× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 71cc0633dc7bfbf538892d0fb387b4d4c65e9d4bcc00451c02908ca25cec6614
File name: recoverytoolboxforcdinstall.exe
Detection ratio: 0 / 67
Analysis date: 2018-04-16 05:01:36 UTC ( 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20180416
AegisLab 20180416
AhnLab-V3 20180416
Alibaba 20180416
ALYac 20180416
Antiy-AVL 20180416
Arcabit 20180416
Avast 20180416
Avast-Mobile 20180415
AVG 20180416
Avira (no cloud) 20180415
AVware 20180416
Baidu 20180413
BitDefender 20180416
Bkav 20180410
CAT-QuickHeal 20180415
ClamAV 20180415
CMC 20180415
Comodo 20180416
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180416
Cyren 20180416
DrWeb 20180416
eGambit 20180416
Emsisoft 20180416
Endgame 20180403
ESET-NOD32 20180416
F-Prot 20180416
F-Secure 20180416
Fortinet 20180416
GData 20180416
Ikarus 20180415
Sophos ML 20180121
Jiangmin 20180416
K7AntiVirus 20180416
K7GW 20180415
Kaspersky 20180416
Kingsoft 20180416
Malwarebytes 20180416
MAX 20180416
McAfee 20180416
McAfee-GW-Edition 20180416
Microsoft 20180416
eScan 20180416
NANO-Antivirus 20180416
nProtect 20180416
Palo Alto Networks (Known Signatures) 20180416
Panda 20180415
Qihoo-360 20180416
Rising 20180416
SentinelOne (Static ML) 20180225
Sophos AV 20180416
SUPERAntiSpyware 20180416
Symantec 20180415
Symantec Mobile Insight 20180412
Tencent 20180416
TheHacker 20180415
TotalDefense 20180415
TrendMicro 20180416
TrendMicro-HouseCall 20180416
Trustlook 20180416
VBA32 20180414
VIPRE 20180416
ViRobot 20180416
Webroot 20180416
WhiteArmor 20180408
Yandex 20180414
Zillya 20180413
ZoneAlarm by Check Point 20180416
Zoner 20180415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product Recovery Toolbox for CD Free
File version
Description Recovery Toolbox for CD Free Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 12:39 PM 4/13/2018
Signers
[+] File Master LLC
Status Valid
Issuer GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Valid from 1:10 PM 11/10/2017
Valid to 1:10 PM 11/10/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 9A4DBE5BE248C0B1F49BE3661E3EA0C459693BC0
Serial number 78 10 45 AD 0D 00 43 4D 56 1C D9 6D
[+] GlobalSign Extended Validation CodeSigning CA - SHA256 - G3
Status Valid
Issuer GlobalSign
Valid from 1:00 AM 6/15/2016
Valid to 1:00 AM 6/15/2024
Valid usage Code Signing, OCSP Signing
Algorithm sha256RSA
Thumbprint 87A63D9ADB627D777836153C680A3DFCF27DE90C
Serial number 48 1B 6A 07 A9 42 4C 1E AA FE F3 CD F1 0F
[+] GlobalSign
Status Valid
Issuer GlobalSign Root CA
Valid from 11:00 AM 11/18/2009
Valid to 11:00 AM 3/18/2019
Valid usage All
Algorithm sha256RSA
Thumbprint 4765557AF418C68A641199146A7E556AA8242996
Serial number 04 00 00 00 00 01 25 07 1D F9 AF
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 1:00 PM 9/1/1998
Valid to 1:00 PM 1/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbprint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Counter signers
[+] GlobalSign TSA for Advanced - G2
Status Valid
Issuer GlobalSign Timestamping CA - SHA256 - G2
Valid from 1:00 AM 2/19/2018
Valid to 11:00 AM 3/18/2029
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 9B12057AE72AAFF6D63772B49F6A236F2649CDA9
Serial number 0C A7 CF 5D 07 07 24 AC 89 E7 9A 3A
[+] GlobalSign Timestamping CA - SHA256 - G2
Status Valid
Issuer GlobalSign
Valid from 11:00 AM 8/2/2011
Valid to 11:00 AM 3/29/2029
Valid usage All
Algorithm sha256RSA
Thumbrint 91843BBD936D86EAFA42A3AFBF33E92831068F99
Serial number 04 00 00 00 00 01 31 89 C6 50 04
[+] GlobalSign
Status Valid
Issuer GlobalSign Root CA
Valid from 11:00 AM 11/18/2009
Valid to 11:00 AM 3/18/2019
Valid usage All
Algorithm sha256RSA
Thumbrint 4765557AF418C68A641199146A7E556AA8242996
Serial number 04 00 00 00 00 01 25 07 1D F9 AF
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 1:00 PM 9/1/1998
Valid to 1:00 PM 1/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Packers identified
F-PROT INNO, appended, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-06 14:39:04
Entry Point 0x000117DC
Number of sections 8
PE sections
Overlays
MD5 273ff93e8879ec4248eddf2511f8c9a8
File type data
Offset 200192
Size 2615456
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetSystemDirectoryW
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_ICON 15
RT_STRING 6
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 19
NEUTRAL 9
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
132608

EntryPoint
0x117dc

MIMEType
application/octet-stream

TimeStamp
2016:04:06 15:39:04+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

FileDescription
Recovery Toolbox for CD Free Setup

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
File Master LLC

CodeSize
66560

ProductName
Recovery Toolbox for CD Free

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3b2f40153a6e776833031bb0e50612fc
SHA1 d953775ea42155a3918557a06e73f2986bd801fe
SHA256 71cc0633dc7bfbf538892d0fb387b4d4c65e9d4bcc00451c02908ca25cec6614
ssdeep
49152:6Pw5eAolchp8Ml+aBHhSXQrmmI7Kzrf31kHw8fbdoh:T5YlCOMHQXIaKzrf31kQ8ih

authentihash ecf6d59ac1d682af34e095b01a89bfc3c65780325583c21f7a9e4a8853c0b90a
imphash 20dd26497880c05caed9305b3c8b9109
File size 2.7 MB ( 2815648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (52.9%)
Win32 Executable (generic) (16.8%)
Win16/32 Executable Delphi generic (7.7%)
OS/2 Executable (generic) (7.5%)
Generic Win/DOS Executable (7.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-04-16 05:01:36 UTC ( 10 months ago )
Last submission 2018-05-15 16:50:01 UTC ( 9 months, 1 week ago )
File names recoverytoolboxforcdinstall.exe
recoverytoolboxforcdinstall.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Searched windows
Runtime DLLs