Gridinsoft Logo
File Icon

The lnstaller_2024.008.20535_win64_86.exe (ASAP Utilities) File Analysis

Technical Analysis

File Name lnstaller_2024.008.20535_win64_86.exe
File Type
Win32 EXE
Magic Bytes PE32 executable (GUI) Intel 80386, for MS Windows
SSDEEP Hash
98304:8FRMYdiZlRs9Fm9cy3mo3tR1KtrAf29At4iABaAtO/u4B1sKTPX49P4lwpDbypx8:8XMYdiaMf3tRgwiwAuvs649P9D26sTA
Scanner Version 1.0.169.174
Database Version 2024-03-18 20:00:33 UTC

Suspicious File Detected

Detected by 40 security engines - requires caution

This file requires additional checking for potential threats. Based on suspicious indicators, we will soon add it to our virus database.
56%
Detection Rate
19,625,374
File Size (bytes)
40/72
Engines Detected
2024-03-18
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
df6c0952255d459617f1b0f85c81d27d
SHA1
3a9a43dbe52de0d9a5b064c33f19ea6eea106870
SHA256
9d42b5a2c6c6ce0c2966cf48f2566abd3060ca75ad5286cb2bb5b2eb2a92292f
SHA512
37847697a8ef67ec597a1737f1d8fa6aee007b5afaa2c1550afeff71262a721533a76beb8535d4ee34a0d9b20c25f518c9cdee40fd5400664866b5dfcbf020ea
ImpHash
04b8ec0741a79333f092fa313b872402

Security Engines with Detections (40 of 72)

Bkav
W32.Common.C9FEA015 Malicious
Lionic
Trojan.Win32.Rugmi.4!c Malicious
MicroWorld-eScan
Trojan.GenericKD.71977498 Malicious
FireEye
Trojan.GenericKD.71977498 Malicious
CAT-QuickHeal
Trojan.Penguish Malicious
Skyhigh
Artemis Malicious
McAfee
Artemis!DF6C0952255D Malicious
Malwarebytes
Trojan.Downloader Malicious
VIPRE
Trojan.GenericKD.71977498 Malicious
K7AntiVirus
Trojan-Downloader ( 005b2bd31 ) Malicious
Alibaba
TrojanDownloader:Win32/Rugmi.eac3450f Malicious
K7GW
Trojan-Downloader ( 005b2bd31 ) Malicious
Symantec
Trojan.Gen.MBT Malicious
ESET-NOD32
a variant of Win32/TrojanDownloader.Rugmi.AFZ.gen Malicious
Avast
Win32:Malware-gen Malicious
Kaspersky
Trojan.Win32.Penguish.asn Malicious
BitDefender
Trojan.GenericKD.71977498 Malicious
Rising
[email protected] (RDML:JaSumiL4oPcol16PfIbjBw) Malicious
Sophos
Mal/Generic-S Malicious
F-Secure
Trojan.TR/Dldr.Rugmi.syyyt Malicious
Emsisoft
Trojan.GenericKD.71977498 (B) Malicious
Ikarus
Trojan-Downloader.Win32.Rugmi Malicious
MAX
malware (ai score=89) Malicious
Google
Detected Malicious
Avira
TR/Dldr.Rugmi.syyyt Malicious
Xcitium
Malware@#2uyx3qscmq87l Malicious
Arcabit
Trojan.Generic.D44A4A1A Malicious
ZoneAlarm
Trojan.Win32.Penguish.asn Malicious
GData
Trojan.GenericKD.71977498 Malicious
AhnLab-V3
Infostealer/Win.Stealc.C5598726 Malicious
ALYac
Trojan.GenericKD.71977498 Malicious
Cylance
unsafe Malicious
Panda
Trj/Agent.MK Malicious
Tencent
Win32.Trojan.FalseSign.Snkl Malicious
MaxSecure
Trojan.Malware.237104252.susgen Malicious
Fortinet
W32/Rugmi.AFZ!tr.dldr Malicious
AVG
Win32:Malware-gen Malicious
DeepInstinct
MALICIOUS Malicious
CrowdStrike
win/malicious_confidence_100% (W) Malicious
alibabacloud
VirTool:Win/SignThief.A(dyn) Malicious
32 engines reported no threats - Only engines with detections are shown above for clarity

PE Analysis

Basic Information

Icon
Hash: df34ee181c286f5650e57e4f98264414
Fuzzy: bd042c3637cf9323eb8a0b753a43baaf
dHash: 30b0eccaccecf4e0
Image Base 0x00400000
Entry Point 0x007a27b0
Compilation Time 2024-03-02 07:50:11
Checksum 0x012b9fa0 (Actual: 0x012bab9b)
OS Version 6.0
PEiD Signatures PE32 executable (GUI) Intel 80386, for MS Windows
Digital Signature The expected hash does not match the digest in SpcInfo
Imports 16 libraries
Exports 2 functions
Resources 117 Resources
Sections 12 Sections

Version Information

Comments This installation was built with Inno Setup.
CompanyName A Must in Every Office BV
FileDescription ASAP Utilities
FileVersion ASAP Utilities
LegalCopyright Bastien Mensink - A Must in Every Office BV
OriginalFileName
ProductName ASAP Utilities 8.2
ProductVersion 8.2
Translation 0x0000 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 3,796,024 bytes 3,796,480 bytes 6.48 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 223B6484EF5C7AE08EC1F42D914567D8
.itext 0x003a0000 10,460 bytes 10,752 bytes 6.28 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 944260412CE500865D2600DC6B88782D
.data 0x003a3000 46,652 bytes 47,104 bytes 6.12 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 1F535B9DC088770CE7183E129E6CBB3E
.bss 0x003af000 29,744 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.idata 0x003b7000 14,784 bytes 14,848 bytes 5.26 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE B9F7F15CE05F410C4FD15EEAD66C8430
.didata 0x003bb000 3,842 bytes 4,096 bytes 4.29 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 45FB5D9464FF21BDAE7500464D4C2372
.edata 0x003bc000 114 bytes 512 bytes 1.35 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ B74D6143EC210DAB71EE1CBA80C6574A
.tls 0x003bd000 92 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.rdata 0x003be000 93 bytes 512 bytes 1.38 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 97492C6A8152F8F28421D3522FF5D319
.reloc 0x003bf000 316,140 bytes 316,416 bytes 6.72 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 46157E18D75436C8476F419E2AD1BDC0
.rsrc 0x0040d000 1,084,495 bytes 1,084,928 bytes 6.56 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ BD9DDA2E812BA13CC7097D58A534EB1E
.debug 0x00516000 14,337,006 bytes 14,337,006 bytes 5.39 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ AB7875A110092885DD8A4AAAD682AE9E
Entropy Analysis Alert

2 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 117 (1,077,343 bytes)
Resource Type Count Total Size Percentage
RT_CURSOR 7 2,156 bytes
0.2%
RT_BITMAP 13 2,608 bytes
0.2%
RT_ICON 10 207,809 bytes
19.3%
RT_STRING 38 35,964 bytes
3.3%
RT_RCDATA 39 825,305 bytes
76.6%
RT_GROUP_CURSOR 7 140 bytes
0%
RT_GROUP_ICON 1 146 bytes
0%
RT_VERSION 1 1,412 bytes
0.1%
RT_MANIFEST 1 1,803 bytes
0.2%

Certificate Chain Analysis

Certificate Information
Product ASAP Utilities 8.2
Description ASAP Utilities
File Version ASAP Utilities
Signing Date 03:35 PM 08/09/2017 (2917 days ago)
Verification Status The digital signature of the object did not verify.
Signers Open Source Developer, Robin Krom; Certum Code Signing CA SHA2; Certum Trusted Network CA
Counter Signers Certum EV TSA SHA2; Certum Trusted Network CA
Copyright Bastien Mensink - A Must in Every Office BV
Certificate Chain Summary
Certum Code Signing CA SHA2 #1 Primary
Validity Period: 2015-10-29 11:30:29 → 2027-06-09 11:30:29
Signature Algorithm: sha256RSA
Serial Number: 6B 32 6A 0F 03 28 D3 7A 1D 53 0B FD 23 BD 48 E2
Open Source Developer, Robin Krom #2 Chain
Validity Period: 2016-08-10 20:47:26 → 2017-08-10 07:43:06
Signature Algorithm: sha256RSA
Serial Number: 66 C5 DC C1 4B 51 78 09 C1 72 B4 4B 7E 97 84 F7
Certum EV TSA SHA2 #3 Chain
Validity Period: 2016-03-08 13:10:43 → 2027-05-30 13:10:43
Signature Algorithm: sha256RSA
Serial Number: FE 67 E4 F1 5A 24 E3 C6 0D 54 7C A0 20 C2 76 70

✓ This file has been digitally signed and the certificate chain has been verified

  • The signature ensures file integrity and authenticity from the publisher
  • Timestamping proves when the signature was applied
Certificate Verification Status

The expected hash does not match the digest in SpcInfo

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
40 antivirus engines detected potential threats. This could be a false positive, especially for system tools or packed software. Verify the file source and check if it's digitally signed by a trusted publisher.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware