× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 656ce6e3ea2a16e43795552ba60026cb9070ade916b6f9644bcd102c112baf26
File name: PANDAGL.exe
Detection ratio: 0 / 72
Analysis date: 2019-01-08 01:33:03 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis 20181227
Ad-Aware 20190108
AegisLab 20190108
AhnLab-V3 20190108
Alibaba 20180921
ALYac 20190107
Antiy-AVL 20190107
Arcabit 20190107
Avast 20190107
Avast-Mobile 20190107
AVG 20190107
Avira (no cloud) 20190107
AVware 20180925
Babable 20180918
Baidu 20190107
BitDefender 20190107
Bkav 20190107
CAT-QuickHeal 20190107
ClamAV 20190107
CMC 20190107
Comodo 20190107
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190108
Cyren 20190107
DrWeb 20190107
eGambit 20190108
Emsisoft 20190107
Endgame 20181108
ESET-NOD32 20190108
F-Prot 20190108
F-Secure 20190108
Fortinet 20190108
GData 20190108
Ikarus 20190108
Sophos ML 20181128
Jiangmin 20190107
K7AntiVirus 20190108
K7GW 20190108
Kaspersky 20190108
Kingsoft 20190108
Malwarebytes 20190108
MAX 20190108
McAfee 20190108
McAfee-GW-Edition 20190108
Microsoft 20190108
eScan 20190108
NANO-Antivirus 20190108
Palo Alto Networks (Known Signatures) 20190108
Panda 20190107
Qihoo-360 20190108
Rising 20190108
SentinelOne (Static ML) 20181223
Sophos AV 20190108
SUPERAntiSpyware 20190102
Symantec 20190108
TACHYON 20190108
Tencent 20190108
TheHacker 20190106
TotalDefense 20190107
Trapmine 20190103
TrendMicro 20190108
TrendMicro-HouseCall 20190108
Trustlook 20190108
VBA32 20190104
VIPRE 20190108
ViRobot 20190108
Webroot 20190108
Yandex 20181229
Zillya 20190105
ZoneAlarm by Check Point 20190108
Zoner 20190108
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© Panda 2016

Product Panda Security SelfExtrator
Original name 7zS.sfx.exe
Internal name 7zS.sfx
File version 15.14.3.0
Description Panda Security SFX
Signature verification Signed file, verified signature
Signing date 8:55 AM 8/5/2016
Signers
[+] Panda Security S.L
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer GlobalSign CodeSigning CA - SHA256 - G2
Valid from 12:33 PM 12/31/2015
Valid to 10:56 AM 04/23/2017
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint FBB42F089AF2D570F2BF6F493D107A3255A9BB1A
Serial number 11 21 4E 62 DF 3C 5C 8A 02 48 92 33 8D 70 DA B8 97 82
[+] GlobalSign CodeSigning CA - SHA256 - G2
Status Valid
Issuer GlobalSign
Valid from 10:00 AM 08/02/2011
Valid to 10:00 AM 08/02/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 905F596AAE7714155643606EAA5C830B0B1B439A
Serial number 47 2C CB A9 49 BB 94 24 E9 8F 41 6F AD 41
[+] GlobalSign
Status Valid
Issuer GlobalSign Root CA
Valid from 10:00 AM 11/18/2009
Valid to 10:00 AM 03/18/2019
Valid usage All
Algorithm sha256RSA
Thumbprint 4765557AF418C68A641199146A7E556AA8242996
Serial number 04 00 00 00 00 01 25 07 1D F9 AF
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 12:00 PM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbprint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Counter signers
[+] GlobalSign TSA for Standard - G2
Status Valid
Issuer GlobalSign Timestamping CA - G2
Valid from 12:00 AM 05/24/2016
Valid to 12:00 AM 06/24/2027
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 83FDE1BA76FEF55291B50D6861906DAA45B58CB5
Serial number 11 21 B4 55 35 1E BB 1A B2 4F 97 EF 07 FE 2A B3 0B 8A
[+] GlobalSign Timestamping CA - G2
Status Valid
Issuer GlobalSign Root CA
Valid from 10:00 AM 04/13/2011
Valid to 12:00 PM 01/28/2028
Valid usage All
Algorithm sha1RSA
Thumbrint C0E49D2D7D90A5CD427F02D9125694D5D6EC5B71
Serial number 04 00 00 00 00 01 2F 4E E1 52 D7
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 12:00 PM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Packers identified
F-PROT 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-28 09:10:03
Entry Point 0x00019702
Number of sections 4
PE sections
Overlays
MD5 94042dfb74b7955816dbdc9680ad70bc
File type data
Offset 510464
Size 1307264
Entropy 8.00
PE imports
GetStdHandle
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
GetFileAttributesW
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
FreeEnvironmentStringsW
GetTempPathA
GetCPInfo
GetStringTypeA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
FormatMessageW
InitializeCriticalSection
FindClose
InterlockedDecrement
FormatMessageA
SetFileAttributesW
SetLastError
RemoveDirectoryW
IsDebuggerPresent
ExitProcess
RemoveDirectoryA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
CreateThread
SetUnhandledExceptionFilter
ExitThread
TerminateProcess
SetCurrentDirectoryW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
CloseHandle
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
CreateDirectoryW
DeleteFileW
GetProcAddress
GetModuleFileNameW
GetFileInformationByHandle
FindNextFileW
ResetEvent
FindNextFileA
WaitForMultipleObjects
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
GetModuleFileNameA
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
FindFirstFileA
GetACP
GetModuleHandleW
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
WriteFile
VirtualFree
Sleep
VirtualAlloc
SysStringLen
VariantClear
SysAllocStringLen
ShellExecuteExA
GetWindowLongA
SetTimer
MessageBoxW
LoadIconA
LoadStringA
SetWindowTextA
EndDialog
PostMessageA
SetWindowTextW
DialogBoxParamW
CharUpperW
SendMessageA
LoadStringW
KillTimer
GetDlgItem
SetWindowLongA
DialogBoxParamA
ShowWindow
CharUpperA
DestroyWindow
Number of PE resources by type
RT_ICON 14
RT_STRING 3
RT_DIALOG 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 21
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
379392

ImageVersion
0.0

ProductName
Panda Security SelfExtrator

FileVersionNumber
15.14.3.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
7zS.sfx.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
15.14.3.0

TimeStamp
2016:04:28 10:10:03+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
7zS.sfx

ProductVersion
15.14

FileDescription
Panda Security SFX

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Panda 2016

MachineType
Intel 386 or later, and compatibles

CompanyName
Panda Security, S.L.

CodeSize
130048

FileSubtype
0

ProductVersionNumber
15.14.0.0

EntryPoint
0x19702

ObjectFileType
Executable application

File identification
MD5 0c1baf2b6129277d9aa2fd4242c8110a
SHA1 aff6934b303a2ce5327e94e22de60a0d3b56d6e7
SHA256 656ce6e3ea2a16e43795552ba60026cb9070ade916b6f9644bcd102c112baf26
ssdeep
49152:1ar2lv8DuTP56lEogjzygo3TTioUutaQJeO:ESCDuTPkF2Ju1taQJeO

authentihash e484e201e11fca479ee925fc3ce7e91dbfcf05c5a5006117763e2702ac100815
imphash 1d43f42502c7bb03e1061a423a525ab6
File size 1.7 MB ( 1817728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-08-11 08:25:58 UTC ( 2 years, 6 months ago )
Last submission 2018-07-14 00:08:10 UTC ( 7 months, 2 weeks ago )
File names 656CE6E3EA2A16E43795552BA60026CB9070ADE916B6F9644BCD102C112BAF26.exe
PANDAGL.exe
7zS.sfx.exe
7zS.sfx
PANDAGL.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
UDP communications