× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 25896931db48f0f4c9e3681720fb7c89b531d912ce5f11d596078f8d917126b7
File name: unchecky_setup.exe
Detection ratio: 0 / 70
Analysis date: 2019-04-02 04:11:01 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis 20190330
Ad-Aware 20190402
AegisLab 20190402
AhnLab-V3 20190402
Alibaba 20190402
ALYac 20190402
Antiy-AVL 20190402
Arcabit 20190401
Avast 20190402
Avast-Mobile 20190401
AVG 20190402
Avira (no cloud) 20190401
Babable 20180918
Baidu 20190318
BitDefender 20190402
Bkav 20190401
CAT-QuickHeal 20190331
ClamAV 20190401
CMC 20190321
Comodo 20190401
CrowdStrike Falcon (ML) 20190212
Cybereason 20190331
Cylance 20190402
Cyren 20190402
DrWeb 20190402
eGambit 20190402
Emsisoft 20190402
ESET-NOD32 20190402
F-Prot 20190402
F-Secure 20190401
FireEye 20190402
Fortinet 20190402
GData 20190402
Ikarus 20190401
Sophos ML 20190313
Jiangmin 20190402
K7AntiVirus 20190401
K7GW 20190401
Kaspersky 20190402
Kingsoft 20190402
Malwarebytes 20190402
MAX 20190402
McAfee 20190402
McAfee-GW-Edition 20190401
Microsoft 20190402
eScan 20190402
NANO-Antivirus 20190402
Palo Alto Networks (Known Signatures) 20190402
Panda 20190401
Qihoo-360 20190402
Rising 20190402
SentinelOne (Static ML) 20190317
Sophos AV 20190402
SUPERAntiSpyware 20190328
Symantec 20190402
Symantec Mobile Insight 20190325
TACHYON 20190402
Tencent 20190402
TheHacker 20190327
TotalDefense 20190401
Trapmine 20190325
TrendMicro 20190402
TrendMicro-HouseCall 20190402
Trustlook 20190402
VBA32 20190401
ViRobot 20190401
Webroot 20190402
Yandex 20190331
Zillya 20190401
ZoneAlarm by Check Point 20190402
Zoner 20190401
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright Reason Software Company Inc.

Product Unchecky
File version 1.2
Description Unchecky Setup
Signature verification Signed file, verified signature
Signing date 3:39 PM 3/25/2018
Signers
[+] Reason Software Company Inc.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 12:00 AM 11/08/2016
Valid to 11:59 PM 11/09/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 683D7733916AAF9083A4E6D6528BB9266F665B5F
Serial number 43 25 22 FD AE 21 DA B0 DA 93 28 0E 36 83 6C 66
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 12/10/2013
Valid to 11:59 PM 12/09/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-25 14:38:23
Entry Point 0x00085490
Number of sections 3
PE sections
Overlays
MD5 aef360cc30e2b94b12ae5d9ad43a820a
File type data
Offset 255488
Size 1108008
Entropy 8.00
PE imports
InitCommonControlsEx
DeleteDC
GetAdaptersInfo
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
VarUI4FromStr
ShellExecuteExW
SHDeleteKeyW
VerQueryValueW
WinHttpOpen
CheckSumMappedFile
CoTaskMemFree
Number of PE resources by type
RT_STRING 62
RT_ICON 13
RT_DIALOG 4
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 20
ENGLISH US 4
HEBREW DEFAULT 2
SWEDISH 2
HUNGARIAN DEFAULT 2
VIETNAMESE DEFAULT 2
ESTONIAN DEFAULT 2
LITHUANIAN 2
FRENCH 2
INDONESIAN DEFAULT 2
DUTCH 2
SPANISH MEXICAN 2
ITALIAN 2
CATALAN DEFAULT 2
PORTUGUESE BRAZILIAN 2
FINNISH DEFAULT 2
TURKISH DEFAULT 2
KOREAN 2
CZECH DEFAULT 2
PORTUGUESE 2
GERMAN 2
BULGARIAN DEFAULT 2
POLISH DEFAULT 2
JAPANESE DEFAULT 2
DANISH DEFAULT 2
GREEK DEFAULT 2
UKRAINIAN DEFAULT 2
NORWEGIAN BOKMAL 2
CHINESE TRADITIONAL 2
SERBIAN DEFAULT 2
RUSSIAN 2
CHINESE NEUTRAL 2
PE resources
ExifTool file metadata
UninitializedDataSize
319488

LinkerVersion
14.13

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.2.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Unchecky Setup

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
32768

EntryPoint
0x85490

MIMEType
application/octet-stream

LegalCopyright
Copyright Reason Software Company Inc.

FileVersion
1.2

TimeStamp
2018:03:25 15:38:23+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.2

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Reason Software Company Inc.

CodeSize
225280

ProductName
Unchecky

ProductVersionNumber
1.2.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
PE resource-wise parents
File identification
MD5 51e748220686d15e0275ca9984d5972e
SHA1 7b3fcf37990e1c0500dc55a0edbdbbea2d916eba
SHA256 25896931db48f0f4c9e3681720fb7c89b531d912ce5f11d596078f8d917126b7
ssdeep
24576:3Y/wefjMWyNRFrffWegjppY/B3GpltIt4owuPId5Dmx2wdy:+wefjMWc1WeCpY/B22tA3s2wdy

authentihash 62855994b7cb3f11fa8b59446277791cb21a087771abc8d0f658705fe7c83284
imphash 8ca2eaba298066ae623521b3b924710f
File size 1.3 MB ( 1363496 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (38.2%)
Win32 EXE Yoda's Crypter (37.5%)
Win32 Dynamic Link Library (generic) (9.2%)
Win32 Executable (generic) (6.3%)
OS/2 Executable (generic) (2.8%)
Tags
peexe overlay signed upx via-tor

VirusTotal metadata
First submission 2018-04-02 07:56:24 UTC ( 1 year, 1 month ago )
Last submission 2019-05-15 08:42:00 UTC ( 4 days, 2 hours ago )
File names Unchecky_setup.exe
Unchecky 1.2.exe
Unchecky.1.2.0_Soft98.iR.exe
flareFile
unchecky_setup.exe
unchecky_setup-1.2.exe
unchecky_setup.exe
unchecky_setup.exe
unchecky_setup.exe
unchecky_setup(1).exe
unchecky_setup.exe
I.Unchecky.exe
- Unchecky 1.2_setup.exe
unchecky_setup.exe
unchecky_1-2_fr_430279.exe
unchecky_setup.exe
unchecky_setup.exe
unchecky_setup.exe
unchecky_setup.exe
VirusShare_51e748220686d15e0275ca9984d5972e.bin
unchecky_12setup.exe
1038583
unchecky_setup.exe
output.127575741.txt
unchecky_setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created mutexes
Runtime DLLs