× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8a2a8135bbf5ca3fafd7be00de939a80abbef73a47e170d7879e197cd0160c15
File name: VWEPPSetup.exe
Detection ratio: 0 / 68
Analysis date: 2018-02-13 02:37:02 UTC ( 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20180213
AegisLab 20180213
AhnLab-V3 20180213
Alibaba 20180209
ALYac 20180213
Antiy-AVL 20180213
Arcabit 20180213
Avast 20180213
Avast-Mobile 20180212
AVG 20180213
Avira (no cloud) 20180213
AVware 20180210
Baidu 20180208
BitDefender 20180213
Bkav 20180212
CAT-QuickHeal 20180212
ClamAV 20180213
CMC 20180212
Comodo 20180213
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180213
Cyren 20180213
DrWeb 20180213
eGambit 20180213
Emsisoft 20180213
Endgame 20171130
ESET-NOD32 20180213
F-Prot 20180213
F-Secure 20180213
Fortinet 20180213
GData 20180213
Ikarus 20180212
Sophos ML 20180121
Jiangmin 20180212
K7AntiVirus 20180212
K7GW 20180212
Kaspersky 20180213
Kingsoft 20180213
Malwarebytes 20180213
MAX 20180213
McAfee 20180213
McAfee-GW-Edition 20180213
Microsoft 20180213
eScan 20180213
NANO-Antivirus 20180213
nProtect 20180213
Palo Alto Networks (Known Signatures) 20180213
Panda 20180212
Qihoo-360 20180213
Rising 20180213
SentinelOne (Static ML) 20180115
Sophos AV 20180213
SUPERAntiSpyware 20180213
Symantec 20180213
Symantec Mobile Insight 20180212
Tencent 20180213
TheHacker 20180208
TotalDefense 20180212
TrendMicro 20180213
TrendMicro-HouseCall 20180213
Trustlook 20180213
VBA32 20180212
VIPRE 20180213
ViRobot 20180213
Webroot 20180213
WhiteArmor 20180205
Yandex 20180210
Zillya 20180212
ZoneAlarm by Check Point 20180213
Zoner 20180213
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
749

Product Visual Word Excel PPT PDF To Tiff View and Converter
File version 3.8.00.0000
Description Setup Launcher
Comments
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2002-05-29 17:47:24
Entry Point 0x0001586F
Number of sections 4
PE sections
Overlays
MD5 2ebb4c1c6be0795707f8db2f42fa967d
File type data
Offset 212992
Size 12807851
Entropy 7.99
PE imports
GetTokenInformation
RegDeleteKeyA
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
RegSetValueExA
EqualSid
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
GetDeviceCaps
GetObjectA
TranslateCharsetInfo
DeleteDC
GetSystemPaletteEntries
SetBkMode
SelectObject
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
CreateFontIndirectA
CreateSolidBrush
GetTextExtentPointA
BitBlt
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetExitCodeProcess
LocalFree
MoveFileA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetEnvironmentVariableA
CopyFileA
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
GetPrivateProfileStringA
GetSystemDefaultLCID
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
_lclose
CreateThread
TlsSetValue
GetExitCodeThread
SetUnhandledExceptionFilter
TerminateProcess
GlobalAlloc
LocalFileTimeToFileTime
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
GetPrivateProfileIntA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
ExpandEnvironmentStringsA
RemoveDirectoryA
CreateEventA
GetFileType
GetPrivateProfileSectionA
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
lstrlenW
OpenFile
SizeofResource
SearchPathA
WritePrivateProfileStringA
LockResource
SetFileTime
GetCPInfo
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetVersion
GetEnvironmentStrings
CreateProcessA
IsValidCodePage
UnmapViewOfFile
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
GetOEMCP
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
GetMessageA
GetParent
CharPrevA
IntersectRect
EndDialog
BeginPaint
DrawIcon
KillTimer
PostQuitMessage
DefWindowProcA
ShowWindow
FillRect
SetWindowPos
FindWindowA
SendDlgItemMessageA
GetSystemMetrics
IsWindow
GetWindowRect
DispatchMessageA
ClientToScreen
LoadStringA
PostMessageA
MoveWindow
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
UpdateWindow
GetSysColor
GetDC
ReleaseDC
GetDlgCtrlID
GetClassInfoA
DestroyIcon
GetWindowLongA
GetWindowPlacement
SendMessageA
GetClientRect
SetTimer
GetDlgItem
CreateDialogParamA
CharLowerBuffA
SubtractRect
RegisterClassA
SetRect
wsprintfA
GetWindowTextLengthA
CreateWindowExA
LoadCursorA
LoadIconA
SetWindowTextA
EnableWindow
GetSysColorBrush
CharNextA
WaitForInputIdle
GetDesktopWindow
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
VerLanguageNameA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
StgIsStorageFile
CoCreateGuid
CoCreateInstance
StgOpenStorage
StringFromCLSID
GetRunningObjectTable
CoTaskMemFree
CreateItemMoniker
Number of PE resources by type
RT_ICON 9
RT_DIALOG 5
RT_STRING 3
RT_GROUP_ICON 3
GIF 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 24
NEUTRAL 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.54.164.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0002

CharacterSet
Windows, Latin1

InitializedDataSize
98304

EntryPoint
0x1586f

MIMEType
application/octet-stream

LegalCopyright
749

FileVersion
3.8.00.0000

TimeStamp
2002:05:29 18:47:24+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
3.8.00.0000

FileDescription
Setup Launcher

OSVersion
4.0

FileOS
Windows 16-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Magic Software

CodeSize
122880

ProductName
Visual Word Excel PPT PDF To Tiff View and Converter

ProductVersionNumber
3.54.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 0b77c0b60e0cf5e0c0ff9a7befaa23a3
SHA1 d7e49cc713b5cc875027abd113526b3a7413e669
SHA256 8a2a8135bbf5ca3fafd7be00de939a80abbef73a47e170d7879e197cd0160c15
ssdeep
196608:WL4lhmK1enFb+8LNq3a0YwI3G39bOjFi6LcHOtHNYepHK2oZglnSUkC+8:Ffmdb5q3jYb3GNbOE6LdNYepqm99+8

authentihash 766b37582ff901eadd1b659e8965350be0f0743b00abcc4c8a89ae875cdb6834
imphash ed4817bd12c7cb91fdcfb0ad265f5af2
File size 12.4 MB ( 13020843 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (30.2%)
Win32 Executable MS Visual C++ (generic) (21.9%)
Win64 Executable (generic) (19.4%)
Windows screen saver (9.2%)
DOS Borland compiled Executable (generic) (7.0%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-06-02 07:18:42 UTC ( 5 years, 1 month ago )
Last submission 2018-05-24 12:16:02 UTC ( 1 month, 3 weeks ago )
File names 8a2a8135bbf5ca3fafd7be00de939a80abbef73a47e170d7879e197cd0160c15
VWEPPSetup.exe
8A2A8135BBF5CA3FAFD7BE00DE939A80ABBEF73A47E170D7879E197CD0160C15
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Deleted files
Created processes
Code injections in the following processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.