× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1cf56a922816b50fdeaecaa9054dcc4f76707faaaaf61b467aa035428654bf31
File name: SetupFractalius.exe
Detection ratio: 1 / 66
Analysis date: 2019-04-15 14:19:02 UTC ( 1 month ago ) View latest
Antivirus Result Update
Jiangmin Downloader.Generic.lwy 20190415
Acronis 20190415
Ad-Aware 20190415
AegisLab 20190415
AhnLab-V3 20190415
Alibaba 20190402
ALYac 20190415
Antiy-AVL 20190415
Arcabit 20190415
Avast 20190415
Avast-Mobile 20190415
AVG 20190415
Avira (no cloud) 20190415
Baidu 20190318
BitDefender 20190415
Bkav 20190412
CAT-QuickHeal 20190414
ClamAV 20190415
CMC 20190321
Comodo 20190415
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190415
DrWeb 20190415
eGambit 20190415
Emsisoft 20190415
Endgame 20190403
ESET-NOD32 20190415
F-Secure 20190415
FireEye 20190415
Fortinet 20190415
GData 20190415
Ikarus 20190415
Sophos ML 20190313
K7AntiVirus 20190415
K7GW 20190415
Kaspersky 20190415
Kingsoft 20190415
Malwarebytes 20190415
MAX 20190415
McAfee 20190415
McAfee-GW-Edition 20190415
Microsoft 20190415
eScan 20190415
NANO-Antivirus 20190415
Palo Alto Networks (Known Signatures) 20190415
Panda 20190415
Qihoo-360 20190415
Rising 20190415
SentinelOne (Static ML) 20190407
Sophos AV 20190415
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190415
Tencent 20190415
TheHacker 20190411
TotalDefense 20190413
Trapmine 20190325
TrendMicro-HouseCall 20190415
Trustlook 20190415
VBA32 20190415
VIPRE 20190415
ViRobot 20190415
Yandex 20190412
Zillya 20190415
ZoneAlarm by Check Point 20190415
Zoner 20190415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-11-30 17:32:01
Entry Point 0x00006901
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
GetObjectA
SetPixel
DeleteDC
SetBkMode
GetTextExtentPoint32A
BitBlt
CreateDIBitmap
TextOutA
CreateFontIndirectA
SelectObject
DeleteObject
SetPixelV
CreateCompatibleDC
GetPixel
SetTextColor
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
GetConsoleOutputCP
ReleaseMutex
SetHandleCount
lstrlenA
GetConsoleCP
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
LCMapStringW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
HeapCreate
SizeofResource
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
SetLastError
lstrcatA
CreateDirectoryA
TlsGetValue
GetCPInfo
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
TlsFree
GetProcessHeap
SetStdHandle
CreateMutexA
GetModuleHandleA
RaiseException
WideCharToMultiByte
GetStringTypeA
SetFilePointer
lstrcmpA
ReadFile
SetUnhandledExceptionFilter
lstrcpyA
GetStartupInfoA
EnumResourceNamesA
CloseHandle
GetSystemTimeAsFileTime
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
ExitProcess
TerminateProcess
GetEnvironmentStrings
LCMapStringA
WriteConsoleA
IsValidCodePage
LoadResource
WriteFile
VirtualFree
InterlockedIncrement
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
FindResourceA
VirtualAlloc
SetCurrentDirectoryA
WriteConsoleW
LeaveCriticalSection
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
EndDialog
BeginPaint
LoadBitmapA
SetWindowPos
SendDlgItemMessageA
GetWindowRect
EndPaint
PostMessageA
MoveWindow
MessageBoxA
IsCharAlphaA
DialogBoxParamA
CharUpperA
GetDC
ReleaseDC
SendMessageA
GetClientRect
GetDlgItem
ScreenToClient
SetRect
InvalidateRect
wsprintfA
LoadCursorA
ClientToScreen
DialogBoxIndirectParamA
SetCursor
Number of PE resources by type
RT_BITMAP 8
RT_ICON 2
RT_DIALOG 1
Struct(3000) 1
Struct(3001) 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 17
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:11:30 18:32:01+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
69120

LinkerVersion
9.0

FileTypeExtension
exe

InitializedDataSize
2092544

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x6901

OSVersion
5.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 950dff4b281bfd7af9b84530ddd1dffd
SHA1 90a03bb548ffd5c6229369e447e8a456c6c382ac
SHA256 1cf56a922816b50fdeaecaa9054dcc4f76707faaaaf61b467aa035428654bf31
ssdeep
12288:BWPYEhlxtYQjZFKchlxtYeWZicLP7cyamsKP:BWPYEhl/jZFKchl9WZicLA8J

authentihash 9a1a9cce685c108b1a995ba7acb0e27dd0f409a8d6238fd76fc392bd2d13e39a
imphash cecef18aed69d0f3942110fa6846fc0a
File size 2.1 MB ( 2162688 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Photoshop filter plug-in (40.4%)
PhotoShop plug-in (generic) (36.3%)
Win32 Executable MS Visual C++ (generic) (7.8%)
Win64 Executable (generic) (6.9%)
Microsoft Visual C++ compiled executable (generic) (4.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-11-30 17:43:28 UTC ( 5 months, 2 weeks ago )
Last submission 2019-02-17 21:13:06 UTC ( 3 months ago )
File names SetupFractalius.exe
Fractalius 18.11 Orig.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created mutexes