× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dca75f403f5b10adc993b878025c5a5638d9e2279eb1732a933701c53f6dc321
File name: download.php
Detection ratio: 0 / 56
Analysis date: 2014-12-01 00:44:13 UTC ( 3 months ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20141130
AVG 20141130
AVware 20141121
Ad-Aware 20141201
AegisLab 20141201
Agnitum 20141129
AhnLab-V3 20141130
Antiy-AVL 20141130
Avast 20141201
Avira 20141130
Baidu-International 20141130
BitDefender 20141130
Bkav 20141127
ByteHero 20141201
CAT-QuickHeal 20141129
CMC 20141127
ClamAV 20141201
Comodo 20141130
Cyren 20141201
DrWeb 20141201
ESET-NOD32 20141130
Emsisoft 20141201
F-Prot 20141201
F-Secure 20141130
Fortinet 20141129
GData 20141201
Ikarus 20141130
Jiangmin 20141201
K7AntiVirus 20141128
K7GW 20141129
Kaspersky 20141201
Kingsoft 20141201
Malwarebytes 20141201
McAfee 20141201
McAfee-GW-Edition 20141201
MicroWorld-eScan 20141201
Microsoft 20141201
NANO-Antivirus 20141130
Norman 20141130
Panda 20141130
Qihoo-360 20141201
Rising 20141129
SUPERAntiSpyware 20141130
Sophos 20141130
Symantec 20141201
Tencent 20141201
TheHacker 20141130
TotalDefense 20141130
TrendMicro 20141201
TrendMicro-HouseCall 20141201
VBA32 20141128
VIPRE 20141201
ViRobot 20141130
Zillya 20141130
Zoner 20141127
nProtect 20141128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
Authenticode signature block
Copyright
Copyright (C) 2009-2012, IceJS Team

Publisher GRINMARK LTD
Product IceJS
Original name Bootstrapper.exe
Internal name Bootstrapper.exe
File version 1.0.2.0
Description Bootstrapper for IceJS Script Executor
Signature verification Signed file, verified signature
Signing date 2:07 PM 8/6/2012
Signers
[+] GRINMARK LTD
Status Certificate out of its validity period
Valid from 1:00 AM 9/21/2010
Valid to 12:59 AM 9/21/2012
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm SHA1
Thumbrint DE91A5BEE53CFF78517922280689D76495A5DE70
Serial number 2C CA B8 64 90 F4 9E 2C 3A 72 3F A5 4D FA 01 C7
[+] Thawte Code Signing CA - G2
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-08-06 12:27:15
Entry Point 0x0000D2F5
Number of sections 6
PE sections
PE imports
GetStdHandle
FileTimeToDosDateTime
FileTimeToSystemTime
WaitForSingleObject
EncodePointer
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetFileInformationByHandle
GetLocaleInfoW
SetStdHandle
WideCharToMultiByte
FindResourceExW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
BeginUpdateResourceW
LoadResource
FindClose
TlsGetValue
SetLastError
GetSystemTime
InterlockedDecrement
CopyFileW
UpdateResourceW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
HeapSetInformation
EnumSystemLocalesA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetEnvironmentVariableW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SetCurrentDirectoryW
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
EndUpdateResourceW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
SystemTimeToFileTime
GetFileSize
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetTempFileNameW
CreateFileMappingW
CompareStringW
ExpandEnvironmentStringsW
FindNextFileW
FindFirstFileW
IsValidLocale
GetUserDefaultLCID
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCPInfo
HeapSize
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
UnmapViewOfFile
WriteFile
CreateProcessW
Sleep
LoadStringW
Number of PE resources by type
RT_ICON 18
RT_STRING 2
RT_GROUP_ICON 2
ZIP 1
TEXT 1
RT_MANIFEST 1
RT_VERSION 1
PNG 1
Number of PE resources by language
NEUTRAL 14
ENGLISH NEUTRAL 10
RUSSIAN 1
ENGLISH US 1
NEUTRAL DEFAULT 1
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.2.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
2633728

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2009-2012, IceJS Team

FileVersion
1.0.2.0

TimeStamp
2012:08:06 13:27:15+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Bootstrapper.exe

FileAccessDate
2014:12:01 01:45:03+01:00

ProductVersion
1.0.2.0

FileDescription
Bootstrapper for IceJS Script Executor

OSVersion
5.1

FileCreateDate
2014:12:01 01:45:03+01:00

OriginalFilename
Bootstrapper.exe

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
IceJS Team

CodeSize
112128

ProductName
IceJS

ProductVersionNumber
1.0.2.0

EntryPoint
0xd2f5

ObjectFileType
Unknown

File identification
MD5 5d1f058d5af40ecd42acd65b3dbc38e8
SHA1 6995c611c82874fbefc0e2e108011d7beae3b2a2
SHA256 dca75f403f5b10adc993b878025c5a5638d9e2279eb1732a933701c53f6dc321
ssdeep
49152:S5mYW0mv7qZLJ2Rek6Vv0XImvKk2m8nDxOO8y7ZuLXcRyybvtFW7TyyL4zx:S5IvhlKv0T8nDr1sLXSyyLsyycF

authentihash f0102afd4c9c728baf69d314a60256428f596251c1e1dc81298ccc84ac281161
imphash d315f9c138ec3b174d9102e6f40d2927
File size 2.6 MB ( 2752056 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe signed

VirusTotal metadata
First submission 2012-08-10 09:01:54 UTC ( 2 years, 6 months ago )
Last submission 2014-12-01 00:44:13 UTC ( 3 months ago )
File names download.php
file-4467326_exe
UpdateFreezer_1.6.102[Sasan.dde.ir].exe
UpdateFreezer_1.6.102.exe
UpdateFreezer_1.6.102.exe
Bootstrapper.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!