× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 077afa3f3077c14095ea5f90df8d57f50d990e03c850e2758041636b9d5dee98
File name: kcleaner.exe
Detection ratio: 1 / 46
Analysis date: 2013-04-28 01:10:08 UTC ( 11 months, 3 weeks ago ) View latest
Antivirus Result Update
TrendMicro-HouseCall TROJ_GEN.F47V0322 20130428
AVG 20130427
Agnitum 20130427
AhnLab-V3 20130427
AntiVir 20130427
Antiy-AVL 20130427
Avast 20130428
BitDefender 20130428
ByteHero 20130425
CAT-QuickHeal 20130427
ClamAV 20130427
Commtouch 20130427
Comodo 20130428
DrWeb 20130428
ESET-NOD32 20130427
Emsisoft 20130428
F-Prot 20130427
F-Secure 20130428
Fortinet 20130428
GData 20130428
Ikarus 20130427
Jiangmin 20130427
K7AntiVirus 20130426
K7GW 20130426
Kaspersky 20130428
Kingsoft 20130422
Malwarebytes 20130427
McAfee 20130428
McAfee-GW-Edition 20130427
MicroWorld-eScan 20130428
Microsoft 20130428
NANO-Antivirus 20130428
Norman 20130426
PCTools 20130427
Panda 20130427
SUPERAntiSpyware 20130427
Sophos 20130427
Symantec 20130427
TheHacker 20130426
TotalDefense 20130426
TrendMicro 20130427
VBA32 20130427
VIPRE 20130428
ViRobot 20130427
eSafe 20130423
nProtect 20130427
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © 1998-2013 KC Softwares

Publisher KC Softwares
Product KC Softwares KCleaner
Description KC Softwares KCleaner Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Link date 11:22 PM 6/19/1992
Entry Point 0x00009C40
Number of sections 8
PE sections
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_ICON 15
RT_STRING 6
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL 7
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
120320

ImageVersion
6.0

ProductName
KC Softwares KCleaner

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
2.25

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2013:05:24 01:34:04+01:00

FileDescription
KC Softwares KCleaner Setup

OSVersion
1.0

FileCreateDate
2013:05:24 01:34:04+01:00

FileOS
Win32

LegalCopyright
Copyright 1998-2013 KC Softwares

MachineType
Intel 386 or later, and compatibles

CompanyName
KC Softwares

CodeSize
37888

FileSubtype
0

ProductVersionNumber
0.0.0.0

EntryPoint
0x9c40

ObjectFileType
Executable application

File identification
MD5 21a6a26be079ab9e8f7725cc90f36af7
SHA1 c6c251530f4e2509926bba4af7e330aef326a0eb
SHA256 077afa3f3077c14095ea5f90df8d57f50d990e03c850e2758041636b9d5dee98
ssdeep
24576:ZQFkAvaxNtjXagAHxdHa2UoPndtrSO++G8OKAfVLnA/gDYXsi4Lv6Si:Zq5vmzWhRQKzOh8YVLSJEif

File size 1.2 MB ( 1286735 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (91.1%)
Win32 Executable (generic) (3.7%)
Win16/32 Executable Delphi generic (1.7%)
Generic Win/DOS Executable (1.6%)
DOS Executable Generic (1.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-05 12:56:11 UTC ( 1 year, 1 month ago )
Last submission 2013-05-07 16:34:09 UTC ( 11 months, 2 weeks ago )
File names k.exe
077afa3f3077c14095ea5f90df8d57f50d990e03c850e2758041636b9d5dee98
kcleaner.exe
test.exe
kcleaner1.2.3.42.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.