× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8eaa214e11c9af3be587dece7b744b9996c215b663c26d47b3dd30565d0b7ab6
File name: 8eaa214e11c9af3be587dece7b744b9996c215b663c26d47b3dd30565d0b7ab6
Detection ratio: 11 / 66
Analysis date: 2018-05-25 04:41:04 UTC ( 1 month ago ) View latest
Antivirus Result Update
AegisLab Troj.W32.Hesv!c 20180525
Antiy-AVL Trojan/Win32.Hesv 20180525
CAT-QuickHeal Trojan.Hesv 20180524
CMC Trojan.Win32.Hesv!O 20180525
Kaspersky Trojan.Win32.Hesv.bzej 20180525
McAfee Artemis!EC38D5128012 20180524
McAfee-GW-Edition BehavesLike.Win32.BadFile.wc 20180525
Tencent Win32.Trojan.Hesv.Akyq 20180525
TrendMicro-HouseCall Suspicious_GEN.F47V0312 20180525
VBA32 Trojan.Hesv 20180524
ZoneAlarm by Check Point Trojan.Win32.Hesv.bzej 20180525
Ad-Aware 20180525
AhnLab-V3 20180525
Alibaba 20180525
ALYac 20180525
Arcabit 20180525
Avast 20180525
Avast-Mobile 20180524
AVG 20180525
Avira (no cloud) 20180524
AVware 20180525
Babable 20180406
Baidu 20180524
BitDefender 20180525
Bkav 20180524
ClamAV 20180521
Comodo 20180525
CrowdStrike Falcon (ML) 20180202
Cybereason None
Cylance 20180525
Cyren 20180525
DrWeb 20180525
eGambit 20180525
Emsisoft 20180525
Endgame 20180507
ESET-NOD32 20180525
F-Prot 20180525
F-Secure 20180525
Fortinet 20180525
GData 20180525
Ikarus 20180524
Sophos ML 20180503
Jiangmin 20180525
K7AntiVirus 20180524
K7GW 20180525
Kingsoft 20180525
Malwarebytes 20180525
MAX 20180525
Microsoft 20180525
eScan 20180525
NANO-Antivirus 20180525
nProtect 20180525
Palo Alto Networks (Known Signatures) 20180525
Panda 20180524
Qihoo-360 20180525
Rising 20180525
SentinelOne (Static ML) 20180225
Sophos AV 20180525
SUPERAntiSpyware 20180525
Symantec 20180525
Symantec Mobile Insight 20180525
TheHacker 20180524
TotalDefense 20180524
TrendMicro 20180525
Trustlook 20180525
VIPRE 20180525
ViRobot 20180524
Webroot 20180525
Yandex 20180524
Zillya 20180524
Zoner 20180524
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright

Product MS Visio Search In Multiple Files At Once Software
File version
Description MS Visio Search In Multiple Files At Once Software Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009C40
Number of sections 8
PE sections
Overlays
MD5 e72f85ffc9e941bb90cac22f02c10ef8
File type data
Offset 54272
Size 7334740
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
DUTCH 4
ENGLISH US 3
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
17920

EntryPoint
0x9c40

MIMEType
application/octet-stream

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

FileDescription
MS Visio Search In Multiple Files At Once Software Setup

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Sobolsoft

CodeSize
37888

ProductName
MS Visio Search In Multiple Files At Once Software

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 ec38d5128012f39df37b7df1367bba44
SHA1 0539001bb49a7a0f06f13345fdd05dbd8e6765ff
SHA256 8eaa214e11c9af3be587dece7b744b9996c215b663c26d47b3dd30565d0b7ab6
ssdeep
196608:jaCdva8NPG/tAHnfIzXuCmPEB776RXncDlVwdlhIPQtGLgJ:jRdSQu/t0fIyFcBvW3cDli5XtMw

authentihash 118bb0f68d46443527db11a0878d3507d922c3d0befb188d5a6bbf76c11ceef0
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 7.0 MB ( 7389012 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (76.6%)
Win32 Executable Delphi generic (9.9%)
Win32 Dynamic Link Library (generic) (4.5%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-11-01 23:21:32 UTC ( 7 months, 3 weeks ago )
Last submission 2018-05-25 04:41:04 UTC ( 1 month ago )
File names setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
UDP communications