× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1dc46c2e450ab14e173a7d1a0089175ec26f8e0ebfccf401628056563e112861
File name: setupsapa.exe
Detection ratio: 17 / 71
Analysis date: 2018-12-26 04:38:41 UTC ( 1 month, 4 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181224
Avast Win32:Trojan-gen 20181226
AVG Win32:Trojan-gen 20181226
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20181022
Endgame malicious (moderate confidence) 20181108
ESET-NOD32 a variant of Win32/Packed.Themida.BXZ 20181226
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 000141f61 ) 20181225
K7GW Trojan ( 0053d3c51 ) 20181225
Kaspersky Trojan-Downloader.Win32.Phpw.cle 20181226
McAfee-GW-Edition BehavesLike.Win32.Backdoor.rc 20181225
Microsoft Trojan:Win32/Fuerboos.C!cl 20181225
Qihoo-360 HEUR/QVM10.1.1DD1.Malware.Gen 20181226
Rising Malware.Heuristic.MLite(89%) (AI-LITE:IhYm8fYEmXGiSKfdpNsQHQ) 20181226
Trapmine malicious.high.ml.score 20181205
Zillya Dropper.Agent.Win32.374360 20181225
ZoneAlarm by Check Point Trojan-Downloader.Win32.Phpw.cle 20181225
Ad-Aware 20181226
AegisLab 20181225
AhnLab-V3 20181225
Alibaba 20180921
ALYac 20181226
Antiy-AVL 20181225
Arcabit 20181226
Avast-Mobile 20181225
Avira (no cloud) 20181226
Babable 20180918
Baidu 20181207
BitDefender 20181226
Bkav 20181224
CAT-QuickHeal 20181225
ClamAV 20181226
CMC 20181225
Comodo 20181226
Cybereason 20180225
Cylance 20181226
Cyren 20181226
DrWeb 20181226
eGambit 20181226
Emsisoft 20181226
F-Prot 20181226
F-Secure 20181226
Fortinet 20181226
GData 20181226
Ikarus 20181226
Jiangmin 20181226
Kingsoft 20181226
Malwarebytes 20181225
MAX 20181226
McAfee 20181226
eScan 20181226
NANO-Antivirus 20181226
Palo Alto Networks (Known Signatures) 20181226
Panda 20181225
SentinelOne (Static ML) 20181223
Sophos AV 20181226
SUPERAntiSpyware 20181220
Symantec 20181225
Symantec Mobile Insight 20181225
TACHYON 20181226
Tencent 20181226
TheHacker 20181225
TotalDefense 20181223
TrendMicro 20181226
TrendMicro-HouseCall 20181226
Trustlook 20181226
VBA32 20181222
VIPRE 20181226
ViRobot 20181225
Webroot 20181226
Yandex 20181223
Zoner 20181225
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-05-29 18:09:01
Entry Point 0x0001D4B9
Number of sections 6
PE sections
Overlays
MD5 46f1f9e551a6a8fde25550c299d6c659
File type application/x-rar
Offset 279040
Size 12991353
Entropy 8.00
PE imports
GetStdHandle
FileTimeToSystemTime
WaitForSingleObject
FindNextFileA
EncodePointer
GetFileAttributesW
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
OpenFileMappingW
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
GetLocaleInfoW
SetStdHandle
SetFilePointerEx
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
InitializeCriticalSection
LoadResource
AllocConsole
TlsGetValue
MoveFileW
SetFileAttributesW
SetLastError
GetSystemTime
DeviceIoControl
RemoveDirectoryW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
QueryPerformanceFrequency
LoadLibraryExA
SetThreadPriority
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetLocalTime
FoldStringW
GetFullPathNameW
CreateThread
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
CreateSemaphoreW
IsProcessorFeaturePresent
TzSpecificLocalTimeToSystemTime
TerminateProcess
SetUnhandledExceptionFilter
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
RtlUnwind
DecodePointer
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
CompareStringW
GetModuleFileNameW
ExpandEnvironmentStringsW
FindFirstFileExA
FindNextFileW
ResetEvent
FreeConsole
FindFirstFileW
GlobalLock
SetEvent
GetTempPathW
GetProcessAffinityMask
CreateEventW
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
AttachConsole
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
GetSystemInfo
GlobalFree
GetConsoleCP
GetTimeFormatW
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
VirtualQuery
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SetThreadExecutionState
GetLongPathNameW
IsValidCodePage
UnmapViewOfFile
FindResourceW
Sleep
GetOEMCP
CreateHardLinkW
GdiplusShutdown
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdipAlloc
GdipFree
GdipCloneImage
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
Number of PE resources by type
RT_STRING 10
RT_DIALOG 6
PNG 2
RT_ICON 1
RT_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 19
NEUTRAL DEFAULT 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
5.1

MachineType
Intel 386 or later, and compatibles

TimeStamp
2018:05:29 19:09:01+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
190464

LinkerVersion
14.0

FileTypeExtension
exe

InitializedDataSize
87552

ImageFileCharacteristics
Executable, 32-bit

EntryPoint
0x1d4b9

OSVersion
5.1

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 53670db6520853b374a3fa0599383190
SHA1 9847694148f55626175d2e6b21191cfc851bbd32
SHA256 1dc46c2e450ab14e173a7d1a0089175ec26f8e0ebfccf401628056563e112861
ssdeep
196608:Mv59CZxOVv66b7xV0TB+ijNIzl8B2hdXkYcIw3KNroCzlovIU6UhhTc00NLThguK:MB4DOVS63xGTB+irBS0/eovmUDANiL7

authentihash 096a6e2cf94a75c95130bb68dc792b519f678c5010320e97ad0736aca215e54a
imphash 00be6e6c4f9e287672c8301b72bdabf3
File size 12.7 MB ( 13270393 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (61.7%)
Win32 Dynamic Link Library (generic) (14.7%)
Win32 Executable (generic) (10.0%)
OS/2 Executable (generic) (4.5%)
Generic Win/DOS Executable (4.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-12-26 04:38:41 UTC ( 1 month, 4 weeks ago )
Last submission 2018-12-26 04:38:41 UTC ( 1 month, 4 weeks ago )
File names setupsapa.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Runtime DLLs