763a70af010d885e256d955d47a18443647a05b
5b61efb1dceb5903fbed78e4cf0c1280b1f678f22b170021449ddf2e4610d834 
PEiD..: Armadillo v1.xx - v2.xx 
TrID..: File type identification
Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%) 
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x10005bda
timedatestamp.....: 0x3e64b616 (Tue Mar 04 14:20:06 2003)
machinetype.......: 0x14c (I386)

( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xa97e 0xb000 6.54 1ac70e3d7bfa95e831458448c431a285
.rdata 0xc000 0xd91 0x1000 4.92 6937fc108e67959970265077045cc8b6
.data 0xd000 0x4c08 0x4000 1.40 99798763bf658403932afebf1d82a8b4
.rsrc 0x12000 0x3b0 0x1000 0.98 30b870b4554f5ccd9dc3187bb1ed30d5
.reloc 0x13000 0xcbe 0x1000 5.27 f638a6638b2d41e975ea6eda87fd2531

( 3 imports ) 
> KERNEL32.dll: SetErrorMode, GetVolumeInformationA, GetWindowsDirectoryA, GlobalFree, GetLocalTime, GetVersionExA, GlobalLock, GlobalAlloc, WideCharToMultiByte, LoadLibraryA, GetProcAddress, CreateFileA, CloseHandle, FreeLibrary, MultiByteToWideChar, GetVersion, GetStartupInfoA, GetFileType, LCMapStringW, LCMapStringA, SetEndOfFile, RtlUnwind, GetOEMCP, GetACP, GetCommandLineA, GlobalUnlock, HeapFree, GetLastError, ExitProcess, TerminateProcess, GetCurrentProcess, GetModuleHandleA, GetModuleFileNameA, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, SetHandleCount, GetStdHandle, ReadFile, GetCPInfo, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, DisableThreadLibraryCalls, WriteFile, SetFilePointer, GetStringTypeA, GetStringTypeW, HeapAlloc, VirtualAlloc, HeapReAlloc, SetStdHandle, FlushFileBuffers
> USER32.dll: MessageBoxA, GetActiveWindow, SendDlgItemMessageA, SendMessageA, FindWindowA
> ADVAPI32.dll: RegCloseKey, RegQueryValueExA, RegOpenKeyA, RegSetValueExA, RegCreateKeyA

( 26 exports ) 
IHAddWord, IHCloseHyphSession, IHCloseLanguage, IHCloseSpellSession, IHCorrect, IHDeleteWord, IHDetect, IHEnumWord, IHFindWord, IHGetDictInfo, IHGetLngstInfo, IHHyphenateWord, IHIgnoreAdd, IHIgnoreClear, IHInit, IHMisspellAdd, IHMisspellClear, IHNextLanguage, IHOpenHyphSession, IHOpenLanguage, IHOpenSpellSession, IHQuit, IHResetDetect, IHSetSpellBreakTable, IHSpliceWord, IHSplitWord 
