× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2f400f0b2fe121b8e5b1415a99dfda2f5502b7aa2e7002ef6e464f0d587dba0f
File name: kingo-android-root_1-5-8_en_431275.exe
Detection ratio: 15 / 69
Analysis date: 2019-03-06 21:36:18 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
CAT-QuickHeal Trojan.IGENERIC 20190306
Comodo ApplicUnwnt@#3fc3umolhfimk 20190306
Cybereason malicious.71a4c2 20190109
Cyren W32/Trojan.YCBE-7318 20190306
DrWeb Tool.SilentInstaller.7.origin 20190306
Emsisoft Application.InstallCore (A) 20190306
Sophos ML heuristic 20181128
K7AntiVirus Riskware ( 0040eff71 ) 20190306
K7GW Riskware ( 0040eff71 ) 20190306
Microsoft PUA:Win32/InstallCore 20190306
Rising PUA.InstallCore!8.8B (CLOUD) 20190306
Symantec Mobile Insight AdLibrary:Generisk 20190220
TrendMicro HT_INSTALLCORE_HD190149.UVPM 20190306
TrendMicro-HouseCall HT_INSTALLCORE_HD190149.UVPM 20190306
Webroot W32.Adware.Gen 20190306
Acronis 20190222
Ad-Aware 20190306
AegisLab 20190306
AhnLab-V3 20190306
Alibaba 20190306
ALYac 20190306
Antiy-AVL 20190306
Arcabit 20190306
Avast 20190306
Avast-Mobile 20190306
AVG 20190306
Avira (no cloud) 20190306
Babable 20180918
Baidu 20190306
BitDefender 20190306
Bkav 20190306
ClamAV 20190306
CMC 20190306
CrowdStrike Falcon (ML) 20190212
Cylance 20190306
eGambit 20190306
Endgame 20190215
ESET-NOD32 20190306
F-Prot 20190306
F-Secure 20190306
Fortinet 20190306
GData 20190306
Ikarus 20190306
Jiangmin 20190306
Kaspersky 20190306
Kingsoft 20190306
Malwarebytes 20190306
MAX 20190306
McAfee 20190306
McAfee-GW-Edition 20190306
eScan 20190306
NANO-Antivirus 20190306
Palo Alto Networks (Known Signatures) 20190306
Panda 20190306
Qihoo-360 20190306
SentinelOne (Static ML) 20190203
Sophos AV 20190306
SUPERAntiSpyware 20190227
Symantec 20190306
TACHYON 20190306
Tencent 20190306
TheHacker 20190304
TotalDefense 20190306
Trapmine 20190301
Trustlook 20190306
VBA32 20190306
VIPRE 20190306
ViRobot 20190306
Yandex 20190306
Zillya 20190304
ZoneAlarm by Check Point 20190306
Zoner 20190306
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) 2013-2018 Kingosoft Technology Ltd.

Product Kingo ROOT
File version 1.5.8.3353
Description Kingo ROOT Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 7:27 AM 3/8/2018
Signers
[+] FingerPower Digital Technology Ltd.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 12:00 AM 10/20/2017
Valid to 11:59 PM 01/19/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint FFE4C772754648C6AD78069B1AE40AAC10988655
Serial number 07 96 F8 1A 8A 0C 6F 7A 89 5B 5E 27 49 85 DB 88
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 12/10/2013
Valid to 11:59 PM 12/09/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT INNO, appended, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-12-20 14:16:50
Entry Point 0x00016478
Number of sections 8
PE sections
Overlays
MD5 1038270aebd317ce869f8be69f7420a4
File type data
Offset 140800
Size 18987880
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 4
DUTCH 4
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
53760

ImageVersion
6.0

ProductName
Kingo ROOT

FileVersionNumber
1.5.8.3353

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

LinkerVersion
2.25

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.5.8.3353

TimeStamp
2011:12:20 15:16:50+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.5.8.3353

FileDescription
Kingo ROOT Setup

OSVersion
5.0

FileOS
Win32

LegalCopyright
Copyright (c) 2013-2018 Kingosoft Technology Ltd.

MachineType
Intel 386 or later, and compatibles

CompanyName
Kingosoft Technology Ltd.

CodeSize
86016

FileSubtype
0

ProductVersionNumber
1.5.8.3353

EntryPoint
0x16478

ObjectFileType
Executable application

File identification
MD5 fff6e0571a4c248c8242fe5bd0a3a583
SHA1 eab5d36dbbf8ba170b9c8e8196bf89953f75b931
SHA256 2f400f0b2fe121b8e5b1415a99dfda2f5502b7aa2e7002ef6e464f0d587dba0f
ssdeep
393216:g9oFlWgKHM+0Z8NFDO/wqMKlBngr8InY/3cqgYkqFhbTVsq3+A:eovpoMpOvDOY4vW8IwcnYdTVsLA

authentihash bd5a57e478ab978d8b63224c3ba8322f5dc511764c818d8dcd985eb66fe5cc55
imphash 483f0c4259a9148c34961abbda6146c1
File size 18.2 MB ( 19128680 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (89.6%)
Win32 Executable (generic) (3.6%)
Win16/32 Executable Delphi generic (1.6%)
OS/2 Executable (generic) (1.6%)
Generic Win/DOS Executable (1.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-03-16 06:24:57 UTC ( 1 year, 1 month ago )
Last submission 2019-04-12 22:10:13 UTC ( 1 week ago )
File names KingoRootSetup.1.5.8.3353.exe
KingoRootSetup.1.5.8.3353.exe
android_root_1.5.8.sanet.cd.exe
KingoRoot von chip - android158_root.exe
android_root.exe
android_root.exe
KingoRootSetup.exe
android_root (1).exe
kingo-android-root_1-5-8_en_431275.exe
kingo-android-root-7365-jetelecharge.exe
android_root.exe
android_root.exe
android_root.exe
KingoRootSetup.1.5.8.3353.exe
output.114779569.txt
Kingo.Android.Root.1.5.8.3353.exe
android158_root.exe
android_root_1.5.8.exe
ANDROID_ROOT_1.5.8.EXE
android158_root(1).exe
Kingo_root.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs