× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48f0d2e5b148bb3fa13cccafa5f5baf8b37104b9597e527c2e0235538a5cd977
File name: 1039608
Detection ratio: 0 / 68
Analysis date: 2018-07-12 05:35:04 UTC ( 1 week, 2 days ago ) View latest
Antivirus Result Update
Ad-Aware 20180712
AegisLab 20180712
AhnLab-V3 20180712
Alibaba 20180711
ALYac 20180712
Antiy-AVL 20180711
Arcabit 20180712
Avast 20180712
Avast-Mobile 20180712
AVG 20180712
Avira (no cloud) 20180710
AVware 20180712
Babable 20180406
Baidu 20180711
BitDefender 20180712
Bkav 20180712
CAT-QuickHeal 20180711
ClamAV 20180711
CMC 20180712
Comodo 20180712
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180712
Cyren 20180712
DrWeb 20180712
eGambit 20180712
Emsisoft 20180712
Endgame 20180711
ESET-NOD32 20180712
F-Prot 20180712
F-Secure 20180712
Fortinet 20180712
GData 20180712
Ikarus 20180711
Sophos ML 20180601
Jiangmin 20180712
K7AntiVirus 20180711
K7GW 20180711
Kaspersky 20180712
Kingsoft 20180712
Malwarebytes 20180712
MAX 20180712
McAfee 20180712
McAfee-GW-Edition 20180712
Microsoft 20180712
eScan 20180712
NANO-Antivirus 20180712
Palo Alto Networks (Known Signatures) 20180712
Panda 20180711
Qihoo-360 20180712
Rising 20180712
SentinelOne (Static ML) 20180701
Sophos AV 20180712
SUPERAntiSpyware 20180712
Symantec 20180711
TACHYON 20180712
Tencent 20180712
TheHacker 20180710
TotalDefense 20180711
TrendMicro 20180712
TrendMicro-HouseCall 20180712
Trustlook 20180712
VBA32 20180711
VIPRE 20180712
ViRobot 20180711
Webroot 20180712
Yandex 20180711
Zillya 20180711
ZoneAlarm by Check Point 20180712
Zoner 20180711
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
(c) 2018 Secured Globe, Inc. All rights reserved.

Product Windows Credentials Viewer
Original name Credentials Viewer
Internal name Credentials Viewer
File version 1, 0, 0, 7
Description Windows Credentials Viewer
Signature verification Signed file, verified signature
Signing date 10:05 PM 2/2/2018
Signers
[+] Secured Globe, Inc.
Status Valid
Issuer thawte SHA256 Code Signing CA
Valid from 1:00 AM 10/4/2017
Valid to 12:59 AM 10/5/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 38FF137A785358278564C5728A56F45E22C16072
Serial number 2D B9 55 BE 38 3D F7 E5 02 D4 85 EB 0E 55 AB 29
[+] thawte SHA256 Code Signing CA
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint D00CFDBF46C98A838BC10DC4E097AE0152C461BC
Serial number 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] DigiCert Timestamp Responder
Status Valid
Issuer DigiCert Assured ID CA-1
Valid from 1:00 AM 10/22/2014
Valid to 1:00 AM 10/22/2024
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 614D271D9102E30169822487FDE5DE00A352B01D
Serial number 03 01 9A 02 3A FF 58 B1 6B D6 D5 EA E6 17 F0 66
[+] DigiCert Assured ID CA-1
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2021
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing
Algorithm sha1RSA
Thumbrint 19A09B5A36F4DD99727DF783C17A51231A56C117
Serial number 06 FD F9 03 96 03 AD EA 00 0A EB 3F 27 BB BA 1B
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-02-02 21:05:16
Entry Point 0x001C87F2
Number of sections 5
PE sections
Overlays
MD5 f16b9a9396afdbb86db1c1c224670997
File type data
Offset 4756480
Size 7960
Entropy 7.26
PE imports
GetTokenInformation
RegCreateKeyExW
RegEnumValueW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegDeleteValueW
RegEnumKeyExW
RegOpenKeyExW
RegEnumKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
_TrackMouseEvent
InitCommonControlsEx
ImageList_AddMasked
CryptUnprotectData
SetDIBits
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
DeleteObject
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
GetDIBits
SetTextAlign
StretchBlt
Escape
ScaleViewportExtEx
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
FrameRgn
SelectPalette
PtVisible
ExtSelectClipRgn
ScaleWindowExtEx
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
CreateFontIndirectW
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
RoundRect
SetWindowOrgEx
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateFontW
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
Ellipse
ImmReleaseContext
ImmGetContext
ImmGetOpenStatus
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
SetEndOfFile
HeapDestroy
EncodePointer
GetFileAttributesW
lstrcmpW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
EnumSystemLocalesW
SetErrorMode
GetSystemDirectoryW
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
WideCharToMultiByte
GetDiskFreeSpaceW
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
GetProfileIntW
ResumeThread
LocalLock
CreateEventW
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
OutputDebugStringA
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
GetSystemTime
InitializeCriticalSection
CopyFileW
OutputDebugStringW
GetModuleFileNameW
TryEnterCriticalSection
IsDebuggerPresent
HeapAlloc
LoadLibraryA
VerSetConditionMask
LockFileEx
GetPrivateProfileStringA
SetThreadPriority
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
GetModuleHandleA
GlobalAddAtomW
CreateThread
SetEnvironmentVariableW
GetSystemDefaultUILanguage
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
GetModuleHandleExW
VirtualQuery
ReadConsoleW
GetCurrentThreadId
WriteConsoleW
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GlobalGetAtomNameW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
InitializeCriticalSectionEx
RtlUnwind
GlobalFindAtomW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
DeleteFileA
GetDateFormatW
GetStartupInfoW
SetEvent
DeleteFileW
GetProcAddress
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
WriteFile
GetTimeFormatW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
lstrcmpA
GetDiskFreeSpaceA
HeapValidate
CompareStringA
CreateFileMappingA
FindFirstFileW
IsValidLocale
DuplicateHandle
GetUserDefaultLCID
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetConsoleWindow
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LocalUnlock
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
HeapCreate
GetSystemInfo
GlobalFree
GetConsoleCP
CompareStringW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
GetShortPathNameA
HeapCompact
WaitForSingleObjectEx
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
LockFile
GetCommandLineW
HeapQueryInformation
GetCPInfo
HeapSize
WritePrivateProfileStringW
RaiseException
UnhandledExceptionFilter
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
UnlockFileEx
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
lstrcmpiW
IsValidCodePage
UnmapViewOfFile
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
LoadTypeLib
SysFreeString
VariantInit
DragQueryFileW
DragFinish
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
SHBrowseForFolderW
PathFindFileNameW
SHGetValueA
PathRemoveFileSpecW
PathIsUNCW
StrCatW
PathFindExtensionW
StrFormatKBSizeW
PathStripToRootW
PathFileExistsA
RedrawWindow
GetMessagePos
SetWindowRgn
SetMenuItemBitmaps
DrawTextW
SetRectEmpty
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
GetActiveWindow
WindowFromPoint
CopyRect
DrawIcon
GetMessageTime
SetMenuItemInfoW
SendMessageW
SetActiveWindow
GetMenuItemID
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetMenu
IsDialogMessageW
UnregisterClassW
GetClassInfoW
DefMDIChildProcW
SetMenuDefaultItem
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
TrackPopupMenu
ClientToScreen
GetTopWindow
OpenClipboard
GetWindowTextW
CopyAcceleratorTableW
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
GetKeyState
MapVirtualKeyW
DrawEdge
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
EnumDisplayMonitors
PeekMessageW
TranslateMDISysAccel
InsertMenuItemW
SetWindowPlacement
GetDC
CharUpperW
LoadIconW
EnableWindow
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetClipboardData
CreateIconFromResourceEx
GetIconInfo
SetParent
RegisterClassW
IsZoomed
GetWindowPlacement
DestroyWindow
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
TrackPopupMenuEx
DrawFocusRect
GetScrollRange
CreateMenu
LoadStringW
ShowOwnedPopups
FillRect
MonitorFromPoint
SetWindowContextHelpId
GetSysColorBrush
GetDialogBaseUnits
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
CheckDlgButton
GetMenuItemInfoW
IsChild
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
LockWindowUpdate
IsIconic
EmptyClipboard
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
CopyIcon
KillTimer
TrackMouseEvent
GetComboBoxInfo
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
DrawTextExW
PostMessageW
InvalidateRect
GetScrollInfo
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
PtInRect
DrawIconEx
CharUpperBuffW
SetWindowTextW
SetTimer
GetDlgItem
RemovePropW
SetCursor
BringWindowToTop
ScreenToClient
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
DestroyAcceleratorTable
BeginDeferWindowPos
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
DispatchMessageW
InsertMenuW
SetForegroundWindow
GetClientRect
NotifyWinEvent
SetFocus
GetMenuStringW
GetAsyncKeyState
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
SetLayeredWindowAttributes
EndDialog
HideCaret
GetKeyboardLayout
CreateAcceleratorTableW
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
DeferWindowPos
ShowScrollBar
MessageBoxW
DefFrameProcW
UnhookWindowsHookEx
MoveWindow
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
LookupIconIdFromDirectoryEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
GetDoubleClickTime
DestroyIcon
IsWindowVisible
WinHelpW
LoadBitmapW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CharNextW
CallWindowProcW
GetClassNameW
ModifyMenuW
ValidateRect
IsRectEmpty
IsMenu
GetFocus
wsprintfW
CloseClipboard
TranslateAcceleratorW
SetMenu
GetMenuCheckMarkDimensions
IsAppThemed
GetThemeSysColor
GetThemeColor
GetCurrentThemeName
DrawThemeText
OpenThemeData
DrawThemeParentBackground
CloseThemeData
DrawThemeBackground
GetWindowTheme
IsThemeBackgroundPartiallyTransparent
GetThemePartSize
WinHttpSetOption
WinHttpConnect
WinHttpQueryHeaders
WinHttpReadData
WinHttpGetIEProxyConfigForCurrentUser
WinHttpSetTimeouts
WinHttpQueryDataAvailable
WinHttpWriteData
WinHttpCrackUrl
WinHttpCloseHandle
WinHttpGetProxyForUrl
WinHttpAddRequestHeaders
WinHttpReceiveResponse
WinHttpOpen
WinHttpOpenRequest
WinHttpSendRequest
InternetGetConnectedState
PlaySoundW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
WSAStartup
WSASetLastError
WSACleanup
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleLockRunning
CLSIDFromProgID
OleTranslateAccelerator
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
CreateStreamOnHGlobal
OleFlushClipboard
IsAccelerator
CoCreateGuid
RegisterDragDrop
RevokeDragDrop
CoRegisterMessageFilter
OleGetClipboard
OleDuplicateData
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoTaskMemAlloc
CoInitializeEx
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CoUninitialize
OleCreateMenuDescriptor
CoFreeUnusedLibraries
ReleaseStgMedium
CoDisconnectObject
OleIsCurrentClipboard
CoTaskMemFree
OleUIBusyW
Number of PE resources by type
PNG 553
RT_BITMAP 60
RT_STRING 29
RT_CURSOR 28
RT_GROUP_CURSOR 27
RT_DIALOG 25
RT_ICON 18
STYLE_XML 5
RT_GROUP_ICON 5
Struct(241) 2
RT_MENU 2
Struct(240) 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 745
CHINESE SIMPLIFIED 11
ENGLISH NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.7

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2710528

EntryPoint
0x1c87f2

OriginalFileName
Credentials Viewer

MIMEType
application/octet-stream

LegalCopyright
(c) 2018 Secured Globe, Inc. All rights reserved.

FileVersion
1, 0, 0, 7

TimeStamp
2018:02:02 22:05:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Credentials Viewer

ProductVersion
1.0.0.7

FileDescription
Windows Credentials Viewer

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Secured Globe, Inc.

CodeSize
2081280

ProductName
Windows Credentials Viewer

ProductVersionNumber
1.0.0.7

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 7428c3b343593a19a3a901601cc908c6
SHA1 74dab6a5e11252390d16460038ce9b71b3d5c148
SHA256 48f0d2e5b148bb3fa13cccafa5f5baf8b37104b9597e527c2e0235538a5cd977
ssdeep
98304:vxnOEBY1G2Kgebjsri5m7l1fSwBL5vPZjl5hPXMFLOAkGkzdnEVomFHKnPKA:vpyreb2iOBL5vPRl5hPXMFLOyomFHKnV

authentihash 79cdfa3e21ff00916eeb6f388052d768c4f4308dbc9b669a4c5691f255915b4f
imphash 421ef18d71c645bee3cacb4c16d8ab33
File size 4.5 MB ( 4764440 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (72.2%)
Win64 Executable (generic) (17.1%)
Win32 Dynamic Link Library (generic) (4.0%)
Win32 Executable (generic) (2.7%)
OS/2 Executable (generic) (1.2%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-03-09 14:15:59 UTC ( 4 months, 2 weeks ago )
Last submission 2018-05-27 08:24:38 UTC ( 1 month, 3 weeks ago )
File names Credentials Viewer
WindowsCredentialsViewer.exe
1039608
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!