× В вашем браузере отключены куки (cookie). Для полноценной работы сайта необходимо включить сохранение файлов cookie.
SHA256: ddd3e7ee236ea6cf24f1b8aab0af734a62c23d158bcbe4c79fbfac943a02ef7c
Имя файла: Setup.exe
Показатель выявления: 1 / 63
Дата анализа: 2017-08-04 22:39:59 UTC (1 год, 7 месяцев назад) Показать последний анализ
Антивирус Результат Дата обновления
CAT-QuickHeal Trojan.Shelma 20170804
Ad-Aware 20170804
AegisLab 20170804
AhnLab-V3 20170804
Alibaba 20170804
ALYac 20170804
Antiy-AVL 20170804
Arcabit 20170804
Avast 20170804
AVG 20170804
Avira (no cloud) 20170804
AVware 20170804
Baidu 20170804
BitDefender 20170804
Bkav 20170804
ClamAV 20170804
CMC 20170804
Comodo 20170804
CrowdStrike Falcon (ML) 20170710
Cylance 20170804
Cyren 20170804
DrWeb 20170804
Emsisoft 20170804
Endgame 20170721
ESET-NOD32 20170804
F-Prot 20170804
F-Secure 20170804
Fortinet 20170804
GData 20170804
Ikarus 20170804
Sophos ML 20170607
Jiangmin 20170804
K7AntiVirus 20170804
K7GW 20170804
Kaspersky 20170804
Kingsoft 20170804
Malwarebytes 20170804
MAX 20170804
McAfee 20170804
McAfee-GW-Edition 20170804
Microsoft 20170804
eScan 20170804
NANO-Antivirus 20170804
nProtect 20170804
Palo Alto Networks (Known Signatures) 20170804
Panda 20170804
Qihoo-360 20170804
Rising 20170804
SentinelOne (Static ML) 20170718
Sophos AV 20170804
SUPERAntiSpyware 20170804
Symantec 20170804
Symantec Mobile Insight 20170804
Tencent 20170804
TheHacker 20170804
TrendMicro 20170804
TrendMicro-HouseCall 20170804
Trustlook 20170804
VBA32 20170803
VIPRE 20170804
ViRobot 20170804
Webroot 20170804
WhiteArmor 20170731
Yandex 20170801
Zillya 20170804
ZoneAlarm by Check Point 20170804
Zoner 20170804
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) SDL. All rights reserved.

Product SDL Passolo 2016 - Bundle
Original name Passolo2016.exe
Internal name setup
File version 16.0.286.0
Description SDL Passolo 2016 - Bundle
Signature verification Signed file, verified signature
Signing date 11:01 AM 10/10/2016
Signers
[+] SDL PLC
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer DigiCert SHA2 Assured ID Code Signing CA
Valid from 1:00 AM 8/7/2014
Valid to 1:00 PM 11/30/2017
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 73563226C7BE012BAF171FE91BBFDC18190A96D9
Serial number 06 42 A9 8B CD A2 D2 15 83 F1 FF 5F A5 0C 94 41
[+] DigiCert SHA2 Assured ID Code Signing CA
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 PM 10/22/2013
Valid to 1:00 PM 10/22/2028
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 92C1588E85AF2201CE7915E8538B492F605B80C6
Serial number 04 09 18 1B 5F D5 BB 66 75 53 43 B5 6F 95 50 08
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Counter signers
[+] DigiCert Timestamp Responder
Status Valid
Issuer DigiCert Assured ID CA-1
Valid from 1:00 AM 10/22/2014
Valid to 1:00 AM 10/22/2024
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 614D271D9102E30169822487FDE5DE00A352B01D
Serial number 03 01 9A 02 3A FF 58 B1 6B D6 D5 EA E6 17 F0 66
[+] DigiCert Assured ID CA-1
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2021
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing
Algorithm sha1RSA
Thumbrint 19A09B5A36F4DD99727DF783C17A51231A56C117
Serial number 06 FD F9 03 96 03 AD EA 00 0A EB 3F 27 BB BA 1B
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Packers identified
F-PROT CAB, UTF-8, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-06-23 23:50:34
Entry Point 0x0002A6C7
Number of sections 7
PE sections
Overlays
MD5 8d401458c62f95944ef98de456af2af1
File type data
Offset 549376
Size 97316832
Entropy 8.00
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
OpenServiceW
AdjustTokenPrivileges
ControlService
InitializeAcl
LookupPrivilegeValueW
RegDeleteKeyW
CryptHashData
CheckTokenMembership
DecryptFileW
RegQueryValueExW
CryptCreateHash
SetSecurityDescriptorDacl
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
SystemFunction036
GetTokenInformation
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
SetEntriesInAclW
RegEnumKeyExW
CryptAcquireContextW
CryptDestroyHash
InitializeSecurityDescriptor
RegDeleteValueW
QueryServiceConfigW
CryptGetHashParam
RegSetValueExW
OpenSCManagerW
RegEnumValueW
AllocateAndInitializeSid
InitiateSystemShutdownExW
SetEntriesInAclA
ChangeServiceConfigW
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
Ord(23)
Ord(20)
Ord(22)
DeleteDC
SelectObject
GetObjectW
CreateCompatibleDC
DeleteObject
StretchBlt
GetVolumePathNameW
GetStdHandle
ReleaseMutex
WaitForSingleObject
ProcessIdToSessionId
GetFileAttributesW
VerifyVersionInfoW
GetProcessId
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
InterlockedExchange
GetTempPathW
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
ConnectNamedPipe
GetExitCodeProcess
InitializeCriticalSection
FindClose
TlsGetValue
SetFileAttributesW
SetLastError
GetSystemTime
CopyFileW
GetUserDefaultLangID
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
VerSetConditionMask
HeapSetInformation
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
GetModuleHandleA
GetFullPathNameW
CreateThread
MoveFileExW
GetSystemDirectoryW
GetExitCodeThread
SetNamedPipeHandleState
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
DecodePointer
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
GetSystemWow64DirectoryW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
RtlUnwind
SystemTimeToFileTime
GetWindowsDirectoryW
LCMapStringW
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
FindNextFileW
CompareStringA
FindFirstFileW
DuplicateHandle
FindFirstFileExW
WaitForMultipleObjects
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
InterlockedIncrement
GetNativeSystemInfo
GetLastError
DosDateTimeToFileTime
CreateFileMappingW
CreateNamedPipeW
lstrlenA
GlobalFree
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
WaitForSingleObjectEx
lstrlenW
CreateProcessW
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
CopyFileExW
InterlockedCompareExchange
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SetThreadExecutionState
GetLocalTime
IsValidCodePage
UnmapViewOfFile
WriteFile
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ResetEvent
SysFreeString
VariantInit
VariantClear
SysAllocString
UuidCreate
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
PathCanonicalizeW
GetMonitorInfoW
LoadBitmapW
GetMessageW
DefWindowProcW
PostQuitMessage
SetWindowLongW
IsWindow
PeekMessageW
TranslateMessage
PostMessageW
DispatchMessageW
GetCursorPos
RegisterClassW
UnregisterClassW
MessageBoxW
PostThreadMessageW
MonitorFromPoint
WaitForInputIdle
IsDialogMessageW
LoadCursorW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
CryptCATAdminCalcHashFromFileHandle
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Ord(125)
Ord(205)
Ord(111)
Ord(171)
Ord(169)
Ord(45)
Ord(173)
Ord(141)
Ord(88)
Ord(70)
Ord(190)
Ord(137)
Ord(115)
Ord(90)
Ord(116)
Ord(118)
Ord(17)
Ord(238)
Ord(8)
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
CoInitializeSecurity
CoTaskMemFree
StringFromGUID2
Number of PE resources by type
RT_ICON 6
RT_VERSION 1
RT_MANIFEST 1
RT_MESSAGETABLE 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 10
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

InitializedDataSize
250368

ImageVersion
0.0

ProductName
SDL Passolo 2016 - Bundle

FileVersionNumber
16.0.286.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
Executable, 32-bit, Removable run from swap, Net run from swap

CharacterSet
Windows, Latin1

LinkerVersion
14.0

FileTypeExtension
exe

OriginalFileName
Passolo2016.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
16.0.286.0

TimeStamp
2015:06:24 00:50:34+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup

ProductVersion
16.0.286.0

FileDescription
SDL Passolo 2016 - Bundle

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright (c) SDL. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
SDL

CodeSize
297984

FileSubtype
0

ProductVersionNumber
16.0.286.0

EntryPoint
0x2a6c7

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 a91b4dd8ebf403eade5fb5430439cfec
SHA1 5f7ba1be44e089c0cc61e0288d8abc97d0dd10ac
SHA256 ddd3e7ee236ea6cf24f1b8aab0af734a62c23d158bcbe4c79fbfac943a02ef7c
ssdeep
1572864:07jL/iWR/QZHIihMLB3e1d66jglbKxRVcnzrcajb296Qozc1DoIO0SFHa:OW+46ZVO766jWGxfqzS9CE3O0SFHa

authentihash e39ecb880d887798a6ca84e39ea9289aee9ec8af2514e3ef760f6a5d6a2bf59b
imphash d70ea46027876c77926b7954dbffb9fa
Размер файла 93.3 MБ ( 97866208 bytes )
Тип файла Win32 EXE
Описание
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-08-04 22:38:34 UTC (1 год, 7 месяцев назад)
Last submission 2017-08-04 22:39:59 UTC (1 год, 7 месяцев назад)
Имена файлов Setup.exe
Setup.exe
setup
Passolo2016.exe
Нет комментариев. Из участников сообщества VirusTotal ещё пока никто не оставил комментарий по поводу результатов анализа. Станьте первым!

Оставьте свой комментарий...

?
Отправить

Вы не выполнили вход. Только зарегистрированные пользователи могут оставлять комментарии. Выполните вход и получите право голоса!

Нет голосов. Ещё пока никто не проголосовал за результаты анализа. Станьте первым!