× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: de906a7e051f384a02868f3230d23dac84befa7eb2cd4b958b5c4ad421791115
File name: 51115
Detection ratio: 0 / 68
Analysis date: 2017-12-10 02:05:05 UTC ( 7 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20171209
AegisLab 20171210
AhnLab-V3 20171209
Alibaba 20171208
ALYac 20171209
Antiy-AVL 20171210
Arcabit 20171209
Avast 20171209
Avast-Mobile 20171209
AVG 20171210
Avira (no cloud) 20171209
AVware 20171210
Baidu 20171209
BitDefender 20171210
Bkav 20171208
CAT-QuickHeal 20171209
ClamAV 20171209
CMC 20171208
Comodo 20171209
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171210
Cyren 20171209
DrWeb 20171209
eGambit 20171210
Emsisoft 20171209
Endgame 20171130
ESET-NOD32 20171209
F-Prot 20171209
F-Secure 20171210
Fortinet 20171210
GData 20171209
Ikarus 20171209
Sophos ML 20170914
Jiangmin 20171210
K7AntiVirus 20171209
K7GW 20171209
Kaspersky 20171209
Kingsoft 20171210
Malwarebytes 20171209
MAX 20171209
McAfee 20171209
McAfee-GW-Edition 20171209
Microsoft 20171210
eScan 20171209
NANO-Antivirus 20171210
nProtect 20171210
Palo Alto Networks (Known Signatures) 20171210
Panda 20171209
Qihoo-360 20171210
Rising 20171209
SentinelOne (Static ML) 20171207
Sophos AV 20171210
SUPERAntiSpyware 20171209
Symantec 20171209
Symantec Mobile Insight 20171207
Tencent 20171210
TheHacker 20171209
TotalDefense 20171209
TrendMicro 20171209
TrendMicro-HouseCall 20171209
Trustlook 20171210
VBA32 20171208
VIPRE 20171210
ViRobot 20171209
Webroot 20171210
WhiteArmor 20171204
Yandex 20171208
Zillya 20171209
ZoneAlarm by Check Point 20171209
Zoner 20171210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2006 Macrovision Corporation

Product JaBack8
Original name Setup.exe
Internal name Setup
File version 8.00.0000
Description Setup Launcher
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-08-08 05:15:56
Entry Point 0x00025CF1
Number of sections 4
PE sections
Overlays
MD5 1afee32395148cb921499180359d233f
File type data
Offset 294912
Size 23629887
Entropy 8.00
PE imports
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
EqualSid
RegEnumValueA
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
BitBlt
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetThreadContext
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetExitCodeProcess
LocalFree
ResumeThread
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
WriteProcessMemory
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
QueryPerformanceFrequency
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
SetThreadContext
TerminateProcess
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
VirtualProtectEx
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
FindNextFileA
DuplicateHandle
SearchPathA
ExpandEnvironmentStringsA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
GetModuleFileNameA
GetShortPathNameA
SizeofResource
CompareFileTime
LockResource
SetFileTime
lstrlenW
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetVersion
GetDiskFreeSpaceA
GetEnvironmentStrings
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
GetOEMCP
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
UuidToStringA
RpcStringFreeA
UuidCreate
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
CreateWindowExA
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
MoveWindow
KillTimer
FindWindowA
DefWindowProcA
GetClassInfoA
SetWindowPos
GetDesktopWindow
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
PostMessageA
DrawIcon
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
CharUpperA
SendDlgItemMessageA
GetDC
ReleaseDC
GetDlgCtrlID
SetWindowTextA
DestroyIcon
LoadStringA
ShowWindow
CharPrevA
GetWindowPlacement
SendMessageA
SubtractRect
SetTimer
GetDlgItem
CreateDialogParamA
CharLowerBuffA
LoadCursorA
ClientToScreen
SetRect
GetWindowLongA
GetWindowTextLengthA
GetSysColor
GetClientRect
LoadIconA
GetMessageA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
wsprintfA
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
StgIsStorageFile
StgOpenStorage
Number of PE resources by type
RT_DIALOG 5
RT_ICON 4
RT_STRING 3
GIF 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 17
NEUTRAL 1
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
12.0.0.53157

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
90112

EntryPoint
0x25cf1

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2006 Macrovision Corporation

FileVersion
8.00.0000

TimeStamp
2006:08:08 06:15:56+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
8.00.0000

FileDescription
Setup Launcher

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Hitek Software

CodeSize
200704

ProductName
JaBack8

ProductVersionNumber
12.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 d029a13e912f04e748616bbe0cb9d5ce
SHA1 db82a78618a12ba73b173a6c9047e1f0ec9aebc1
SHA256 de906a7e051f384a02868f3230d23dac84befa7eb2cd4b958b5c4ad421791115
ssdeep
393216:ZE91h9r7G4dd/6fkWbgmFq8zOWv+iN7UEvrk7nrRsm4BcSS5+r6BFAQYTLY4PSyC:81vmEp67gKq8amN7UEvrk71srv2+Tc4Q

authentihash 7027dac64ce079b76ce6d28b7da0b05e787e9615fd16a69ec36445f5287e6f02
imphash 8fc44b6baee0f63424e7fdfd8a71500e
File size 22.8 MB ( 23924799 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-03-26 03:12:25 UTC ( 5 years, 3 months ago )
Last submission 2016-04-19 00:45:43 UTC ( 2 years, 2 months ago )
File names Setup.exe
51115
Setup
jaba.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!