× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8f7b606dbbd9e60d9e755de92d0300d4d5eb0fc0c4a49480d7490ffdae2f4e67
File name: spamfighter_web.exe
Detection ratio: 1 / 68
Analysis date: 2018-10-16 17:55:05 UTC ( 1 month ago ) View latest
Antivirus Result Update
Jiangmin Trojan.Generic.bxpmx 20181016
Ad-Aware 20181016
AegisLab 20181016
AhnLab-V3 20181016
Alibaba 20180921
ALYac 20181016
Antiy-AVL 20181016
Arcabit 20181016
Avast 20181016
Avast-Mobile 20181016
AVG 20181016
Avira (no cloud) 20181016
Babable 20180918
Baidu 20181015
BitDefender 20181016
Bkav 20181016
CAT-QuickHeal 20181013
ClamAV 20181016
CMC 20181016
Comodo 20181016
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181016
Cyren 20181016
DrWeb 20181016
eGambit 20181016
Emsisoft 20181016
Endgame 20180730
ESET-NOD32 20181016
F-Prot 20181016
F-Secure 20181016
Fortinet 20181016
GData 20181016
Ikarus 20181016
Sophos ML 20180717
K7AntiVirus 20181016
K7GW 20181016
Kaspersky 20181016
Kingsoft 20181016
Malwarebytes 20181016
MAX 20181016
McAfee 20181016
McAfee-GW-Edition 20181016
Microsoft 20181016
eScan 20181016
NANO-Antivirus 20181016
Palo Alto Networks (Known Signatures) 20181016
Panda 20181016
Qihoo-360 20181016
Rising 20181016
SentinelOne (Static ML) 20181011
Sophos AV 20181016
SUPERAntiSpyware 20181015
Symantec 20181016
Symantec Mobile Insight 20181001
TACHYON 20181016
Tencent 20181016
TheHacker 20181015
TotalDefense 20181016
TrendMicro 20181016
TrendMicro-HouseCall 20181016
Trustlook 20181016
VBA32 20181016
VIPRE 20181016
ViRobot 20181016
Webroot 20181016
Yandex 20181016
Zillya 20181016
ZoneAlarm by Check Point 20181016
Zoner 20181016
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2010 SPAMfighter ApS

Product SPAMfighter
Original name SPAMfighterSetup.exe
Internal name SPAMfighter Setup
File version 7.6.144.0
Description SPAMfighter Installation Package
Signature verification Signed file, verified signature
Signing date 8:28 PM 2/2/2018
Signers
[+] SPAMfighter ApS
Status Valid
Issuer thawte SHA256 Code Signing CA
Valid from 1:00 AM 2/2/2018
Valid to 12:59 AM 5/5/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint DCC81062F8CC5C1BA55BA819B98C915F6A387D19
Serial number 5B 97 C8 97 AD C6 30 C3 2D F5 4E E0 29 AE 01 DC
[+] thawte SHA256 Code Signing CA
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint D00CFDBF46C98A838BC10DC4E097AE0152C461BC
Serial number 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-02-02 19:16:14
Entry Point 0x00020AC3
Number of sections 5
PE sections
Overlays
MD5 4fb53132e537cb57f7f4c8b979cf4947
File type data
Offset 460800
Size 2009536
Entropy 7.39
PE imports
SetSecurityDescriptorDacl
RegCloseKey
RegSetValueExW
RegOpenKeyExW
InitializeSecurityDescriptor
RegQueryValueExW
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
WaitForSingleObject
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
GetExitCodeProcess
InitializeCriticalSection
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetModuleFileNameW
CopyFileA
HeapAlloc
GetVersionExA
RemoveDirectoryA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
SetUnhandledExceptionFilter
MoveFileExA
TerminateProcess
WriteConsoleA
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
CreateDirectoryW
GetUserDefaultLCID
GetProcessHeap
ExpandEnvironmentStringsW
FindFirstFileA
FindNextFileA
IsValidLocale
GetProcAddress
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetLastError
LCMapStringW
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GetModuleFileNameA
GetEnvironmentStrings
GetCurrentProcessId
GetCPInfo
HeapSize
GetCommandLineA
InterlockedCompareExchange
OpenMutexA
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
SHGetFolderPathW
ShellExecuteExA
LoadStringW
MessageBoxA
PE exports
Number of PE resources by type
RT_ICON 11
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 13
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.6.144.0

LanguageCode
Neutral

FileFlagsMask
0x0000

FileDescription
SPAMfighter Installation Package

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
199168

EntryPoint
0x20ac3

OriginalFileName
SPAMfighterSetup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2010 SPAMfighter ApS

FileVersion
7.6.144.0

TimeStamp
2018:02:02 20:16:14+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
SPAMfighter Setup

ProductVersion
7.6.144.0

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SPAMfighter ApS

CodeSize
260608

ProductName
SPAMfighter

ProductVersionNumber
7.6.144.0

FileTypeExtension
exe

ObjectFileType
Unknown

Execution parents
File identification
MD5 e8a87e6615af624f383ee55590e8b45c
SHA1 370028cec28d6af30090975badaac7f2ed05aa27
SHA256 8f7b606dbbd9e60d9e755de92d0300d4d5eb0fc0c4a49480d7490ffdae2f4e67
ssdeep
49152:eSS/7HgYfZzuDpxFfWb52OUTv+6GhfJZqyncamPROdIcm:pS/UxFfWb52LlG0XZOdIv

authentihash ef87bd589dba3b40953f6dece038b9b0c193c49f518e2c50439d6387ece3fbb8
imphash 0f610b9ffef373829db25513cc5d4c13
File size 2.4 MB ( 2470336 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (49.0%)
Win64 Executable (generic) (31.4%)
Win32 Dynamic Link Library (generic) (7.4%)
Win32 Executable (generic) (5.1%)
OS/2 Executable (generic) (2.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-02-02 20:44:00 UTC ( 9 months, 2 weeks ago )
Last submission 2018-11-13 23:49:10 UTC ( 6 days, 17 hours ago )
File names SPAMfighterSetup.exe
SPAMFI~1.EXE
spamfighter_web.exe
spamfighter_web.exe
spamfighter_web.exe
1037087
spamfighter_7-6-144_fr_120758.exe
spamfighter_web.exe
SPAMfighter_web.exe
spamfighter_web.exe
spamfighter_web.exe
spamfighter_web.exe
8F7B606DBBD9E60D9E755DE92D0300D4D5EB0FC0C4A49480D7490FFDAE2F4E67.exe
spamfighter.exe
SPAMfighter Setup
spamfighter_web (1).exe
SPAMfighter.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections