× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: ae0ada2f5454f3b66f2a82b167c99d789cdc36c99e82ddf054d1b897cf000ea7
Имя файла: matrix.exe
Показатель выявления: 2 / 67
Дата анализа: 2017-12-20 13:24:34 UTC (1 год, 2 месяцев назад) Показать последний анализ
Антивирус Результат Дата обновления
Bkav W32.HfsAdware.8962 20171220
Cylance Unsafe 20171220
Ad-Aware 20171220
AegisLab 20171220
AhnLab-V3 20171220
Alibaba 20171220
ALYac 20171220
Antiy-AVL 20171220
Arcabit 20171220
Avast 20171220
Avast-Mobile 20171220
AVG 20171220
Avira (no cloud) 20171220
AVware 20171220
Baidu 20171219
BitDefender 20171220
CAT-QuickHeal 20171219
ClamAV 20171220
CMC 20171218
Comodo 20171220
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cyren 20171220
DrWeb 20171220
eGambit 20171220
Emsisoft 20171220
Endgame 20171130
ESET-NOD32 20171220
F-Prot 20171220
F-Secure 20171220
Fortinet 20171220
GData 20171220
Ikarus 20171220
Sophos ML 20170914
Jiangmin 20171220
K7AntiVirus 20171220
K7GW 20171220
Kaspersky 20171220
Kingsoft 20171220
Malwarebytes 20171220
MAX 20171220
McAfee 20171220
McAfee-GW-Edition 20171220
Microsoft 20171220
eScan 20171220
NANO-Antivirus 20171220
nProtect 20171220
Palo Alto Networks (Known Signatures) 20171220
Panda 20171220
Qihoo-360 20171220
Rising 20171220
SentinelOne (Static ML) 20171207
Sophos AV 20171220
SUPERAntiSpyware 20171220
Symantec 20171220
Symantec Mobile Insight 20171220
Tencent 20171220
TheHacker 20171219
TrendMicro 20171220
TrendMicro-HouseCall 20171220
Trustlook 20171220
VBA32 20171219
VIPRE 20171220
ViRobot 20171220
Webroot 20171220
WhiteArmor 20171204
Yandex 20171219
Zillya 20171219
ZoneAlarm by Check Point 20171220
Zoner 20171220
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product Matrix Screensaver
File version
Description Matrix Screensaver Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 2:57 PM 7/10/2013
Signers
[+] DIVISO COMMERCE CORP.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer COMODO Code Signing CA 2
Valid from 11:00 PM 07/01/2013
Valid to 10:59 PM 07/02/2014
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint E1C4B452B7DE550AC96238AEE25AA8614CE6023F
Serial number 00 97 3B AC 40 59 75 19 5D 99 50 1C 44 FC 69 13 5E
[+] COMODO Code Signing CA 2
Status Valid
Issuer UTN-USERFirst-Object
Valid from 11:00 PM 08/23/2011
Valid to 09:48 AM 05/30/2020
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint B64771392538D1EB7A9281998791C14AFD0C5035
Serial number 10 70 9D 4F F5 54 08 D7 30 60 01 D8 EA 91 75 BB
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 07:09 AM 06/07/2005
Valid to 09:48 AM 05/30/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network™
Status Valid
Issuer AddTrust External CA Root
Valid from 09:48 AM 05/30/2000
Valid to 09:48 AM 05/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbprint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Counter signers
[+] COMODO Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 11:00 PM 05/09/2010
Valid to 10:59 PM 05/10/2015
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] UTN-USERFirst-Object
Status Valid
Issuer AddTrust External CA Root
Valid from 07:09 AM 06/07/2005
Valid to 09:48 AM 05/30/2020
Valid usage All
Algorithm sha1RSA
Thumbrint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] The USERTrust Network™
Status Valid
Issuer AddTrust External CA Root
Valid from 09:48 AM 05/30/2000
Valid to 09:48 AM 05/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha1RSA
Thumbrint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
Packers identified
F-PROT INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0000A5F8
Number of sections 8
PE sections
Overlays
MD5 1fdd1d04492dea4c54814af70594901f
File type data
Offset 56320
Size 475760
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 2
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 5
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Matrix Screensaver Setup

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
14848

EntryPoint
0xa5f8

MIMEType
application/octet-stream

TimeStamp
1992:06:19 15:22:17-07:00

FileType
Win32 EXE

PEType
PE32

UninitializedDataSize
0

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SaversPlanet.com

CodeSize
40448

ProductName
Matrix Screensaver

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 9fef276420f0e32ff9a1ab25509eef3a
SHA1 821105b22aec4011b3c8cba44aee92a601e70ecc
SHA256 ae0ada2f5454f3b66f2a82b167c99d789cdc36c99e82ddf054d1b897cf000ea7
ssdeep
12288:XQiGeKckyMwvJhRtoWnCLOvkndINaro+X2hprKSuju32Yezu:XQiDPMYDRtoQDvQONaro+sdKSuju32Zu

authentihash 2aafaa2828b03d31aa86a01a69ccfe1ef8c883c65c1154a6da06bbab0350ba61
imphash 884310b1928934402ea6fec1dbd3cf5e
Размер файла 519.6 KБ ( 532080 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (70.2%)
Win32 Executable Delphi generic (9.0%)
Windows screen saver (8.3%)
Win32 Dynamic Link Library (generic) (4.2%)
Win32 Executable (generic) (2.8%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-07-17 07:09:05 UTC (5 лет, 8 месяцев назад)
Last submission 2017-12-20 13:24:34 UTC (1 год, 2 месяцев назад)
Имена файлов matrixNEW.exe
matrix.exe
ae0ada2f5454f3b66f2a82b167c99d789cdc36c99e82ddf054d1b897cf000ea7
matrix.exe
ae0ada2f5454f3b66f2a82b167c99d789cdc36c99e82ddf054d1b897cf000ea7
662209
AE0ADA2F5454F3B66F2A82B167C99D789CDC36C99E82DDF054D1B897CF000EA7
1432758903-matrix.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0315.

Symantec reputation Suspicious.Insight
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.