× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 749321ba114a07f765587a29370cf0fccecd4ceb3dac31852db7945cbf831d3d
File name: SpyHunter-Installer(7).exe
Detection ratio: 1 / 56
Analysis date: 2016-11-23 13:06:14 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Malwarebytes PUP.Optional.SpyHunter 20161123
Ad-Aware 20161123
AegisLab 20161123
AhnLab-V3 20161123
Alibaba 20161123
ALYac 20161123
Antiy-AVL 20161123
Arcabit 20161123
Avast 20161123
AVG 20161123
Avira (no cloud) 20161123
AVware 20161123
Baidu 20161123
BitDefender 20161123
Bkav 20161123
CAT-QuickHeal 20161123
ClamAV 20161123
CMC 20161123
Comodo 20161122
CrowdStrike Falcon (ML) 20161024
Cyren 20161123
DrWeb 20161123
Emsisoft 20161123
ESET-NOD32 20161123
F-Prot 20161123
F-Secure 20161123
Fortinet 20161123
GData 20161123
Ikarus 20161123
Sophos ML 20161018
Jiangmin 20161123
K7AntiVirus 20161123
K7GW 20161123
Kaspersky 20161123
Kingsoft 20161123
McAfee 20161123
McAfee-GW-Edition 20161123
Microsoft 20161123
eScan 20161123
NANO-Antivirus 20161123
nProtect 20161123
Panda 20161122
Qihoo-360 20161123
Rising 20161123
Sophos AV 20161123
SUPERAntiSpyware 20161123
Symantec 20161123
Tencent 20161123
TheHacker 20161122
TrendMicro 20161123
TrendMicro-HouseCall 20161123
Trustlook 20161123
VBA32 20161123
VIPRE 20161123
ViRobot 20161123
WhiteArmor 20161018
Yandex 20161122
Zillya 20161122
Zoner 20161123
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright 2003-2016. Enigma Software Group USA, LLC. All rights reserved.

Product Installer
Original name Installer.exe
Internal name Installer.exe
File version 2.0.399.1551
Description Enigma Installer
Signature verification Signed file, verified signature
Signing date 4:51 PM 7/18/2016
Signers
[+] Enigma Software Group USA, LLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 Extended Validation Code Signing CA - G2
Valid from 12:00 AM 02/09/2016
Valid to 11:59 PM 02/08/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint B2B973A3D06BFF1D22B6BA736CBE55C38F188D8E
Serial number 1C 6A 8D 41 C0 47 92 FB EE DF 14 2C 7A 79 B1 CA
[+] Symantec Class 3 Extended Validation Code Signing CA - G2
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 03/04/2014
Valid to 11:59 PM 03/03/2024
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 5B8F88C80A73D35F76CD412A9E74E916594DFA67
Serial number 19 1A 32 CB 75 9C 97 B8 CF AC 11 8D D5 12 7F 49
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-06-13 11:12:39
Entry Point 0x0016DADC
Number of sections 6
PE sections
Overlays
MD5 f3caf4ad33337dcc05d52764ab3880eb
File type data
Offset 3509760
Size 6320
Entropy 7.34
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
GetExplicitEntriesFromAclW
ConvertSidToStringSidW
AccessCheck
OpenServiceW
AdjustTokenPrivileges
ControlService
InitializeAcl
LookupPrivilegeValueW
RegDeleteValueW
RegDeleteKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
SetSecurityDescriptorDacl
CloseServiceHandle
OpenProcessToken
DuplicateToken
AddAccessAllowedAce
RegOpenKeyExW
GetTokenInformation
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
SetEntriesInAclW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
CryptDestroyHash
CryptAcquireContextW
GetNamedSecurityInfoW
RegEnumValueW
RegSetValueExW
FreeSid
CryptGetHashParam
OpenSCManagerW
AllocateAndInitializeSid
InitializeSecurityDescriptor
QueryServiceStatusEx
RegSaveKeyExW
RegSetKeySecurity
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
IsValidSecurityDescriptor
Ord(412)
Ord(413)
Ord(410)
GetTextMetricsW
TextOutW
CreatePen
SaveDC
ExtSelectClipRgn
CombineRgn
SetStretchBltMode
Rectangle
GetDeviceCaps
ExcludeClipRect
LineTo
DeleteDC
RestoreDC
SetBkMode
GetObjectW
BitBlt
SetTextColor
ExtTextOutW
IntersectClipRect
GetTextExtentPoint32W
MoveToEx
SetViewportOrgEx
GetDIBits
SetTextAlign
SelectClipRgn
CreateCompatibleDC
CreateFontW
GetBkColor
SetBrushOrgEx
CreateRectRgn
SelectObject
GetTextColor
CreateSolidBrush
ExtCreatePen
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
GetComputerNameW
GetFileAttributesW
VerifyVersionInfoW
GetVolumePathNamesForVolumeNameW
FreeEnvironmentStringsA
CreatePipe
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
LoadLibraryExW
GetLogicalDrives
GetFileInformationByHandle
lstrcatW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
TlsGetValue
QueryDosDeviceW
MoveFileW
SetFileAttributesW
SetLastError
GetSystemTime
DeviceIoControl
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
FindNextVolumeW
lstrcmpiW
VerSetConditionMask
EnumSystemLocalesA
GetUserDefaultLCID
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
FlushInstructionCache
FormatMessageA
SetFilePointer
CreateThread
SetEnvironmentVariableW
MoveFileExW
DeleteCriticalSection
SetUnhandledExceptionFilter
CreateMutexW
GetVolumeNameForVolumeMountPointW
IsProcessorFeaturePresent
ExitThread
SetHandleInformation
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
GetProcAddress
SleepEx
WriteConsoleW
MulDiv
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
SetHandleCount
LoadLibraryW
GetLastError
FindVolumeClose
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetFileSize
OpenProcess
DeleteFileA
GetStartupInfoW
SetVolumeMountPointW
DeleteFileW
GlobalLock
GetProcessHeap
CreateFileMappingW
EnumResourceNamesW
CompareStringW
lstrcpyW
GetFileSizeEx
RemoveDirectoryW
FreeEnvironmentStringsW
FindNextFileW
CreateDirectoryW
InterlockedIncrement
CompareStringA
ResetEvent
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
ExpandEnvironmentStringsA
GetLongPathNameW
SetEvent
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
FindFirstVolumeW
LeaveCriticalSection
DefineDosDeviceW
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
WaitForSingleObjectEx
lstrlenW
Process32NextW
CreateProcessW
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
GetCurrentDirectoryA
HeapSize
CloseHandle
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
ExpandEnvironmentStringsW
RaiseException
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
DeleteVolumeMountPointW
ReadFile
FindFirstFileA
OpenMutexW
GetACP
GetModuleHandleW
GetEnvironmentStrings
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
OpenEventA
VirtualAlloc
GetTimeFormatA
VarUI4FromStr
SysFreeString
VariantClear
VariantInit
SysAllocString
EnumProcessModules
GetProcessImageFileNameW
GetModuleFileNameExW
ShellExecuteW
ShellExecuteExW
StrCmpNIW
Ord(2)
StrCmpIW
SetFocus
SetWindowRgn
RedrawWindow
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
EndPaint
GetDC
GetCursorPos
ReleaseDC
SendMessageW
UnregisterClassA
GetClassInfoW
DrawTextW
LoadImageW
GetActiveWindow
GetWindowTextLengthW
LoadAcceleratorsW
DestroyWindow
GetParent
UpdateWindow
GetMessageW
ShowWindow
PeekMessageW
EnableWindow
TranslateMessage
IsWindowEnabled
GetWindow
LoadStringA
RegisterClassW
IsZoomed
LoadStringW
IsIconic
TrackPopupMenuEx
SetTimer
IsDialogMessageW
MonitorFromPoint
CreateWindowExW
GetWindowLongW
GetWindowInfo
CharNextW
MapWindowPoints
GetMonitorInfoW
BeginPaint
OffsetRect
DefWindowProcW
KillTimer
TrackMouseEvent
GetClassInfoExW
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
PostMessageW
CreatePopupMenu
PtInRect
SetWindowTextW
GetDlgItem
ScreenToClient
GetMenuItemCount
LoadCursorW
LoadIconW
FindWindowExW
DispatchMessageW
SetForegroundWindow
ExitWindowsEx
GetMenuItemInfoW
EndDialog
GetCapture
MessageBeep
LoadMenuW
RemoveMenu
MessageBoxW
RegisterClassExW
MoveWindow
DialogBoxParamW
AppendMenuW
GetWindowDC
AdjustWindowRectEx
IsWindowVisible
IsCharAlphaNumericW
MonitorFromWindow
SetRect
InvalidateRect
CallWindowProcW
GetClientRect
GetFocus
wsprintfW
TranslateAcceleratorW
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Ord(301)
Ord(145)
Ord(216)
Ord(167)
Ord(133)
Ord(147)
Ord(41)
Ord(127)
Ord(79)
Ord(46)
Ord(208)
Ord(142)
Ord(118)
Ord(14)
Ord(26)
Ord(27)
getaddrinfo
accept
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
getpeername
select
gethostname
getsockopt
recv
send
ntohs
WSAGetLastError
listen
__WSAFDIsSet
WSACleanup
WSASetLastError
closesocket
WSAIoctl
setsockopt
socket
bind
recvfrom
sendto
GdipSetImageAttributesWrapMode
GdipSetImageAttributesColorMatrix
GdipResetPath
GdipImageRotateFlip
GdipGetImageHeight
GdipSetSmoothingMode
GdipDrawPath
GdipSetImageAttributesColorKeys
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipCombineRegionPath
GdipCreateTextureIAI
GdipDisposeImage
GdipCreatePath
GdipCreateHBITMAPFromBitmap
GdipCreateRegion
GdiplusStartup
GdipDeleteGraphics
GdipDeleteRegion
GdipCreateFromHDC
GdipCreateBitmapFromStream
GdipDrawImagePointRectI
GdipCreateImageAttributes
GdipSetPixelOffsetMode
GdipCreatePen1
GdipCloneBrush
GdipSetInfinite
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImageGraphicsContext
GdipDrawImageRectRectI
GdipGetClip
GdipDeletePath
GdipDeletePen
GdipFillRectangleI
GdipSetClipRegion
GdipCreateBitmapFromResource
GdipFree
GdipDeleteBrush
GdipClosePathFigure
GdipCloneImage
GdipAddPathArcI
GdipSetPenDashStyle
GdipDisposeImageAttributes
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoInitializeEx
CoTaskMemRealloc
CoCreateInstance
CoInitializeSecurity
CoTaskMemFree
Number of PE resources by type
RT_RCDATA 73
RT_ICON 13
RT_DIALOG 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 85
NEUTRAL 6
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
1604608

ImageVersion
0.0

ProductName
Installer

FileVersionNumber
2.0.399.1551

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
Installer.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.0.399.1551

TimeStamp
2016:06:13 12:12:39+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Installer.exe

ProductVersion
2.0.399.1551

FileDescription
Enigma Installer

OSVersion
5.0

FileOS
Win32

LegalCopyright
Copyright 2003-2016. Enigma Software Group USA, LLC. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Enigma Software Group USA, LLC.

CodeSize
1904128

FileSubtype
0

ProductVersionNumber
2.0.399.1551

EntryPoint
0x16dadc

ObjectFileType
Executable application

Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 ff00e6f2fa487fc76629666127044dea
SHA1 84d80ed7e4275e4e94722c8702d26497efd97f12
SHA256 749321ba114a07f765587a29370cf0fccecd4ceb3dac31852db7945cbf831d3d
ssdeep
98304:PObQed9pkwChTZNrh6WsRWJ1/n/y0D3eHBl5nPXia+fdPWv:aQTjrh6WsRWJ1/n/Js3S7W

authentihash c94f67fd72488daf90b745b455980dfd53628e3bfec3ac25e39df95123abc6f5
imphash 0504474beb921df9c4ec63933463030c
File size 3.4 MB ( 3516080 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe via-tor signed overlay

VirusTotal metadata
First submission 2016-07-28 12:53:08 UTC ( 2 years, 9 months ago )
Last submission 2018-05-09 00:24:03 UTC ( 1 year ago )
File names Installer.exe
sh_installer.exe
tmp_5713-SpyHunter-Installer-656150864.exe
SpyHunter-Installer(1).exe
SpyHunter-Installer.exe
ff00e6f2fa487fc76629666127044dea
SpyHunter-Installer-003.exe
sh_installer.exe
sh_installer.exe
SpyHunter-Installer.exe
output.99006564.txt
Spyhunter.exe
SpyHunter-Installer.exe
sh_installer.exe
SpyHunter-Installer(4).exe
sh_installer.exe
SpyHunter-Installer.ex_
SpyHunter-Installer (2).exe
SpyHunter-Installer.txt
SpyHunter-Installer.exe
esginstallerresumeaction_ff00e6f2fa487fc76629666127044dea.exe
SpyHunter-Installer (1).exe
SpyHunter-Installer.exe
SpyHunter-Installer.exe
esginstallerresumeaction_ff00e6f2fa487fc76629666127044dea.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created mutexes
Runtime DLLs
UDP communications