× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 660ef4958aab99c74a4fb1cd5a0fd4da64bbe78db69ffec0b59a6a436c9c957b
File name: install_spartanhd
Detection ratio: 1 / 68
Analysis date: 2018-01-17 00:32:13 UTC ( 3 months ago )
Antivirus Result Update
Jiangmin Backdoor.MSIL.mwu 20180117
Ad-Aware 20180117
AegisLab 20180116
AhnLab-V3 20180116
Alibaba 20180116
ALYac 20180116
Antiy-AVL 20180117
Arcabit 20180117
Avast 20180117
Avast-Mobile 20180116
AVG 20180117
Avira (no cloud) 20180116
AVware 20180103
Baidu 20180116
BitDefender 20180116
Bkav 20180116
CAT-QuickHeal 20180116
ClamAV 20180116
CMC 20180116
Comodo 20180116
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180117
Cyren 20180116
DrWeb 20180116
eGambit 20180117
Emsisoft 20180116
Endgame 20171130
ESET-NOD32 20180116
F-Prot 20180116
F-Secure 20180116
Fortinet 20180116
GData 20180116
Ikarus 20180116
Sophos ML 20170914
K7AntiVirus 20180116
K7GW 20180116
Kaspersky 20180116
Kingsoft 20180117
Malwarebytes 20180116
MAX 20180116
McAfee 20180117
McAfee-GW-Edition 20180116
Microsoft 20180116
eScan 20180116
NANO-Antivirus 20180117
nProtect 20180116
Palo Alto Networks (Known Signatures) 20180117
Panda 20180116
Qihoo-360 20180117
Rising 20180117
SentinelOne (Static ML) 20180115
Sophos AV 20180116
SUPERAntiSpyware 20180117
Symantec 20180116
Symantec Mobile Insight 20180116
Tencent 20180117
TheHacker 20180115
TotalDefense 20180116
TrendMicro 20180116
TrendMicro-HouseCall 20180117
Trustlook 20180117
VBA32 20180116
VIPRE 20180116
ViRobot 20180116
Webroot 20180117
WhiteArmor 20180110
Yandex 20180112
Zillya 20180116
ZoneAlarm by Check Point 20180117
Zoner 20180116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2017 M8 Software

Product Spartan Standard
Original name install_spartanhd.exe
Internal name install_spartanhd
File version 16.1
Description This installer database contains the logic and data required to install Spartan Standard.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-02-09 22:23:58
Entry Point 0x00031517
Number of sections 5
PE sections
Overlays
MD5 3a53ffd7b99926ec97dc3f03b4093ccd
File type data
Offset 428032
Size 7034206
Entropy 7.93
PE imports
DestroyPropertySheetPage
CreatePropertySheetPageW
PropertySheetW
GetDeviceCaps
DeleteDC
CreateFontIndirectW
SetBkMode
BitBlt
GetStockObject
GetObjectW
SelectObject
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
WaitForSingleObject
HeapDestroy
IsValidLocale
GetFileAttributesW
lstrcmpW
GetExitCodeProcess
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
EnumResourceLanguagesW
GetTempPathA
WideCharToMultiByte
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
WriteFile
SetStdHandle
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ConnectNamedPipe
InitializeCriticalSection
LoadResource
GetLogicalDriveStringsW
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
GetSystemTime
TlsGetValue
CopyFileW
GetUserDefaultLangID
OutputDebugStringW
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
lstrcmpiW
EnumSystemLocalesA
GetUserDefaultLCID
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
GetModuleHandleA
CreateThread
GetSystemDirectoryW
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
GlobalMemoryStatus
SearchPathW
WriteConsoleA
GetVersion
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
OpenProcess
DeleteFileA
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetModuleFileNameW
FindNextFileW
ResetEvent
GetTempFileNameA
FindFirstFileW
TerminateProcess
DuplicateHandle
GlobalLock
GetTempPathW
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
GetShortPathNameW
CreateNamedPipeW
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
Process32NextW
VirtualFree
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCPInfo
HeapSize
InterlockedCompareExchange
Process32FirstW
lstrcpynW
GetSystemDefaultLangID
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
FindResourceExW
CreateProcessA
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
GetOEMCP
VarUI4FromStr
OleLoadPicture
SHGetFolderPathW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
PathFileExistsW
MapWindowPoints
RedrawWindow
GetMonitorInfoW
GetForegroundWindow
GetParent
CloseClipboard
EmptyClipboard
GetScrollRange
EndDialog
DestroyWindow
EnumWindows
SetFocus
ModifyMenuW
KillTimer
DestroyMenu
PostQuitMessage
ShowWindow
MessageBeep
LoadMenuW
SetWindowPos
GetWindowThreadProcessId
GetSystemMetrics
EnableMenuItem
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
DialogBoxParamW
DefWindowProcW
LoadIconW
SetPropW
TranslateMessage
GetWindow
PostMessageW
GetPropW
GetDC
CreateWindowExW
CreateDialogParamW
ReleaseDC
GetDlgCtrlID
SendMessageW
UnregisterClassA
SetClipboardData
IsWindowVisible
LoadStringW
GetClientRect
SetWindowLongW
GetDlgItem
RemovePropW
MessageBoxW
MonitorFromWindow
ScreenToClient
InvalidateRect
GetScrollPos
GetSubMenu
SetTimer
LoadImageW
TrackPopupMenu
GetActiveWindow
FindWindowW
SetWindowTextW
GetWindowTextW
GetDesktopWindow
GetSystemMenu
GetWindowTextLengthW
DispatchMessageW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
CharNextW
CallWindowProcW
ExitWindowsEx
OpenClipboard
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CreateILockBytesOnHGlobal
Number of PE resources by type
RT_DIALOG 12
RT_ICON 12
RT_STRING 10
RTF_FILE 2
RT_MENU 2
IMAGE_FILE 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH UK 43
PE resources
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
16.1.0.0

UninitializedDataSize
0

LanguageCode
English (British)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
143872

EntryPoint
0x31517

OriginalFileName
install_spartanhd.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2017 M8 Software

FileVersion
16.1

TimeStamp
2014:02:09 23:23:58+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
install_spartanhd

ProductVersion
16.1

FileDescription
This installer database contains the logic and data required to install Spartan Standard.

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
M8 Software

CodeSize
283136

ProductName
Spartan Standard

ProductVersionNumber
16.1.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 b48bb870d5f1315dde61d98d8ef96106
SHA1 35e95ecb29eb4520b39d44b42dc0a101154d4f41
SHA256 660ef4958aab99c74a4fb1cd5a0fd4da64bbe78db69ffec0b59a6a436c9c957b
ssdeep
98304:KulHe8xaGYBAsbLMZsSsiDQd3nvsXtE5m7eY8Ap7EKXja406Q0JVl86HL2USOu4F:z5le9KQcGOYAWu240eyOljBxSni

authentihash bf2bd7a7bd1591898f75b4c0f4fe71cfd906a1bed7df5a56e126c042ef0087bd
imphash f20b97c85d8b89a0f90e2b43a55284fa
File size 7.1 MB ( 7462238 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Microsoft Visual Basic 6 (52.6%)
Win32 Executable MS Visual C++ (generic) (20.0%)
Win64 Executable (generic) (17.7%)
Win32 Dynamic Link Library (generic) (4.2%)
Win32 Executable (generic) (2.8%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-01-17 13:08:52 UTC ( 1 year, 3 months ago )
Last submission 2017-01-20 18:55:53 UTC ( 1 year, 3 months ago )
File names 660EF4958AAB99C74A4FB1CD5A0FD4DA64BBE78DB69FFEC0B59A6A436C9C957B.exe
962448
install_spartanhd
install_spartanhd.exe
660EF4958AAB99C74A4FB1CD5A0FD4DA64BBE78DB69FFEC0B59A6A436C9C957B.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Opened mutexes
Runtime DLLs