× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 12cb7752adbff9aced6549c7a149e6acda5f2b8963a9f7e3f9b3dd729cf4e5cb
File name: cool-iphone-sms-contacts-recovery.exe
Detection ratio: 0 / 68
Analysis date: 2018-06-14 06:07:02 UTC ( 1 week, 3 days ago ) View latest
Antivirus Result Update
Ad-Aware 20180614
AegisLab 20180614
AhnLab-V3 20180613
Alibaba 20180614
ALYac 20180614
Antiy-AVL 20180614
Arcabit 20180614
Avast 20180614
Avast-Mobile 20180613
AVG 20180614
AVware 20180614
Babable 20180406
Baidu 20180614
BitDefender 20180614
Bkav 20180613
CAT-QuickHeal 20180614
ClamAV 20180613
CMC 20180613
Comodo 20180613
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180614
Cyren 20180614
DrWeb 20180614
eGambit 20180614
Emsisoft 20180614
Endgame 20180612
ESET-NOD32 20180614
F-Prot 20180614
F-Secure 20180614
Fortinet 20180614
GData 20180614
Ikarus 20180613
Sophos ML 20180601
Jiangmin 20180613
K7AntiVirus 20180614
K7GW 20180614
Kaspersky 20180614
Kingsoft 20180614
Malwarebytes 20180614
MAX 20180614
McAfee 20180614
McAfee-GW-Edition 20180613
Microsoft 20180614
eScan 20180614
NANO-Antivirus 20180614
Palo Alto Networks (Known Signatures) 20180614
Panda 20180613
Qihoo-360 20180614
Rising 20180614
SentinelOne (Static ML) 20180225
Sophos AV 20180614
SUPERAntiSpyware 20180614
Symantec 20180614
Symantec Mobile Insight 20180614
TACHYON 20180614
Tencent 20180614
TheHacker 20180613
TotalDefense 20180614
TrendMicro 20180614
TrendMicro-HouseCall 20180614
Trustlook 20180614
VBA32 20180613
VIPRE 20180614
ViRobot 20180614
Webroot 20180614
Yandex 20180613
Zillya 20180613
ZoneAlarm by Check Point 20180614
Zoner 20180613
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signers
[+] UUMART LIMITED
Status Valid
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 2/7/2017
Valid to 12:59 AM 4/8/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint E8F0688A9CB21A66D111CCD8531D040D9B3300BE
Serial number 69 7D 1E 44 53 95 DE 77 B0 1B CD 0A 89 C6 29 85
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Packers identified
F-PROT NSIS, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-12-11 21:50:38
Entry Point 0x0000316D
Number of sections 5
PE sections
Overlays
MD5 a7501dc74afe755cc117eaec323cdb93
File type data
Offset 214016
Size 2900216
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
FreeLibrary
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
DeleteFileA
RemoveDirectoryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GetProcAddress
SetEnvironmentVariableA
SetFileAttributesA
GetExitCodeProcess
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 24
RT_ICON 5
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 31
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:12:11 22:50:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
24064

LinkerVersion
6.0

EntryPoint
0x316d

InitializedDataSize
118272

SubsystemVersion
4.0

ImageVersion
6.0

OSVersion
4.0

UninitializedDataSize
1024

File identification
MD5 1237235575542c2a6c70abd72458049d
SHA1 ccf6e9055e0f4c1a10f5620a5bbd492a688a42fb
SHA256 12cb7752adbff9aced6549c7a149e6acda5f2b8963a9f7e3f9b3dd729cf4e5cb
ssdeep
49152:glRZKycwgLBl+IhQk79UNpGp1Vp4QMmpnT7Ildjev:QBoB3X79UNQp1Vp4QMcPCK

authentihash d7ae2ed05ccedd2a3bdf11d5e5f9d064dd1a91641a4b15e5c9215904ef5e4c81
imphash b78ecf47c0a3e24a6f4af114e2d1f5de
File size 3.0 MB ( 3114232 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe signed overlay

VirusTotal metadata
First submission 2017-03-18 04:43:19 UTC ( 1 year, 3 months ago )
Last submission 2018-05-25 04:30:05 UTC ( 1 month ago )
File names cool-iphone-sms-contacts-recovery.exe
12CB7752ADBFF9ACED6549C7A149E6ACDA5F2B8963A9F7E3F9B3DD729CF4E5CB.exe
99b001284644a1c2179cb59f4d03ee261c44a145
cool-iphone-sms-contacts-recovery.exe
994115
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Runtime DLLs
UDP communications