uninstaller.exe

MD5 Hash: 2215773d7413f782b320102fb7ea2326
SHA256 Hash: 2df4981c749f1f96eb5ae155b5bb623a7c1a409960cc226893829cb8ba883938
File size: 142122 bytes (139 KB.)
Last analysis: 15 Jun, 2019 02:18:34

Analysis MD5: 2215773d7413f782b320102fb7ea2326

Analysis of the file classifies it as a class A (Safe). The file is safe to use. The trust index of this analysis is 98 % (very high).

A
B
C
D+
D
D-
E+
E
E-
F

Description

uninstaller[1].exe with the description AUP, is part of Uninstaller, developed by Premium.

Filename: uninstaller.exe (AUP)
Threat analysis: Safe
Analysis trust:
98%
Recent activity:
First seen: 10 Feb, 2019
Last seen: 26 Oct, 2019
Last analysis: 15 Jun, 2019
Possible infection: Clean

uninstaller.exe AUP

Application: Uninstaller
Developer: Premium
Stability:
100%
File version: 0.0.0.0
File size: 142122 bytes (139 KB.)
Recent activity:
Historic activity:
CRC32 hash: 2a093ed0
MD5 hash: 2215773d7413f782b320102fb7ea2326
SHA1 hash: 2d672ceaa57c7f8f3d9d9cde9dd247f095c2d8e0
SHA256 hash: 2df4981c749f1f96eb5ae155b5bb623a7c1a409960cc226893829cb8ba883938
B

Signature verification

Unsigned

This file has no digital signature. The publisher of this file could not be verified.

D+

File entropy

File entropy match: Encrypted

Parts of this file are encrypted. The reasons might be benign but it makes the analysis more difficult.

| 0 b.142122 b. |
Plain Data Text Code Compressed Encrypted Random

File signature

PE32 executable (GUI) Intel 80386 (stripped to external PDB)

This file can be executed

File header First 32 bytes of this file

4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00

The determination of a file type is done with a signature or magic-numbers. Files are identified using by comparing the first set of bytes in the file header. Using this method type of files are recognised no matter the extension used. This information is useful to for example recognise executable files cloaked as images or movies.


A

Multi malware scan Scan date: 10 Feb, 2019 18:57:47

Individual scanner results (0 %) :

Scanner Engine Result

13.0.311420180814

7.14111820190210

0.100.220190210

1.120190210

7.0-2020190210

4.6.5.14120190210

11.10 build 6820190210

5.53.020190210

310710020180928

A

Malicious code scan

No malicious code found

Agics makes een analysis of the source code of the file. We look for comparisons with known malicious source code. This is a good way to detect new malicious files which are in fact variations of existing, and known malicious files.

Scan results:

0 %
A

Fuzzy hash a.k.a. Context Triggered Piecewise Hashing

SSDEEP

Context Triggered Piecewise Hashing, also called Fuzzy Hashing, can match inputs that have homologies. Such inputs have sequences of identical bytes in the same order, although bytes in between these sequences may be different in both content and length. Comparing a fuzzyhash is a good way to detect morphing malware. Malware which include random code in every copy to change its properties. Agics uses ssdeep to make create a fuzzyhash.

SSDEEP: 3072:7OwAFbmqOdDPx85L1A5mKmpIxFeeAsOZpPsvQRQ2oOrGeU7ambxmUE:41gUMHkUF4sA0vT2fGeU7ambxfE

No match found


A

Online virus scanners

Detection ration:

0 %
A

VirusShare.com

Not available on virusshare.com

VirusShare.com is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code. Presence of the sample on this site indicates that the file is (Once considered) being malicious.
Website: virusshare.com
B

National Software Reference Library

Not on the nsrl list

The NSRL contains a collection of digital signatures of known, traceable software applications. There are application hash values in the hash set which may be considered malicious, i.e. steganography tools and hacking scripts.
Website: www.nsrl.nist.gov

A

Behaviour

Sandbox behaviour analysis:

The file is executed in a safe environment to track its behaviour. The behaviour analysis can help with detecting new malware which is not recognized by virusscanners yet. However it has a high chance on a false-positive, especially with installers, uninstallers and virusscanners.

Deletes its original binary from disk

Checks amount of memory in system, this can be used to detect virtual machines that have a low amount of memory available

The binary likely contains encrypted or compressed data indicative of a packer

Detects VirtualBox through the presence of a file

The executable contains unknown PE section names indicative of a packer (could be a false positive)

Allocates read-write-execute memory (usually to unpack itself)

Network activity

No internet connection

Dropped files

File name md5
modern-wizard.bmpf13d4a46fbb5689f870a4c0083a6e84d
VBoxGuest.sys716e1f51bc39133ebd84add2938bfb33
A
Adobe_GDE.logf317df45047fad0a358825304ae8b97c
PerceptionSimulationSixDof.inf019ac500ca05a38c2f44d488c3da4351
A
System.dll2e025e2cee2953cce0160c3cd2e1a64e
A
firstrun.logffddc14b8cf76ca1daaaecc70adde9ce
wct24E6.tmp6692e4691749b41388a298fe7ac21339
A
AccessControl.dll055f4f9260e07fc83f71877cbb7f4fad
A
DRAS-PC-20180224-0924.log3c44dfefa21b0efd990474470e88eacf
VBoxGuest.infba36b20892afb8e5e581c074ff1de7a4
B
wmsetup.logfc0b44fae43bd9b14a31872f7b4a045a
nsDialogs.dllf832e4279c8ff9029b94027803e10e1b
A
AdobeSFX.log007b4c92fdeefeae8899dc1afe4e51b3
~DFA0EBB3C888944152.TMPbf619eac0cdf3f68d496ea9344137e8b
UserInfo.dll9f0cb655a832fdecb9433dd781004637
B
Dras.bmp343fa15c150a516b20cc9f787cfd530e
tmpaddon-6aa83076059d07209223fbb0c9c3b0d9cc6965
modern-header.bmpa1dbb741271a3bf37a4e4585fb958e1a
uninstaller.exe2215773d7413f782b320102fb7ea2326
A
ArmUI.ini864c22fb9a1c0670edf01c6ed3e4fbe4
nsExec.dll428c3a07fba184367a5085e46e4a790b
A
nshC4E9.tmpd41d8cd98f00b204e9800998ecf8427e
~DF61A74456A44394C3.TMPce338fe6899778aacfc28414f2d9498b
B
UserInfo.dlle840e7f30c85e22b09a41098ff3f3343
A
AdobeARM.log4ac4664ffe80df19a0a39d9f26025ce7
jusched.log4825dc6f0d79325fab48a24339d6d779
au-descriptor-1.8.0_171-b11.xml9b1562627c1b82cd3e8491e531dd5e87
tmpaddon8d16c0741499c8490e6308820b80cea3
VBoxGuestInstallHelper.dll5494356a5f4ffbe434f8a1824100c119
A
Outlook-20180224T0935040006.etl95a4f56830e6d981d0e244c35be23f14
AdobeARM_NotLocked.log5d88c735c18d1c407980228f53d2f70b
DRAS-PC-20180224-0923.logd239f4a669882c5d0e4404931fafae96
wct1E1C.tmpe52b28af00be19f2e9549337d7d7806e
VBoxControl.exe97b810f41a2e9067ac99d5c38508e92e
A
nsProcess.dlla304fba25947dd17a81e74f8064a78d8
A
DRAS-PC-20180224-0922.log822555d10a1c97cfca13e6474259ca29
nsDialogs.dll65373b20dbff5c3834548dd7330bb0c1
A
nsProcess.dllfaa7f034b38e729a983965c04cc70fc1
B
jawshtml.htmlb2a4bc176e9f29b0c439ef9a53a62a1a
System.dll56a321bd011112ec5d8a32b2f6fd3231
A
NDFDiag.tmp7332eae6c43a5a51b4397d5c7f5f61c2
wscadminui.exe0340d7461f800fa22ef5874bcf94a37f
A
VBoxGuest.cataf4a6cdf0211315e57792ff133cde5c9
VBoxTray.exe206bd08aee1c37fcfae0ac1528aa4a7b
A
JavaDeployReg.loga2960fa4487f3d38f06f02e46b2ccc21
Adobe_ADM.log3512d05e9e420acdd3fae36921a052f6

A

Import hashing

Imphash ffe3cc63e5a1efb4d2f4cc004c584646

Fingerprinting files can be done in various way. One way is to make a hash of the PE Imports. PE Imports are relative unique and this is a great way to find new variants of existing malware. The chance of false-positives is relative high. The resulting hash is often called an imphash.

2% Match2% Match
B

Statistic analysis

Statistic analysis of the file

Deviates from other files with the same name (imitation)
File version is 0.0.0.0
No certificate
Other files with the same name do not have a certificate as well
This is a very common file
B

Neural network analysis

Analysis: Low risk

A neural network is a type of artificial intelligence. It recognized patterns nog clear for a human viewer. Our neural network is surprisingly accurate in recognizing dangerous files. The value below is the predicted chance the file is malicious.

10%10 %

?

User feedback

Read feedback on this file from other users. Help other users by providing feedback yourself.

You can earn reputation points !

You are currently not logged in. Login, or Create an account

Feedback users:

There has been no user feedback provided yet.
You are not logged in. Only registered users can provide feedback. Login and help other users.

Login Create an account