× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0244fe58ad9de723eddfbd399ee9a9b38de76ea737b3a10f8b62217689ebddac
File name: 41139
Detection ratio: 1 / 55
Analysis date: 2016-02-10 07:34:05 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
CMC RemoteAdmin.Win32.WinVNC!O 20160205
Ad-Aware 20160210
AegisLab 20160210
Yandex 20160209
AhnLab-V3 20160209
Alibaba 20160204
ALYac 20160209
Antiy-AVL 20160210
Arcabit 20160210
Avast 20160210
AVG 20160210
Avira (no cloud) 20160210
Baidu-International 20160209
BitDefender 20160210
Bkav 20160204
ByteHero 20160210
CAT-QuickHeal 20160210
ClamAV 20160210
Comodo 20160210
Cyren 20160210
DrWeb 20160210
Emsisoft 20160210
ESET-NOD32 20160210
F-Prot 20160210
F-Secure 20160210
Fortinet 20160210
GData 20160210
Ikarus 20160210
Jiangmin 20160210
K7AntiVirus 20160210
K7GW 20160210
Kaspersky 20160210
Malwarebytes 20160210
McAfee 20160210
McAfee-GW-Edition 20160210
Microsoft 20160210
eScan 20160210
NANO-Antivirus 20160210
nProtect 20160205
Panda 20160208
Qihoo-360 20160210
Rising 20160209
Sophos AV 20160210
SUPERAntiSpyware 20160210
Symantec 20160209
Tencent 20160210
TheHacker 20160208
TotalDefense 20160210
TrendMicro 20160210
TrendMicro-HouseCall 20160210
VBA32 20160209
VIPRE 20160210
ViRobot 20160210
Zillya 20160209
Zoner 20160210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2005 Macrovision Corporation

Product MyFantasyMaker
Original name Setup.exe
Internal name Setup
File version 5.0.0072
Description Setup Launcher
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-07-13 06:19:30
Entry Point 0x0001E86C
Number of sections 4
PE sections
Overlays
MD5 a6689a0379f37fd184686660a39f7adb
File type data
Offset 253952
Size 8817628
Entropy 7.99
PE imports
RegDeleteKeyA
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
RegDeleteValueA
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
EqualSid
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
BitBlt
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetExitCodeProcess
LocalFree
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
CopyFileA
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
TerminateProcess
VirtualQuery
SearchPathA
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
GlobalLock
RemoveDirectoryA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
GetShortPathNameA
SizeofResource
LocalFileTimeToFileTime
LockResource
SetFileTime
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetVersion
GetEnvironmentStrings
CreateProcessA
IsValidCodePage
UnmapViewOfFile
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
GetOEMCP
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
GetMessageA
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
MoveWindow
KillTimer
FindWindowA
DefWindowProcA
GetClassInfoA
SetWindowPos
GetDesktopWindow
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
PostMessageA
DrawIcon
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
SendDlgItemMessageA
GetDC
ReleaseDC
GetDlgCtrlID
SetWindowTextA
DestroyIcon
LoadStringA
ShowWindow
CharPrevA
GetWindowPlacement
SendMessageA
SubtractRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
CharLowerBuffA
LoadCursorA
ClientToScreen
SetRect
GetWindowLongA
GetWindowTextLengthA
SetTimer
GetClientRect
LoadIconA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
wsprintfA
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
StgIsStorageFile
GetRunningObjectTable
CoCreateInstance
StgOpenStorage
StringFromCLSID
CoCreateGuid
CoTaskMemFree
CreateItemMoniker
Number of PE resources by type
RT_DIALOG 5
RT_ICON 4
RT_STRING 3
GIF 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 17
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.0.0.35197

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
106496

EntryPoint
0x1e86c

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2005 Macrovision Corporation

FileVersion
5.0.0072

TimeStamp
2005:07:12 23:19:30-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
5.0.0072

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Adrian

CodeSize
163840

ProductName
MyFantasyMaker

ProductVersionNumber
11.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 bb78cd56f830c666f1c32624b3ceea71
SHA1 22c66729b99c4beea4d20bdf032cb96d6cc3417d
SHA256 0244fe58ad9de723eddfbd399ee9a9b38de76ea737b3a10f8b62217689ebddac
ssdeep
196608:pEaIEj1Mo9dpPY+fDzTA569fjjrvjuFqq0CBS:j1h9r7LfA569La8CBS

authentihash 86eef27d12601dff28bf0ab6968835827bac0014bf0258afe3d67287f9583985
imphash 1c24cf8a3635f3d12e4f29f9da1e997a
File size 8.7 MB ( 9071580 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (31.7%)
Win32 Executable MS Visual C++ (generic) (23.0%)
Win64 Executable (generic) (20.3%)
Microsoft Visual C++ compiled executable (generic) (12.1%)
Win32 Dynamic Link Library (generic) (4.8%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2009-02-11 16:54:48 UTC ( 10 years, 3 months ago )
Last submission 2016-06-30 06:20:02 UTC ( 2 years, 11 months ago )
File names 11306145
Setup1.exe
bb78cd56f830c666f1c32624b3ceea71
Setup
myfantasy.exe
MFM50a.exe
41139
0244fe58ad9de723eddfbd399ee9a9b38de76ea737b3a10f8b62217689ebddac
octet-stream
0244FE58AD9DE723EDDFBD399EE9A9B38DE76EA737B3A10F8B62217689EBDDAC.exe
MFM50A.EXE
Setup.exe
My Fantasy Maker v5.0a.exe
52096-92661-my-fantasy-maker.exe
smona123871819909368137498
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!