× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 931f8c0c2edd60b6dec06dacaf6641739b82039cdc9237c9cbff486789486b68
File name: zpsetup.exe
Detection ratio: 2 / 67
Analysis date: 2017-12-23 11:32:17 UTC ( 1 year, 2 months ago ) View latest
Antivirus Result Update
Cylance Unsafe 20171223
TrendMicro-HouseCall Suspicious_GEN.F47V1125 20171223
Ad-Aware 20171223
AegisLab 20171223
AhnLab-V3 20171223
Alibaba 20171222
ALYac 20171223
Antiy-AVL 20171223
Arcabit 20171223
Avast 20171223
Avast-Mobile 20171223
AVG 20171223
Avira (no cloud) 20171223
AVware 20171223
Baidu 20171222
BitDefender 20171223
Bkav 20171222
CAT-QuickHeal 20171223
ClamAV 20171223
CMC 20171223
Comodo 20171223
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cyren 20171223
DrWeb 20171223
eGambit 20171223
Emsisoft 20171223
Endgame 20171130
ESET-NOD32 20171223
F-Prot 20171223
F-Secure 20171223
Fortinet 20171223
GData 20171223
Sophos ML 20170914
Jiangmin 20171221
K7AntiVirus 20171223
K7GW 20171223
Kaspersky 20171223
Kingsoft 20171223
Malwarebytes 20171223
MAX 20171223
McAfee 20171223
McAfee-GW-Edition 20171223
Microsoft 20171223
eScan 20171223
NANO-Antivirus 20171223
nProtect 20171223
Palo Alto Networks (Known Signatures) 20171223
Panda 20171223
Qihoo-360 20171223
Rising 20171223
SentinelOne (Static ML) 20171207
Sophos AV 20171223
SUPERAntiSpyware 20171222
Symantec 20171222
Symantec Mobile Insight 20171222
Tencent 20171223
TheHacker 20171219
TotalDefense 20171223
TrendMicro 20171223
Trustlook 20171223
VBA32 20171222
VIPRE 20171223
ViRobot 20171223
Webroot 20171223
WhiteArmor 20171204
Yandex 20171222
Zillya 20171222
ZoneAlarm by Check Point 20171223
Zoner 20171223
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© 2003-2017 Thegrideon Software

Product Zip Password
File version 2017.11.16.0
Description Zip Password Tool Installer
Comments Zip Password Tool Installer
Signature verification Signed file, verified signature
Signing date 8:45 PM 11/16/2017
Signers
[+] THEGRIDEON LTD
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 1/10/2014
Valid to 12:59 AM 1/11/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint E36F860C8C60D90C6BF42C7554988BA825146C08
Serial number 5C 22 1C E5 5D 2B 36 92 57 C6 6A C1 21 98 57 05
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO SHA-256 Time Stamping Signer
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 12/31/2015
Valid to 7:40 PM 7/9/2019
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 36527D4FA26A68F9EB4596F1D99ABB2C0EA76DFA
Serial number 4E B0 87 8F CC 24 35 36 B2 D8 C9 F7 BF 39 55 77
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Packers identified
F-PROT NSIS, appended, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-08-01 00:33:55
Entry Point 0x0000330D
Number of sections 5
PE sections
Overlays
MD5 17da7d93afda490f840d61f4c6a39359
File type font/x-snf
Offset 39424
Size 3836000
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
AdjustTokenPrivileges
RegEnumKeyA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
SetFileSecurityA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
lstrlenA
GetFileAttributesA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
RemoveDirectoryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
ExpandEnvironmentStringsA
GetCommandLineA
GlobalLock
GetFullPathNameA
GetModuleHandleA
GetTempPathA
CreateThread
lstrcmpiA
SetFilePointer
lstrcmpA
ReadFile
WriteFile
FindFirstFileA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
GetSystemDirectoryA
GetDiskFreeSpaceA
MoveFileExA
GetProcAddress
SetEnvironmentVariableA
SetFileAttributesA
FreeLibrary
MoveFileA
CreateProcessA
lstrcpyA
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHFileOperationA
EmptyClipboard
GetMessagePos
CharPrevA
EndDialog
BeginPaint
PostQuitMessage
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
FindWindowExA
ReleaseDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
ShowWindow
SetClipboardData
IsWindowVisible
SendMessageA
DialogBoxParamA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
SetWindowTextA
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
SendMessageTimeoutA
CreateWindowExA
LoadCursorA
TrackPopupMenu
DrawTextA
DestroyWindow
FillRect
RegisterClassA
CharNextA
CallWindowProcA
GetSystemMenu
EndPaint
CloseClipboard
OpenClipboard
ExitWindowsEx
SetCursor
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_DIALOG 6
RT_ICON 1
RT_MANIFEST 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
PE resources
ExifTool file metadata
CodeSize
25088

SubsystemVersion
4.0

Comments
Zip Password Tool Installer

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2017.11.16.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Zip Password Tool Installer

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
118784

EntryPoint
0x330d

MIMEType
application/octet-stream

LegalCopyright
2003-2017 Thegrideon Software

FileVersion
2017.11.16.0

TimeStamp
2017:08:01 01:33:55+01:00

FileType
Win32 EXE

PEType
PE32

UninitializedDataSize
1024

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Thegrideon Software

LegalTrademarks
Zip Password is a trademark of Thegrideon Software

ProductName
Zip Password

ProductVersionNumber
2017.11.16.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 9c20837e20857f9acc0ca15dd3744892
SHA1 fa1a1438c44501b934637a166b6ab7c91fb7c7dc
SHA256 931f8c0c2edd60b6dec06dacaf6641739b82039cdc9237c9cbff486789486b68
ssdeep
98304:r+/yGHXodbgWoM07OwU81O6ApWrOhDRFKSuaJiNuF:rCYdcpMAP66ApWShD3KRacNu

authentihash 04a6009c6e014fde622c228c33c66489cc114ee434ed7a8351c19c6d631d4ac3
imphash 57e98d9a5a72c8d7ad8fb7a6a58b3daf
File size 3.7 MB ( 3875424 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
nsis peexe signed overlay

VirusTotal metadata
First submission 2017-11-25 11:17:02 UTC ( 1 year, 3 months ago )
Last submission 2018-01-14 17:48:54 UTC ( 1 year, 2 months ago )
File names zpsetup.exe
931F8C0C2EDD60B6DEC06DACAF6641739B82039CDC9237C9CBFF486789486B68.exe
VirusShare_9c20837e20857f9acc0ca15dd3744892
zpsetup.exe
Zip Password setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Runtime DLLs