× Куки вимкнені! Цей сайт потребує ввімкнення куків для правильної роботи
SHA256: df59ec3e9a4d9e0574b14b7b4010e597c12e5c677efdcd9dbb3e35c0eca188aa
Назва файлу: Windows 10 Product Key Generator.exe
Співвідношення виявлення: 0 / 68
Дата дослідження: 2019-01-09 11:34:58 UTC ( 3 місяці, 1 тиждень тому ) Переглянути останні
Противірус Підсумок Оновлення
Acronis 20181227
Ad-Aware 20190109
AegisLab 20190109
AhnLab-V3 20190108
Alibaba 20180921
ALYac 20190109
Antiy-AVL 20190109
Arcabit 20190109
Avast 20190109
Avast-Mobile 20190109
AVG 20190109
Babable 20180918
Baidu 20190109
BitDefender 20190109
Bkav 20190108
CAT-QuickHeal 20190108
ClamAV 20190109
CMC 20190108
Comodo 20190109
CrowdStrike Falcon (ML) 20181022
Cybereason 20190109
Cylance 20190109
Cyren 20190109
DrWeb 20190109
eGambit 20190109
Emsisoft 20190109
Endgame 20181108
ESET-NOD32 20190109
F-Prot 20190109
F-Secure 20190109
Fortinet 20190109
GData 20190109
Ikarus 20190108
Sophos ML 20181128
Jiangmin 20190109
K7AntiVirus 20190109
K7GW 20190109
Kaspersky 20190109
Kingsoft 20190109
Malwarebytes 20190109
MAX 20190109
McAfee 20190109
McAfee-GW-Edition 20190109
Microsoft 20190109
eScan 20190109
NANO-Antivirus 20190109
Palo Alto Networks (Known Signatures) 20190109
Panda 20190108
Qihoo-360 20190109
Rising 20190109
SentinelOne (Static ML) 20181223
Sophos AV 20190109
SUPERAntiSpyware 20190102
Symantec 20190109
TACHYON 20190109
Tencent 20190109
TheHacker 20190106
Trapmine 20190103
TrendMicro 20190109
TrendMicro-HouseCall 20190109
Trustlook 20190109
VBA32 20190108
ViRobot 20190109
Webroot 20190109
Yandex 20181229
Zillya 20190108
ZoneAlarm by Check Point 20190109
Zoner 20190109
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) Intel Corporation. All rights reserved.

Product Intel® PROSet/Wireless Software
Original name Setup.exe
Internal name setup
File version 16.5.2
Description Intel® PROSet/Wireless Software
Signature verification Signed file, verified signature
Signing date 1:53 AM 9/7/2013
Signers
[+] Intel Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 12:00 AM 03/08/2011
Valid to 11:59 PM 04/22/2014
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint D4B18DA36C2B91021495E25285DC1BB15C36C54C
Serial number 10 02 1A 27 D2 83 12 88 5C 61 3A A4 98 58 0F 6F
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 02/08/2010
Valid to 11:59 PM 02/07/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, UTF-8, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-09-03 13:44:40
Entry Point 0x0000474B
Number of sections 6
PE sections
Overlays
MD5 9f4cdbe2c2cf26eedd25ff7aea0e11ea
File type data
Offset 543744
Size 1262184
Entropy 8.00
PE imports
RegCreateKeyExW
SetSecurityDescriptorOwner
RegCloseKey
SetEntriesInAclW
OpenServiceW
AdjustTokenPrivileges
InitializeAcl
LookupPrivilegeValueW
RegDeleteKeyW
CryptHashData
InitializeSecurityDescriptor
DecryptFileW
RegQueryValueExW
CryptCreateHash
SetSecurityDescriptorDacl
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
InitiateSystemShutdownExW
QueryServiceConfigW
GetTokenInformation
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
RegEnumKeyExW
CryptAcquireContextW
CryptDestroyHash
RegEnumValueW
RegSetValueExW
RegDeleteValueW
CryptGetHashParam
OpenSCManagerW
AllocateAndInitializeSid
CheckTokenMembership
SetEntriesInAclA
ChangeServiceConfigW
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
Ord(23)
Ord(20)
Ord(22)
DeleteDC
SelectObject
GetObjectW
CreateCompatibleDC
DeleteObject
StretchBlt
GetVolumePathNameW
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
WaitForSingleObject
ProcessIdToSessionId
GetFileAttributesW
GetLocalTime
GetProcessId
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
VerifyVersionInfoW
FreeEnvironmentStringsW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
FormatMessageW
ConnectNamedPipe
GetExitCodeProcess
InitializeCriticalSection
FindClose
InterlockedDecrement
GetFullPathNameW
SetLastError
GetSystemTime
CopyFileW
GetUserDefaultLangID
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
VerSetConditionMask
HeapSetInformation
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
GetModuleHandleA
SetFileAttributesW
CreateThread
MoveFileExW
GetSystemDirectoryW
GetExitCodeThread
SetNamedPipeHandleState
SetUnhandledExceptionFilter
CreateMutexW
TerminateProcess
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
CreateEventW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
GetSystemWow64DirectoryW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetWindowsDirectoryW
LCMapStringW
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
GetFileSizeEx
RemoveDirectoryW
ExpandEnvironmentStringsW
FindNextFileW
ResetEvent
FindFirstFileW
WaitForMultipleObjects
SetEvent
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
CreateFileMappingW
HeapCreate
CreateNamedPipeW
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
lstrlenW
CreateProcessW
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
CopyFileExW
InterlockedCompareExchange
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SetThreadExecutionState
IsValidCodePage
UnmapViewOfFile
GetTempPathW
VirtualFree
Sleep
VirtualAlloc
SysFreeString
VariantClear
VariantInit
SysAllocString
UuidCreate
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
GetMonitorInfoW
LoadBitmapW
DefWindowProcW
GetMessageW
PostQuitMessage
SetWindowLongW
IsWindow
PeekMessageW
TranslateMessage
PostMessageW
DispatchMessageW
GetCursorPos
RegisterClassW
UnregisterClassW
MessageBoxW
IsDialogMessageW
MonitorFromPoint
PostThreadMessageW
LoadCursorW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetCloseHandle
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
CryptCATAdminCalcHashFromFileHandle
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Ord(169)
Ord(70)
Ord(115)
Ord(111)
Ord(171)
Ord(45)
Ord(205)
Ord(173)
Ord(141)
Ord(88)
Ord(125)
Ord(190)
Ord(137)
Ord(90)
Ord(116)
Ord(118)
Ord(17)
Ord(238)
Ord(8)
CoInitializeEx
CLSIDFromProgID
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
StringFromGUID2
Number of PE resources by type
RT_ICON 6
RT_MESSAGETABLE 1
RT_MANIFEST 1
RT_BITMAP 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
16.5.2.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Intel PROSet/Wireless Software

ImageFileCharacteristics
Executable, 32-bit, Removable run from swap, Net run from swap

CharacterSet
Windows, Latin1

InitializedDataSize
223744

EntryPoint
0x474b

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) Intel Corporation. All rights reserved.

FileVersion
16.5.2

TimeStamp
2012:09:03 14:44:40+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup

ProductVersion
16.5.2

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Intel Corporation

CodeSize
318976

ProductName
Intel PROSet/Wireless Software

ProductVersionNumber
16.5.2.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 72698b9cb49ccb4b3204bd9c800469cd
SHA1 41cd5c6ce6d2103a984f44292f8cf54c31fbd247
SHA256 df59ec3e9a4d9e0574b14b7b4010e597c12e5c677efdcd9dbb3e35c0eca188aa
ssdeep
49152:2FmoJsL6pluqrkaWQ3Mps/mQKuGbO1QtBwaaLeNDG3m:poJPvrTW/pKKuRCtBLrNa3m

authentihash f4a7dd91915b670309de5e83c3451c0c2a732f28a1f5c3e264c2b90b38a338db
imphash ad15d5e5fe89d411563fbec9c13a01b8
Розмір файлу 1.7 Мб ( 1805928 bytes )
Тип файлу Win32 EXE
Чарівні букви
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-08-10 22:21:11 UTC ( 2 роки, 8 місяців тому )
Last submission 2019-02-10 02:41:42 UTC ( 2 місяці, 1 тиждень тому )
Назви файлів FIFA 18 CD Key Generator.exe
​Driver Booster 5 Pro Serial Key Generator.exe
FL Studio 20.1.69 Keygen Generator.exe
​FL Studio 20.1.69 Keygen Generator.exe
​​Spyhunter 5.0.30.51 Key Generator.exe
​Microsoft Office 2019 Product Key Generator.exe
Setup.exe
Office Mac 2011 Product Key Generator.exe
Office Mac 2016 Product Key Generator.exe
​Tally ERP 9 4.93 Serial Key Generator.exe
Spyhunter 4.5.7.3531 Serial Key Generator.exe
​Microsoft Office 2016 Product Key Generator.exe
Avast Cleanup 2018 License Key Generator.exe
Reason 10.0.9 Serial Key Generator.exe
​QuickBooks Pro Premier 2019 Key Generator.exe
Adobe Photoshop CC 2019 19.0.1 Key Generator.exe
Windows 10 Product Key Generator.exe
​​Adobe Illustrator Cs6 v16 0 1 Serial Key Generator.exe
Adobe Acrobat Pro DC Serial Key Generator.exe
Sony Vegas Pro 16.0.248 Keygen Generator.exe
​​Anytrans ​7.0.4 ​Key Code Generator​​.exe
Cleanmymac 3.8.6 Serial Key Generator.exe
​Pinnacle Studio 20.1.0 Ultimate Serial Key Generator.exe
​​Anytrans 6.3.6 License ​Key Generator​​.exe
​Cubase Pro 10 Key Generator.exe
Немає дописів. Жоден член VirusTotal Спільноти ще не писав з цього приводу, Ви можете стати першим, хто зробить це!

Напишіть свій допис…

?
Залишити допис

Ви не ввійшли в систему. Лише зареєстровані користувачі можуть залишати дописи, увійдіть для отримання прав!

Немає голосів. Наразі ніхто не проголосував з цього приводу, Ви можете стати першим, хто зробить це!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Moved files
Deleted files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.
HTTP requests
DNS requests
TCP connections
UDP communications