And here's oleacc.dll:
File oleacc.dll received on 2010.07.13 12:28:23 (UTC)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED
Result: 0/42 (0%)
Loading server information...
Your file is queued in position: 1.
Estimated start time is between 38 and 55 seconds.
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Compact
Print results Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.
You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:
Antivirus Version Last Update Result
a-squared 5.0.0.31 2010.07.13 -
AhnLab-V3 2010.07.13.01 2010.07.13 -
AntiVir 8.2.4.10 2010.07.13 -
Antiy-AVL 2.0.3.7 2010.07.12 -
Authentium 5.2.0.5 2010.07.13 -
Avast 4.8.1351.0 2010.07.13 -
Avast5 5.0.332.0 2010.07.13 -
AVG 9.0.0.836 2010.07.13 -
BitDefender 7.2 2010.07.13 -
CAT-QuickHeal 11.00 2010.07.13 -
ClamAV 0.96.0.3-git 2010.07.13 -
Comodo 5414 2010.07.13 -
DrWeb 5.0.2.03300 2010.07.13 -
eSafe 7.0.17.0 2010.07.11 -
eTrust-Vet 36.1.7703 2010.07.13 -
F-Prot 4.6.1.107 2010.07.11 -
F-Secure 9.0.15370.0 2010.07.13 -
Fortinet 4.1.143.0 2010.07.13 -
GData 21 2010.07.13 -
Ikarus T3.1.1.84.0 2010.07.13 -
Jiangmin 13.0.900 2010.07.13 -
Kaspersky 7.0.0.125 2010.07.13 -
McAfee 5.400.0.1158 2010.07.13 -
McAfee-GW-Edition 2010.1 2010.07.13 -
Microsoft 1.5902 2010.07.13 -
NOD32 5274 2010.07.13 -
Norman 6.05.11 2010.07.13 -
nProtect 2010-07-13.01 2010.07.13 -
Panda 10.0.2.7 2010.07.12 -
PCTools 7.0.3.5 2010.07.13 -
Prevx 3.0 2010.07.13 -
Rising 22.56.01.04 2010.07.13 -
Sophos 4.55.0 2010.07.13 -
Sunbelt 6574 2010.07.13 -
SUPERAntiSpyware 4.40.0.1006 2010.07.13 -
Symantec 20101.1.0.89 2010.07.13 -
TheHacker 6.5.2.1.312 2010.07.12 -
TrendMicro 9.120.0.1004 2010.07.13 -
TrendMicro-HouseCall 9.120.0.1004 2010.07.13 -
VBA32 3.12.12.6 2010.07.13 -
ViRobot 2010.7.12.3932 2010.07.13 -
VirusBuster 5.0.27.0 2010.07.12 -
Additional information
File size: 233472 bytes
MD5...: cbd010bfbed9657c3813400aad03cf8a
SHA1..: cdcb3a2845dfbf61000e5291eb3d8d5e65db362d
SHA256: 2dd60a291d8f4a44d7d638c83a46cfa618525a72b9d975fb81f8f403699b9ae6
ssdeep: 3072:/RjrwYo7juVuox3UMGgx7ZWytNLO9WhACKNhkc/jt+1rvc3bDZXFGGR7Imf
mz9gi:/RjRRbTZWyQXCwhP/jw1rshRw9J
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x3089
timedatestamp.....: 0x4a5bdac8 (Tue Jul 14 01:09:28 2009)
machinetype.......: 0x14c (I386)
( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x2eee3 0x2f000 6.57 703acc729b6d0594b5c2012a8dc2f1d3
.orpc 0x30000 0x157 0x200 4.27 7a9f0482dd8b98a20e6ac1c562902856
.data 0x31000 0x1a28 0x1a00 2.74 ade700194be681930c99a15ce4949dfa
.rsrc 0x33000 0x54d0 0x5600 4.39 99bd35ebc318ddc30daadcfcf6559df6
.reloc 0x39000 0x28bc 0x2a00 6.51 9efa7bbefc8673b8c5f19e5cf962577e
( 10 imports )
> msvcrt.dll: memset, __dllonexit, _unlock, _amsg_exit, _initterm, _XcptFilter, realloc, _except_handler4_common, _onexit, swprintf_s, memcpy, wcscpy_s, wcscat_s, _ftol2_sse, _wcslwr_s, wcsstr, _beginthreadex, strncpy_s, memmove, _vsnwprintf, _ftol2, malloc, free, _lock
> ntdll.dll: EtwGetTraceLoggerHandle, EtwRegisterTraceGuidsW, EtwUnregisterTraceGuids, EtwLogTraceEvent, EtwGetTraceEnableLevel, EtwGetTraceEnableFlags
> API_MS_Win_Core_LocalRegistry_L1_1_0.dll: RegCreateKeyExW, RegDeleteValueW, RegOpenKeyExW, RegQueryValueExW, RegCloseKey, RegSetValueExW, RegQueryInfoKeyW, RegEnumValueW, RegEnumKeyExW
> API_MS_Win_Core_ProcessThreads_L1_1_0.dll: GetCurrentProcessId, GetCurrentThreadId, OpenProcessToken, TerminateProcess, CreateThread, GetExitCodeThread, GetCurrentProcess
> API_MS_Win_Security_Base_L1_1_0.dll: GetSidSubAuthority, GetTokenInformation, FreeSid, CheckTokenMembership, AllocateAndInitializeSid, SetSecurityDescriptorSacl, InitializeAcl, InitializeSecurityDescriptor
> USER32.dll: SetForegroundWindow, DefWindowProcW, RegisterHotKey, MessageBeep, CreateWindowExW, RegisterClassExW, DispatchMessageW, TranslateMessage, GetMessageW, SetTimer, RemovePropW, SetParent, RegisterClassW, SetPropW, CharPrevW, KillTimer, EnumThreadWindows, SetRectEmpty, IsWindowEnabled, GetKeyState, VkKeyScanW, OemKeyScan, DestroyWindow, UnregisterHotKey, RegisterWindowMessageW, SetWindowsHookExW, UnhookWindowsHookEx, EnumWindows, GetCursorPos, WindowFromPoint, IsMenu, SendMessageTimeoutW, SetRect, SetScrollInfo, GetScrollInfo, IsZoomed, GetSystemMetrics, GetMenuStringW, IsRectEmpty, GetMenu, GetMenuState, GetMenuItemID, MenuItemFromPoint, GetSubMenu, GetMenuItemInfoW, GetMenuItemCount, GetClientRect, IntersectRect, GetClassNameW, MapVirtualKeyW, GetKeyNameTextW, GetDlgItem, GetForegroundWindow, LoadCursorW, GetPropW, GetShellWindow, CharNextW, CharLowerBuffW, LoadStringW, IsChild, GetWindow, IsWindow, MapWindowPoints, GetWindowRect, GetDC, SystemParametersInfoW, ReleaseDC, GetKeyboardLayout, PostMessageW, FindWindowExW, GetWindowLongW, FindWindowW, IsWindowVisible, ScreenToClient, PtInRect, ClientToScreen, SendMessageW, GetWindowThreadProcessId, GetDesktopWindow, GetParent
> GDI32.dll: DeleteObject, LPtoDP, GetDCOrgEx, CreateFontW, SelectObject, GetCharABCWidthsW
> KERNEL32.dll: LoadResource, DelayLoadFailureHook, InterlockedCompareExchange, LoadLibraryExA, QueryPerformanceCounter, GetSystemTimeAsFileTime, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GlobalUnlock, lstrlenW, InterlockedDecrement, InterlockedIncrement, InterlockedExchange, CompareStringW, GetLocaleInfoW, LocalAlloc, LocalFree, GetLastError, OpenProcess, CloseHandle, GetVersionExW, GetModuleHandleW, GetProcAddress, FindResourceW, lstrlenA, lstrcatW, GetModuleFileNameW, lstrcpynW, HeapDestroy, lstrcmpiW, lstrcpyW, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, GetModuleHandleExW, K32GetModuleBaseNameW, GlobalAlloc, GlobalFree, GetTickCount, DisableThreadLibraryCalls, FreeLibrary, LoadLibraryExW, LoadLibraryW, WriteProcessMemory, CreateFileMappingW, EnterCriticalSection, LeaveCriticalSection, DuplicateHandle, MapViewOfFile, UnmapViewOfFile, GlobalGetAtomNameW, DeleteCriticalSection, InitializeCriticalSection, GlobalFindAtomW, GlobalDeleteAtom, GlobalAddAtomW, WideCharToMultiByte, SetLastError, GetVersionExA, WaitForSingleObject, Sleep, ReadProcessMemory, GetThreadLocale, lstrcmpW, GlobalLock, MultiByteToWideChar, SizeofResource
> ole32.dll: CoTaskMemRealloc, CoInitialize, CoUnmarshalInterface, CreateStreamOnHGlobal, GetHGlobalFromStream, CoReleaseMarshalData, CoMarshalInterThreadInterfaceInStream, CoInitializeEx, CoGetInterfaceAndReleaseStream, CoUninitialize, CoTaskMemFree, ReleaseStgMedium, CoTaskMemAlloc, CoCreateInstance, HWND_UserSize, HWND_UserMarshal, HWND_UserUnmarshal, HWND_UserFree, HMENU_UserSize, HMENU_UserMarshal, HMENU_UserUnmarshal, HMENU_UserFree, CoMarshalInterface
> RPCRT4.dll: NdrDllGetClassObject, NdrDllCanUnloadNow, NdrCStdStubBuffer_Release, NdrCStdStubBuffer2_Release, NdrDllRegisterProxy, NdrDllUnregisterProxy, CStdStubBuffer_DebugServerRelease, CStdStubBuffer_DebugServerQueryInterface, CStdStubBuffer_CountRefs, CStdStubBuffer_IsIIDSupported, CStdStubBuffer_Invoke, CStdStubBuffer_Disconnect, CStdStubBuffer_Connect, CStdStubBuffer_AddRef, CStdStubBuffer_QueryInterface, NdrStubCall2, NdrStubForwardingFunction, IUnknown_Release_Proxy, IUnknown_AddRef_Proxy, IUnknown_QueryInterface_Proxy, NdrOleFree, NdrOleAllocate
( 24 exports )
AccessibleChildren, AccessibleObjectFromEvent, AccessibleObjectFromPoint, AccessibleObjectFromWindow, CreateStdAccessibleObject, CreateStdAccessibleProxyA, CreateStdAccessibleProxyW, DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer, GetOleaccVersionInfo, GetProcessHandleFromHwnd, GetRoleTextA, GetRoleTextW, GetStateTextA, GetStateTextW, IID_IAccessible, IID_IAccessibleHandler, LIBID_Accessibility, LresultFromObject, ObjectFromLresult, PropMgrClient_LookupProp, WindowFromAccessibleObject
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: DirectShow filter (58.3%)
Windows OCX File (35.7%)
Win32 Executable Generic (2.4%)
Win32 Dynamic Link Library (generic) (2.1%)
Generic Win/DOS Executable (0.5%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: Active Accessibility Core Component
original name: OLEACC.DLL
internal name: OLEACC
file version.: 7.0.0.0 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned