× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 5a60d6c737fe023595ddf6ed1f7331a66a52d92aed16aa2ac64110e2742eaee7
Dateiname: setup_TLABPro_latest.exe
Erkennungsrate: 0 / 66
Analyse-Datum: 2018-03-20 07:23:19 UTC ( vor 1 Monat )
Antivirus Ergebnis Aktualisierung
Ad-Aware 20180320
AegisLab 20180320
AhnLab-V3 20180319
Alibaba 20180320
ALYac 20180320
Antiy-AVL 20180320
Arcabit 20180320
Avast 20180320
Avast-Mobile 20180319
AVG 20180320
Avira (no cloud) 20180320
AVware 20180320
Baidu 20180320
BitDefender 20180320
Bkav 20180319
CAT-QuickHeal 20180320
ClamAV 20180320
CMC 20180320
Comodo 20180320
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180320
Cyren 20180320
DrWeb 20180320
eGambit 20180320
Emsisoft 20180320
Endgame 20180316
ESET-NOD32 20180320
F-Prot 20180320
F-Secure 20180320
Fortinet 20180320
GData 20180320
Ikarus 20180319
Sophos ML 20180121
Jiangmin 20180320
K7AntiVirus 20180320
K7GW 20180320
Kaspersky 20180320
Kingsoft 20180320
Malwarebytes 20180320
MAX 20180320
McAfee 20180320
McAfee-GW-Edition 20180320
Microsoft 20180320
eScan 20180320
NANO-Antivirus 20180320
nProtect 20180320
Palo Alto Networks (Known Signatures) 20180320
Panda 20180319
Qihoo-360 20180320
Rising 20180320
SentinelOne (Static ML) 20180225
Sophos AV 20180320
SUPERAntiSpyware 20180320
Symantec 20180320
Symantec Mobile Insight 20180311
Tencent 20180320
TheHacker 20180319
TrendMicro 20180320
TrendMicro-HouseCall 20180320
Trustlook 20180320
VBA32 20180319
VIPRE 20180320
ViRobot 20180320
Webroot 20180320
WhiteArmor 20180223
Yandex 20180319
Zillya 20180319
ZoneAlarm by Check Point 20180320
Zoner 20180320
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2008-2018 by Ralph Welz

Product TrainingLab Pro Version
File version 7.3.8.18
Description TrainingLab Pro Version Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009C40
Number of sections 8
PE sections
Overlays
MD5 da2a5ae306edef13ba60871b94d63970
File type data
Offset 54272
Size 19426067
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
DUTCH 4
ENGLISH US 3
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
17920

ImageVersion
6.0

ProductName
TrainingLab Pro Version

FileVersionNumber
7.3.8.18

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
2.25

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
7.3.8.18

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
7.38

FileDescription
TrainingLab Pro Version Setup

OSVersion
1.0

FileOS
Win32

LegalCopyright
Copyright 2008-2018 by Ralph Welz

MachineType
Intel 386 or later, and compatibles

CompanyName
WRPSoft

CodeSize
37888

FileSubtype
0

ProductVersionNumber
7.3.8.18

EntryPoint
0x9c40

ObjectFileType
Executable application

File identification
MD5 35cd7def05fd8fc9e7977cf3269af1dc
SHA1 cee2a87bc07b6adab7e88d2ab3c775e66c18efb1
SHA256 5a60d6c737fe023595ddf6ed1f7331a66a52d92aed16aa2ac64110e2742eaee7
ssdeep
393216:R1+rzA2cMrpphnLuG6f0UD8dIaZeOUB0WzisiZhlX7:+XCMrnkG6MUDoel5zmZXX7

authentihash 9590299ef320dfe5bfe3ab58e99f0fd84c70ecea7e46e3bd483f8742170559b8
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 18.6 MB ( 19480339 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (76.6%)
Win32 Executable Delphi generic (9.9%)
Win32 Dynamic Link Library (generic) (4.5%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-03-20 07:23:19 UTC ( vor 1 Monat )
Last submission 2018-03-20 07:23:19 UTC ( vor 1 Monat )
Dateinamen setup_TLABPro_latest.exe
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs