× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c51138376f39a1d7ccfe238820e5bb76288527782f5d48218fe8ab8803150726
File name: wintask-787-jetelecharge.exe
Detection ratio: 0 / 68
Analysis date: 2017-12-24 03:37:58 UTC ( 6 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20171224
AegisLab 20171224
AhnLab-V3 20171223
Alibaba 20171222
ALYac 20171224
Antiy-AVL 20171224
Arcabit 20171224
Avast 20171224
Avast-Mobile 20171223
AVG 20171224
Avira (no cloud) 20171223
AVware 20171224
Baidu 20171222
BitDefender 20171224
Bkav 20171222
CAT-QuickHeal 20171223
ClamAV 20171223
CMC 20171223
Comodo 20171224
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171224
Cyren 20171224
DrWeb 20171224
eGambit 20171224
Emsisoft 20171224
Endgame 20171130
ESET-NOD32 20171223
F-Prot 20171224
F-Secure 20171224
Fortinet 20171224
GData 20171224
Ikarus 20171223
Sophos ML 20170914
Jiangmin 20171221
K7AntiVirus 20171224
K7GW 20171223
Kaspersky 20171224
Kingsoft 20171224
Malwarebytes 20171224
MAX 20171224
McAfee 20171224
McAfee-GW-Edition 20171224
Microsoft 20171224
eScan 20171224
NANO-Antivirus 20171224
nProtect 20171224
Palo Alto Networks (Known Signatures) 20171224
Panda 20171223
Qihoo-360 20171224
Rising 20171224
SentinelOne (Static ML) 20171207
Sophos AV 20171224
SUPERAntiSpyware 20171223
Symantec 20171223
Symantec Mobile Insight 20171222
Tencent 20171224
TheHacker 20171219
TotalDefense 20171223
TrendMicro 20171224
TrendMicro-HouseCall 20171224
Trustlook 20171224
VBA32 20171222
VIPRE 20171224
ViRobot 20171223
Webroot 20171224
WhiteArmor 20171204
Yandex 20171222
Zillya 20171222
ZoneAlarm by Check Point 20171224
Zoner 20171224
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 12:02 PM 6/19/2015
Signers
[+] TaskWare
Status This certificate or one of the certificates in the certificate chain is not time valid., Trust for this certificate or one of the certificates in the certificate chain has been revoked.
Issuer COMODO Code Signing CA 2
Valid from 1:00 AM 2/19/2014
Valid to 12:59 AM 2/20/2016
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B04BCC23D59BE54255E6039C2CA7097E46F2F02C
Serial number 22 63 28 8B 1F C5 23 4E F3 98 D1 8D DA 4F 61 3E
[+] COMODO Code Signing CA 2
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 8/24/2011
Valid to 11:48 AM 5/30/2020
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B64771392538D1EB7A9281998791C14AFD0C5035
Serial number 10 70 9D 4F F5 54 08 D7 30 60 01 D8 EA 91 75 BB
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2007-04-19 01:03:15
Entry Point 0x0002996C
Number of sections 4
PE sections
Overlays
MD5 1a3e08cd8160b8656bf5ded574e5aeae
File type data
Offset 364544
Size 22579304
Entropy 7.99
PE imports
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
EqualSid
OpenProcessToken
RegSetValueExA
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
AdjustTokenPrivileges
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
BitBlt
CreateDIBitmap
GetStockObject
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetThreadContext
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
WriteProcessMemory
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
RaiseException
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
SetThreadContext
TerminateProcess
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
VirtualProtectEx
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
FindNextFileA
DuplicateHandle
SearchPathA
ExpandEnvironmentStringsA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
GlobalAlloc
GetModuleFileNameA
GetShortPathNameA
SizeofResource
CompareFileTime
LockResource
SetFileTime
lstrlenW
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
QueryPerformanceFrequency
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetVersion
GetEnvironmentStrings
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
RpcStringFreeA
UuidToStringA
UuidCreate
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
CreateWindowExA
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
DrawIcon
KillTimer
FindWindowA
DefWindowProcA
SetWindowTextA
SetWindowPos
GetDesktopWindow
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
PostMessageA
MoveWindow
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
CharUpperA
SendDlgItemMessageA
GetDC
ReleaseDC
GetDlgCtrlID
GetClassInfoA
DestroyIcon
LoadStringA
ShowWindow
CharPrevA
GetWindowPlacement
SendMessageA
SubtractRect
SetTimer
GetDlgItem
CreateDialogParamA
CharLowerBuffA
LoadCursorA
ClientToScreen
SetRect
GetWindowLongA
GetWindowTextLengthA
GetSysColor
GetClientRect
LoadIconA
GetMessageA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
wsprintfA
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
Number of PE resources by type
RT_ICON 9
RT_DIALOG 5
RT_STRING 3
GIF 2
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 22
NEUTRAL 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
14.0.0.162

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Setup Launcher

CharacterSet
Unicode

InitializedDataSize
143360

InternalBuildNumber
62562

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2007 Macrovision Corporation

FileVersion
5.2.518

TimeStamp
2007:04:19 02:03:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
5.2.

SubsystemVersion
4.0

OSVersion
4.0

EntryPoint
0x2996c

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
TaskWare

CodeSize
217088

ProductName
WinTask 5.2 D

ProductVersionNumber
14.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 25e0245d4af6cf8faf019ae0a9ac58a3
SHA1 5790611397fe2ccead8e8dd3e5a1fa9cad234743
SHA256 c51138376f39a1d7ccfe238820e5bb76288527782f5d48218fe8ab8803150726
ssdeep
393216:0aDj8ai050729zj986PlgRXz5ZnECQpi4bcmD0lsFr8ocw/hD/MQ171b8lm6vqyL:04j88y729186PlgRbB+i4g4YsFwFODEL

authentihash 779aa49dbf82b4dc7f458c8c1b431318a1bfe98aed0ce1d2214719e42e98c80c
imphash ee5d64bd299805320bf7ca40b8082306
File size 21.9 MB ( 22943848 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (54.3%)
Win64 Executable (generic) (34.8%)
Win32 Executable (generic) (5.6%)
Generic Win/DOS Executable (2.5%)
DOS Executable Generic (2.5%)
Tags
revoked-cert peexe signed overlay

VirusTotal metadata
First submission 2015-12-10 09:48:37 UTC ( 2 years, 7 months ago )
Last submission 2017-12-24 03:37:58 UTC ( 6 months, 3 weeks ago )
File names wintask-787-jetelecharge.exe
wintaskfrdemo.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!