× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d8cbe1a44e030b749cdfb718e1b8b3d926d88c4137f1c809cf905935525122b1
File name: 441871
Detection ratio: 0 / 55
Analysis date: 2016-01-11 02:38:34 UTC ( 3 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160111
AegisLab 20160110
Yandex 20160108
AhnLab-V3 20160110
Alibaba 20160109
ALYac 20160111
Antiy-AVL 20160110
Arcabit 20160111
Avast 20160111
AVG 20160111
Avira (no cloud) 20160110
AVware 20160110
Baidu-International 20160110
BitDefender 20160111
Bkav 20160109
ByteHero 20160111
CAT-QuickHeal 20160109
ClamAV 20160110
CMC 20160107
Comodo 20160111
Cyren 20160111
DrWeb 20160111
Emsisoft 20160111
ESET-NOD32 20160111
F-Prot 20160111
F-Secure 20160111
Fortinet 20160111
GData 20160111
Ikarus 20160111
Jiangmin 20160111
K7AntiVirus 20160110
K7GW 20160110
Kaspersky 20160111
Malwarebytes 20160111
McAfee 20160111
McAfee-GW-Edition 20160111
Microsoft 20160110
eScan 20160111
NANO-Antivirus 20160111
nProtect 20160108
Panda 20160110
Qihoo-360 20160111
Rising 20160110
Sophos AV 20160111
SUPERAntiSpyware 20160111
Symantec 20160110
TheHacker 20160107
TotalDefense 20160110
TrendMicro 20160111
TrendMicro-HouseCall 20160111
VBA32 20160107
VIPRE 20160111
ViRobot 20160111
Zillya 20160110
Zoner 20160111
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product Quick Recovery for Microsoft Outlook (Trial Version)
File version 13.1
Description Quick Recovery for Microsoft Outlook (Trial Version) Setup
Comments This installation was built with Inno Setup.
Signature verification Certificate out of its validity period
Signers
[+] Unistal Systems Pvt. Ltd.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Code Signing CA - G2
Valid from 01:00 AM 02/27/2011
Valid to 12:59 AM 03/02/2013
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha1RSA
Thumbprint 9BD0837222CE912FD7F315E59BC33A33B849CD0B
Serial number 03 40 76 4C 13 DE FF 9C 98 40 75 CE 4B CF C4 A6
[+] Thawte Code Signing CA - G2
Status Valid
Issuer thawte Primary Root CA
Valid from 01:00 AM 02/08/2010
Valid to 12:59 AM 02/08/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 01:00 AM 11/17/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Packers identified
F-PROT INNO, appended, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009C40
Number of sections 8
PE sections
Overlays
MD5 655839f0f6e276e0cb697906c600cc8c
File type data
Offset 54272
Size 2861040
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 1
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 4
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
15360

ImageVersion
6.0

ProductName
Quick Recovery for Microsoft Outlook (Trial Version)

FileVersionNumber
13.1.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

LinkerVersion
2.25

FileTypeExtension
exe

MIMEType
application/octet-stream

FileVersion
13.1

TimeStamp
1992:06:20 00:22:17+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
13.1

FileDescription
Quick Recovery for Microsoft Outlook (Trial Version) Setup

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Unistal Systems Pvt. Ltd

CodeSize
37888

FileSubtype
0

ProductVersionNumber
13.1.0.0

EntryPoint
0x9c40

ObjectFileType
Executable application

Execution parents
File identification
MD5 331980928bdb5fbf8d39a3004dd96eae
SHA1 e93caef115db3b3e40aaa59fbda7f18014d8ce46
SHA256 d8cbe1a44e030b749cdfb718e1b8b3d926d88c4137f1c809cf905935525122b1
ssdeep
49152:yaPNkxmO4cmP2vXfCh3yJQb73oS8Kps45QR5I//+3O+LRnHuKJ8PgQsjdOtuG:bPWxj4eJun8KsM/ByRZQAjYR

authentihash 5661d2d7613d7de5b95e950f299e045b934bbcad7830c9f3264622f52adf4908
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 2.8 MB ( 2915312 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (76.6%)
Win32 Executable Delphi generic (9.9%)
Win32 Dynamic Link Library (generic) (4.5%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2012-04-29 09:43:07 UTC ( 7 years ago )
Last submission 2019-02-18 08:49:38 UTC ( 3 months ago )
File names ZXAfrGBEA.ps1
aa
441871
D8CBE1A44E030B749CDFB718E1B8B3D926D88C4137F1C809CF905935525122B1
1341953642-QuickRecoveryDemoPST.exe
A_OMYV.tmp
15639067
QuickRecoveryDemoPST.exe
QuickRecoveryDemoPST.exe
d8cbe1a44e030b749cdfb718e1b8b3d926d88c4137f1c809cf905935525122b1
QuickRecoveryDemoPST.exe
output.15639067.txt
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!