× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7811ed07971947659da22d4a95bfbb84cae681aaf3c0e9a8ffd8a5514d0f1116
File name: rad74571.tmp.exe
Detection ratio: 36 / 55
Analysis date: 2016-07-10 13:49:05 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Generic.17595375 20160710
AhnLab-V3 Malware/Win32.Generic.N2040499528 20160710
ALYac Trojan.Generic.17595375 20160710
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20160710
Arcabit Trojan.Generic.D10C7BEF 20160710
Avast Win32:Trojan-gen 20160710
AVG Downloader.Generic14.BAWU 20160710
Avira (no cloud) TR/Agent.wryu 20160710
AVware Trojan.Win32.Generic!BT 20160710
Baidu Win32.Trojan.WisdomEyes.151026.9950.10000 20160706
BitDefender Trojan.Generic.17595375 20160710
DrWeb Trojan.Siggen6.58358 20160710
Emsisoft Trojan.Generic.17595375 (B) 20160710
ESET-NOD32 a variant of Win32/Kryptik.FBRP 20160710
F-Secure Trojan.Generic.17595375 20160710
GData Trojan.Generic.17595375 20160710
Ikarus Trojan.SuspectCRC 20160710
Jiangmin Trojan.Generic.aduak 20160710
K7AntiVirus Trojan ( 004f37b61 ) 20160710
K7GW Trojan ( 004f37b61 ) 20160710
Kaspersky HEUR:Trojan.Win32.Generic 20160710
McAfee GenericR-HZZ!87A60D3B0961 20160710
McAfee-GW-Edition BehavesLike.Win32.Xorad.dt 20160710
Microsoft TrojanDownloader:Win32/Talalpek.A 20160710
eScan Trojan.Generic.17595375 20160710
NANO-Antivirus Trojan.Win32.Siggen6.eeftgj 20160710
nProtect Trojan.Generic.17595375 20160708
Panda Trj/GdSda.A 20160710
Qihoo-360 HEUR/QVM20.1.0000.Malware.Gen 20160710
Sophos AV Mal/Generic-S 20160710
Symantec Trojan.Cryptolock!g23 20160710
Tencent Win32.Trojan.Kryptik.Ecao 20160710
TrendMicro TROJ_GEN.R047C0DG716 20160710
VIPRE Trojan.Win32.Generic!BT 20160710
Yandex Trojan.DL.Gootkit! 20160709
Zillya Trojan.Kryptik.Win32.910965 20160709
AegisLab 20160710
Alibaba 20160708
Bkav 20160708
CAT-QuickHeal 20160709
ClamAV 20160710
CMC 20160704
Comodo 20160710
Cyren 20160710
F-Prot 20160710
Fortinet 20160710
Kingsoft 20160710
Malwarebytes 20160710
SUPERAntiSpyware 20160710
TheHacker 20160709
TotalDefense 20160710
TrendMicro-HouseCall 20160710
VBA32 20160708
ViRobot 20160710
Zoner 20160710
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (c) 2013 Steganos Software GmbH

Product Steganos Safe 17
Original name usbstarter.exe
Internal name usbstarter.exe
File version 17.0.2.11443
Description Steganos PortableSafe USB Starter
Comments Steganos Safe 17
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-07-04 13:41:35
Entry Point 0x00001B10
Number of sections 4
PE sections
PE imports
RegQueryValueExW
RegOpenKeyW
GetEnhMetaFileA
SetMetaRgn
PathToRegion
GetBkMode
SaveDC
GetTextCharset
GetEnhMetaFileW
GetROP2
UnrealizeObject
UpdateColors
GetObjectType
GetLayout
GetMapMode
GetPixelFormat
GetSystemPaletteUse
GetFontLanguageInfo
RealizePalette
GetDCBrushColor
GetColorSpace
GetStockObject
GetPolyFillMode
StrokePath
GetDCPenColor
GetGraphicsMode
GetTextAlign
SwapBuffers
GetTextColor
GetStretchBltMode
WidenPath
GetBkColor
GetTextCharacterExtra
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
EnumSystemLocalesW
GetFileInformationByHandle
lstrcatW
GetLocaleInfoW
GetCPInfo
GetTempPathW
GetSystemTimeAsFileTime
GetOEMCP
CreateEventW
LoadResource
FindClose
TlsGetValue
SetFileAttributesW
SetLastError
PeekNamedPipe
CopyFileW
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
LoadLibraryA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
GetFullPathNameW
CreateThread
MoveFileExW
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
IsProcessorFeaturePresent
DecodePointer
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
ReadConsoleW
GetCurrentThreadId
GetProcAddress
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
SetEvent
TlsAlloc
lstrcmpiW
RtlUnwind
FreeLibrary
GlobalSize
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
GetTimeFormatW
lstrcpyW
ExpandEnvironmentStringsW
FindNextFileW
ResetEvent
FindFirstFileW
IsValidLocale
lstrcmpW
FindFirstFileExW
GlobalLock
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
GetSystemInfo
GlobalFree
OpenEventW
CompareStringW
GlobalUnlock
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
lstrcpynW
RaiseException
TlsFree
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetLongPathNameW
IsValidCodePage
FindResourceW
Sleep
CountClipboardFormats
AnyPopup
GetDialogBaseUnits
LoadCursorFromFileA
LoadCursorW
CloseClipboard
GetClipboardSequenceNumber
Number of PE resources by type
RT_ICON 3
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 5
PE resources
ExifTool file metadata
LegalTrademarks
Steganos Safe 17 is a trademark of Steganos Software GmbH

SubsystemVersion
5.0

Comments
Steganos Safe 17

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
17.0.2.11443

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Steganos PortableSafe USB Starter

CharacterSet
Windows, Latin1

InitializedDataSize
183808

EntryPoint
0x1b10

OriginalFileName
usbstarter.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2013 Steganos Software GmbH

FileVersion
17.0.2.11443

TimeStamp
2016:07:04 14:41:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
usbstarter.exe

ProductVersion
17.0.2.11443

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Steganos Software GmbH

CodeSize
103936

ProductName
Steganos Safe 17

ProductVersionNumber
17.0.2.11443

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 87a60d3b09619e6480175a33a77fad61
SHA1 82808ca06f9e61822cafb17bdd37ed13385cb5d9
SHA256 7811ed07971947659da22d4a95bfbb84cae681aaf3c0e9a8ffd8a5514d0f1116
ssdeep
3072:x/r4AUy4Bzx0vXJ8/bLAS1/85Q/kSzclboTJTP/dKBMZo9x:x/rx74BzuZ8/bLZ1/CQ/9c81KBMa

authentihash 14d39f33db6850920c5c5f8c7e5f30fb623a113d3a4c7bf70df7ac9d6b5d6fe9
imphash e91a5434b66db37c0376c72485d3fcf6
File size 282.0 KB ( 288768 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe

VirusTotal metadata
First submission 2016-07-03 13:45:10 UTC ( 2 years, 7 months ago )
Last submission 2016-07-03 13:45:10 UTC ( 2 years, 7 months ago )
File names rad74571.tmp.exe
usbstarter.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications