× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 60617f1b4fdea436441f750dbcc0cf75709d94d296c80360db98e184fa235879
File name: pad
Detection ratio: 0 / 68
Analysis date: 2018-07-12 04:56:11 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180712
AegisLab 20180712
AhnLab-V3 20180712
Alibaba 20180711
ALYac 20180712
Antiy-AVL 20180711
Arcabit 20180712
Avast 20180712
Avast-Mobile 20180712
AVG 20180712
Avira (no cloud) 20180710
AVware 20180712
Babable 20180406
Baidu 20180711
BitDefender 20180712
Bkav 20180712
CAT-QuickHeal 20180711
ClamAV 20180711
CMC 20180712
Comodo 20180712
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180712
Cyren 20180712
DrWeb 20180712
eGambit 20180712
Emsisoft 20180712
Endgame 20180711
ESET-NOD32 20180712
F-Prot 20180712
F-Secure 20180712
Fortinet 20180712
GData 20180712
Ikarus 20180711
Sophos ML 20180601
Jiangmin 20180712
K7AntiVirus 20180711
K7GW 20180711
Kaspersky 20180712
Kingsoft 20180712
Malwarebytes 20180712
MAX 20180712
McAfee 20180712
McAfee-GW-Edition 20180712
Microsoft 20180712
eScan 20180712
NANO-Antivirus 20180712
Palo Alto Networks (Known Signatures) 20180712
Panda 20180711
Qihoo-360 20180712
Rising 20180712
SentinelOne (Static ML) 20180701
Sophos AV 20180712
SUPERAntiSpyware 20180712
Symantec 20180711
TACHYON 20180712
Tencent 20180712
TheHacker 20180710
TotalDefense 20180711
TrendMicro 20180712
TrendMicro-HouseCall 20180712
Trustlook 20180712
VBA32 20180711
VIPRE 20180712
ViRobot 20180711
Webroot 20180712
Yandex 20180711
Zillya 20180711
ZoneAlarm by Check Point 20180712
Zoner 20180711
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 2017-2018. Cyclonis Limited. All rights reserved.

Product Installer
Original name Installer.exe
Internal name Installer.exe
File version 2.2.565.2499
Description Cyclonis Installer
Signature verification Signed file, verified signature
Signing date 1:11 PM 6/7/2018
Signers
[+] Cyclonis Limited
Status Valid
Issuer Symantec Class 3 Extended Validation Code Signing CA - G2
Valid from 1:00 AM 2/17/2017
Valid to 12:59 AM 2/18/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 1832B8B9A61D2CFFE3F93656C43031965B8C5B24
Serial number 12 77 49 1E D7 26 14 69 35 CD 35 11 AE 6D 7C 5C
[+] Symantec Class 3 Extended Validation Code Signing CA - G2
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 3/4/2014
Valid to 12:59 AM 3/4/2024
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 5B8F88C80A73D35F76CD412A9E74E916594DFA67
Serial number 19 1A 32 CB 75 9C 97 B8 CF AC 11 8D D5 12 7F 49
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-04-19 14:00:42
Entry Point 0x001F3BDD
Number of sections 6
PE sections
Overlays
MD5 a92523db1d9db5615df99428f0c6ac6e
File type data
Offset 5391872
Size 13440
Entropy 7.34
PE imports
RegCreateKeyExW
SetSecurityDescriptorOwner
RegCloseKey
GetExplicitEntriesFromAclW
ConvertSidToStringSidW
AccessCheck
OpenServiceW
AdjustTokenPrivileges
ControlService
InitializeAcl
RegSetKeySecurity
RegDeleteKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
OpenProcessToken
DeregisterEventSource
GetUserNameW
DuplicateToken
AddAccessAllowedAce
RegOpenKeyExW
RegisterEventSourceA
GetTokenInformation
CloseServiceHandle
RegQueryInfoKeyW
SetEntriesInAclW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
RegDeleteValueW
RegSetValueExW
FreeSid
OpenSCManagerW
RegEnumValueW
AllocateAndInitializeSid
InitializeSecurityDescriptor
QueryServiceStatusEx
RegSaveKeyExW
LookupPrivilegeValueW
ReportEventA
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
IsValidSecurityDescriptor
Ord(412)
Ord(413)
Ord(410)
CertFreeCertificateContext
CertEnumCertificatesInStore
CertCloseStore
CertOpenSystemStoreW
GetTextMetricsW
TextOutW
CreatePen
SaveDC
ExtSelectClipRgn
CombineRgn
SetStretchBltMode
Rectangle
GetDeviceCaps
ExcludeClipRect
LineTo
DeleteDC
RestoreDC
SetBkMode
GetObjectW
BitBlt
SetTextColor
ExtTextOutW
IntersectClipRect
GetTextExtentPoint32W
MoveToEx
SetViewportOrgEx
GetDIBits
SetTextAlign
SelectClipRgn
CreateCompatibleDC
CreateFontW
GetBkColor
SetBrushOrgEx
CreateRectRgn
SelectObject
GetTextColor
CreateSolidBrush
ExtCreatePen
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapAlloc
GetFileAttributesW
VerifyVersionInfoW
GetVolumePathNamesForVolumeNameW
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
LoadLibraryExW
GetLogicalDrives
FreeEnvironmentStringsW
lstrcatW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
TlsGetValue
QueryDosDeviceW
MoveFileW
SetFileAttributesW
GetStringTypeExA
SetLastError
GetSystemTime
DeviceIoControl
ReadConsoleInputA
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
FindNextVolumeW
lstrcmpiW
VerSetConditionMask
EnumSystemLocalesA
SetConsoleCtrlHandler
GetUserDefaultLCID
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
FormatMessageA
GetModuleHandleA
InterlockedExchangeAdd
CreateThread
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
DeleteCriticalSection
SetUnhandledExceptionFilter
CreateMutexW
GetVolumeNameForVolumeMountPointW
IsProcessorFeaturePresent
ExitThread
SetHandleInformation
SetEnvironmentVariableA
WaitForMultipleObjectsEx
GlobalMemoryStatus
WriteConsoleA
GlobalAlloc
SetEndOfFile
SetWaitableTimer
GetProcAddress
HeapCreate
WriteConsoleW
MulDiv
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
SetHandleCount
LoadLibraryW
GetLastError
FindVolumeClose
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
SystemTimeToFileTime
GetEnvironmentStrings
GetFileSize
LCMapStringW
OpenProcess
DeleteFileA
GetStartupInfoW
SetVolumeMountPointW
DeleteFileW
GlobalLock
GetProcessHeap
CreateFileMappingW
EnumResourceNamesW
CompareStringW
lstrcpyW
GetFileSizeEx
RemoveDirectoryW
GetFileInformationByHandle
FindNextFileW
CreateDirectoryW
InterlockedIncrement
GetTimeFormatA
ResetEvent
CreateWaitableTimerA
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
SetEvent
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
FindFirstVolumeW
LeaveCriticalSection
DefineDosDeviceW
FlushConsoleInputBuffer
GetComputerNameW
UnmapViewOfFile
GetSystemInfo
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
WaitForSingleObjectEx
lstrlenW
Process32NextW
CreateProcessW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCurrentDirectoryA
HeapSize
CloseHandle
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
lstrcpynW
ExpandEnvironmentStringsW
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
SetFilePointer
DeleteVolumeMountPointW
ReadFile
FindFirstFileA
OpenMutexW
SetDllDirectoryW
GetACP
GetModuleHandleW
GetVersion
GetLongPathNameW
CreateProcessA
WideCharToMultiByte
IsValidCodePage
SetConsoleMode
FindResourceW
SleepEx
VirtualFree
Sleep
TerminateProcess
OpenEventA
VirtualAlloc
CompareStringA
VarUI4FromStr
SysFreeString
VariantClear
VariantInit
SysAllocString
SHOpenFolderAndSelectItems
ShellExecuteW
ShellExecuteExW
SHParseDisplayName
StrCmpNIW
Ord(1)
StrCmpIW
SetFocus
SetWindowRgn
RedrawWindow
DestroyMenu
PostQuitMessage
LockSetForegroundWindow
SetWindowPos
IsWindow
EndPaint
GetDC
GetCursorPos
ReleaseDC
SendMessageW
UnregisterClassA
GetClassInfoW
AllowSetForegroundWindow
DrawTextW
LoadImageW
GetActiveWindow
GetWindowTextLengthW
LoadAcceleratorsW
DestroyWindow
GetUserObjectInformationW
GetClassInfoExW
UpdateWindow
EnumWindows
GetMessageW
ShowWindow
PeekMessageW
EnableWindow
TranslateMessage
IsWindowEnabled
GetWindow
LoadStringA
RegisterClassW
IsZoomed
LoadStringW
IsIconic
TrackPopupMenuEx
SetTimer
IsDialogMessageW
MonitorFromPoint
CreateWindowExW
GetWindowLongW
GetWindowInfo
PtInRect
MapWindowPoints
GetMonitorInfoW
BeginPaint
OffsetRect
DefWindowProcW
KillTimer
TrackMouseEvent
GetParent
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
GetMessageExtraInfo
GetProcessWindowStation
CreatePopupMenu
SetWindowTextW
GetDlgItem
BringWindowToTop
ScreenToClient
PostMessageW
GetMenuItemCount
LoadCursorW
LoadIconW
FindWindowExW
DispatchMessageW
SetForegroundWindow
ExitWindowsEx
GetMenuItemInfoW
EndDialog
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
MessageBoxW
RegisterClassExW
MoveWindow
DialogBoxParamW
MessageBoxA
AppendMenuW
GetWindowDC
AdjustWindowRectEx
IsCharAlphaNumericA
UpdateLayeredWindow
IsWindowVisible
MonitorFromWindow
SetRect
InvalidateRect
CharNextW
CallWindowProcW
GetClientRect
GetFocus
wsprintfW
TranslateAcceleratorW
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
getaddrinfo
shutdown
accept
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
WSASetLastError
WSAGetLastError
gethostname
getsockopt
closesocket
send
ntohs
select
listen
__WSAFDIsSet
WSACleanup
getpeername
recv
WSAIoctl
setsockopt
socket
bind
recvfrom
sendto
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipImageRotateFlip
GdipGetImageHeight
GdipSetPixelOffsetMode
GdipSetImageAttributesColorKeys
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipCreateTextureIAI
GdipDisposeImage
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipDrawImagePointRectI
GdipCreateImageAttributes
GdipCreateFromHDC
GdipCloneBrush
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipDrawImageRectRectI
GdipFillRectangleI
GdipDisposeImageAttributes
GdipFree
GdipDeleteBrush
GdipCloneImage
GdipGetImageGraphicsContext
GdipCreateBitmapFromResource
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoInitializeEx
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
Number of PE resources by type
RT_RCDATA 79
RT_ICON 13
RT_DIALOG 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 84
NEUTRAL 13
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.2.565.2499

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Cyclonis Installer

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
1915904

EntryPoint
0x1f3bdd

OriginalFileName
Installer.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2017-2018. Cyclonis Limited. All rights reserved.

FileVersion
2.2.565.2499

TimeStamp
2018:04:19 15:00:42+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Installer.exe

ProductVersion
2.2.565.2499

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Cyclonis Limited

CodeSize
3474944

ProductName
Installer

ProductVersionNumber
2.2.565.2499

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 6f5931a2c322e6e097a24ed305e815e5
SHA1 bd86cb6bacf6863bea8d61c4a0016c20fcbfd493
SHA256 60617f1b4fdea436441f750dbcc0cf75709d94d296c80360db98e184fa235879
ssdeep
98304:FthGAGdBtzq0nkYC59qiNlsZoSUM18+UIC8/M9OJpnhBUQyVtU3pr:XhLGdXmb5SUpE/MNI5r

authentihash 711b91a2c86e1b34c8693a87ac556eab6cb0113d35bba88983acf6d8e87aa112
imphash cd5bdd6570f855aed675e52e2991074a
File size 5.2 MB ( 5405312 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-06-08 13:51:12 UTC ( 6 months, 1 week ago )
Last submission 2018-07-08 08:06:21 UTC ( 5 months, 1 week ago )
File names pad
CyclonisPasswordManager-Installer.exe
Installer.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created mutexes
Opened mutexes
Runtime DLLs