× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 97fbbcd168bbc9a58e52d22dbe7de22a436e7228af36f2012784ac5c9e97a687
File name: 409531
Detection ratio: 0 / 56
Analysis date: 2016-01-10 16:23:25 UTC ( 3 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160110
AegisLab 20160110
Yandex 20160108
AhnLab-V3 20160110
Alibaba 20160109
ALYac 20160110
Antiy-AVL 20160110
Arcabit 20160110
Avast 20160110
AVG 20160110
Avira (no cloud) 20160110
AVware 20160110
Baidu-International 20160110
BitDefender 20160110
Bkav 20160109
ByteHero 20160110
CAT-QuickHeal 20160109
ClamAV 20160110
CMC 20160107
Comodo 20160110
Cyren 20160110
DrWeb 20160110
Emsisoft 20160110
ESET-NOD32 20160110
F-Prot 20160110
F-Secure 20160108
Fortinet 20160110
GData 20160110
Ikarus 20160110
Jiangmin 20160110
K7AntiVirus 20160110
K7GW 20160110
Kaspersky 20160110
Malwarebytes 20160110
McAfee 20160110
McAfee-GW-Edition 20160110
Microsoft 20160110
eScan 20160110
NANO-Antivirus 20160110
nProtect 20160108
Panda 20160110
Qihoo-360 20160110
Rising 20160110
Sophos AV 20160110
SUPERAntiSpyware 20160110
Symantec 20160109
Tencent 20160110
TheHacker 20160107
TotalDefense 20160110
TrendMicro 20160110
TrendMicro-HouseCall 20160110
VBA32 20160107
VIPRE 20160110
ViRobot 20160110
Zillya 20160110
Zoner 20160110
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2003 InstallShield Software Corp.

Product Image Trends' Fisheye-Hemi Plug-In 1.2.5
Original name setup.exe
Internal name setup.exe
File version 1.2.5
Description Setup Launcher
Comments
Signature verification Certificate out of its validity period
Signers
[+] eSellerate
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Code Signing CA - G2
Valid from 12:00 AM 09/08/2010
Valid to 11:59 PM 09/08/2012
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha1RSA
Thumbprint 070A1363B950BAB105531C6E73459558A3EAED69
Serial number 46 04 13 09 FB 49 17 A7 3C 47 40 51 5B 00 F1 4C
[+] Thawte Code Signing CA - G2
Status Valid
Issuer thawte Primary Root CA
Valid from 12:00 AM 02/08/2010
Valid to 11:59 PM 02/07/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 12:00 AM 11/17/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-09-09 22:10:25
Entry Point 0x00003097
Number of sections 4
PE sections
Overlays
MD5 092961906827c4e88c3497a7f7a1f372
File type data
Offset 53248
Size 12685928
Entropy 7.99
PE imports
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
SetFilePointer
GetLastError
HeapFree
GetSystemTimeAsFileTime
LCMapStringW
lstrcatA
GetSystemInfo
lstrlenA
GetFileAttributesA
GetExitCodeProcess
QueryPerformanceCounter
HeapDestroy
HeapAlloc
FlushFileBuffers
VirtualProtect
GetTempPathA
LoadLibraryA
GetVersionExA
RemoveDirectoryA
GetStdHandle
RtlUnwind
FreeEnvironmentStringsA
HeapReAlloc
_lwrite
GetDriveTypeA
CompareFileTime
GetLocaleInfoA
GetCurrentProcessId
OpenProcess
CreateDirectoryA
DeleteFileA
LCMapStringA
GetCurrentProcess
UnhandledExceptionFilter
MultiByteToWideChar
_llseek
HeapSize
FreeEnvironmentStringsW
GetModuleFileNameA
GetProcAddress
_lread
GetProcessHeap
SetStdHandle
GetModuleHandleA
_lclose
GetOEMCP
GetCPInfo
GetStringTypeA
_lcreat
FindFirstFileA
InterlockedExchange
lstrcpyA
_lopen
CloseHandle
GetTempFileNameA
GetCommandLineA
GetACP
GetDiskFreeSpaceA
GetStringTypeW
GetCurrentThreadId
FreeLibrary
GetFileType
TerminateProcess
GetEnvironmentStrings
CreateProcessA
GetLogicalDriveStringsA
WideCharToMultiByte
SetHandleCount
HeapCreate
WriteFile
VirtualQuery
VirtualFree
GetEnvironmentStringsW
Sleep
FormatMessageA
GetTickCount
ExitProcess
GetVersion
VirtualAlloc
GetStartupInfoA
SetLastError
DispatchMessageA
MessageBoxA
PeekMessageA
TranslateMessage
InternetSetCookieA
Number of PE resources by type
RT_ICON 4
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 6
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
20480

ImageVersion
21204.194

ProductName
Image Trends' Fisheye-Hemi Plug-In 1.2.5

FileVersionNumber
9.0.333.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0002

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
7.1

FileTypeExtension
exe

OriginalFileName
setup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.2.5

TimeStamp
2004:09:09 23:10:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup.exe

ProductVersion
1.2.5

FileDescription
Setup Launcher

OSVersion
4.0

FileOS
Windows 16-bit

LegalCopyright
Copyright (C) 2003 InstallShield Software Corp.

MachineType
Intel 386 or later, and compatibles

CompanyName
Image Trends, Inc.

CodeSize
28672

FileSubtype
0

ProductVersionNumber
9.0.0.0

EntryPoint
0x3097

ObjectFileType
Executable application

File identification
MD5 21f19d644a767fb6936caf2634d73ab8
SHA1 eaa14aefc22ebc15f05a0ad9feb968a7ac27c632
SHA256 97fbbcd168bbc9a58e52d22dbe7de22a436e7228af36f2012784ac5c9e97a687
ssdeep
196608:BSDA1oMuWr45hrr24mVf72af+GRQkeRJDtkMxIKRTf9YxpATBbj/acqpXLCXTD+O:FeJWGhrr2X7x25kIptJKKBkpQP

authentihash 7fb590ff0f3fad6bcc8c96c2b690c973109a9f698dbd2f4da97e23b44564a5e8
imphash b79a2e9b945e7165b2166fa98e7c2334
File size 12.1 MB ( 12739176 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID MS generic-sfx Cabinet File Unpacker (32/64bit MSCFU) (44.7%)
Microsoft Update - Self Extracting Cabinet (43.3%)
Win32 Executable MS Visual C++ (generic) (3.9%)
Win64 Executable (generic) (3.5%)
Microsoft Visual C++ compiled executable (generic) (2.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2012-09-14 15:10:13 UTC ( 6 years, 8 months ago )
Last submission 2019-05-13 19:46:11 UTC ( 1 week, 6 days ago )
File names 97FBBCD168BBC9A58E52D22DBE7DE22A436E7228AF36F2012784AC5C9E97A687.exe
setupHemi.exe
409531
15648395
output.15648395.txt
setup.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!