× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dca75f403f5b10adc993b878025c5a5638d9e2279eb1732a933701c53f6dc321
File name: UpdateFreezer_1.6.102.exe
Detection ratio: 1 / 49
Analysis date: 2014-04-18 13:52:30 UTC ( 2 days, 4 hours ago )
Antivirus Result Update
AhnLab-V3 Trojan/Win32.Zbot 20140417
AVG 20140418
Ad-Aware 20140418
AegisLab 20140418
Agnitum 20140417
AntiVir 20140418
Antiy-AVL 20140418
Avast 20140418
Baidu-International 20140418
BitDefender 20140418
Bkav 20140418
ByteHero 20140418
CAT-QuickHeal 20140418
CMC 20140417
ClamAV 20140418
Commtouch 20140418
Comodo 20140418
DrWeb 20140418
ESET-NOD32 20140418
Emsisoft 20140418
F-Prot 20140418
F-Secure 20140418
Fortinet 20140418
GData 20140418
Ikarus 20140418
Jiangmin 20140418
K7AntiVirus 20140418
K7GW 20140418
Kaspersky 20140418
Kingsoft 20140418
Malwarebytes 20140418
McAfee 20140418
McAfee-GW-Edition 20140418
MicroWorld-eScan 20140418
Microsoft 20140418
NANO-Antivirus 20140418
Norman 20140418
Panda 20140418
Qihoo-360 20140411
Rising 20140418
SUPERAntiSpyware 20140418
Sophos 20140418
Symantec 20140418
TheHacker 20140417
TotalDefense 20140417
TrendMicro 20140418
TrendMicro-HouseCall 20140418
VBA32 20140418
VIPRE 20140418
ViRobot 20140418
nProtect 20140418
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
Authenticode signature block
Copyright
Copyright (C) 2009-2012, IceJS Team

Publisher GRINMARK LTD
Product IceJS
Original name Bootstrapper.exe
Internal name Bootstrapper.exe
File version 1.0.2.0
Description Bootstrapper for IceJS Script Executor
Signature verification Signed file, verified signature
Signing date 2:07 PM 8/6/2012
Signers
[+] GRINMARK LTD
Status Certificate out of its validity period
Valid from 1:00 AM 9/21/2010
Valid to 12:59 AM 9/21/2012
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm SHA1
Thumbrint DE91A5BEE53CFF78517922280689D76495A5DE70
Serial number 2C CA B8 64 90 F4 9E 2C 3A 72 3F A5 4D FA 01 C7
[+] Thawte Code Signing CA - G2
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT UTF-8, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-06 12:27:15
Entry Point 0x0000D2F5
Number of sections 6
PE sections
PE imports
GetStdHandle
FileTimeToDosDateTime
FileTimeToSystemTime
WaitForSingleObject
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetFileInformationByHandle
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
FindResourceExW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
BeginUpdateResourceW
LoadResource
FindClose
TlsGetValue
SetLastError
GetSystemTime
InterlockedDecrement
CopyFileW
UpdateResourceW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
HeapSetInformation
EnumSystemLocalesA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetEnvironmentVariableW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SetCurrentDirectoryW
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
EndUpdateResourceW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
SystemTimeToFileTime
GetFileSize
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetTempFileNameW
CreateFileMappingW
CompareStringW
ExpandEnvironmentStringsW
FindNextFileW
FindFirstFileW
IsValidLocale
GetUserDefaultLCID
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
UnmapViewOfFile
WriteFile
CreateProcessW
Sleep
LoadStringW
Number of PE resources by type
RT_ICON 18
RT_STRING 2
RT_GROUP_ICON 2
ZIP 1
TEXT 1
RT_MANIFEST 1
RT_VERSION 1
PNG 1
Number of PE resources by language
NEUTRAL 14
ENGLISH NEUTRAL 10
RUSSIAN 1
ENGLISH US 1
NEUTRAL DEFAULT 1
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.2.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2633728

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2009-2012, IceJS Team

FileVersion
1.0.2.0

TimeStamp
2012:08:06 13:27:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Bootstrapper.exe

FileAccessDate
2014:04:18 14:52:41+01:00

ProductVersion
1.0.2.0

FileDescription
Bootstrapper for IceJS Script Executor

OSVersion
5.1

FileCreateDate
2014:04:18 14:52:41+01:00

OriginalFilename
Bootstrapper.exe

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
IceJS Team

CodeSize
112128

ProductName
IceJS

ProductVersionNumber
1.0.2.0

EntryPoint
0xd2f5

ObjectFileType
Unknown

File identification
MD5 5d1f058d5af40ecd42acd65b3dbc38e8
SHA1 6995c611c82874fbefc0e2e108011d7beae3b2a2
SHA256 dca75f403f5b10adc993b878025c5a5638d9e2279eb1732a933701c53f6dc321
ssdeep
49152:S5mYW0mv7qZLJ2Rek6Vv0XImvKk2m8nDxOO8y7ZuLXcRyybvtFW7TyyL4zx:S5IvhlKv0T8nDr1sLXSyyLsyycF

imphash d315f9c138ec3b174d9102e6f40d2927
File size 2.6 MB ( 2752056 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe signed

VirusTotal metadata
First submission 2012-08-10 09:01:54 UTC ( 1 year, 8 months ago )
Last submission 2014-04-18 13:52:30 UTC ( 2 days, 4 hours ago )
File names UpdateFreezer_1.6.102[Sasan.dde.ir].exe
Bootstrapper.exe
UpdateFreezer_1.6.102.exe
file-4467326_exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!