× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 18756d11b3c62654e2409d1340a8114fbd471f114420e5ba7735a7363cf23ec6
File name: OrbitDownloaderSetup.exe
Detection ratio: 14 / 51
Analysis date: 2014-04-16 09:31:30 UTC ( 1 day, 12 hours ago )
Antivirus Result Update
Ad-Aware Application.Orbitnet.A 20140416
Antiy-AVL Trojan[DDoS:HEUR]/Win32.OrboDDoS 20140416
Bkav W32.Clod529.Trojan.256e 20140415
ClamAV Win.PUA.NetTool.Gushunleashed 20140416
Comodo ApplicUnwnt.Win32.Hoax.GushUnleashed.~AGH 20140416
ESET-NOD32 Win32/OpenCandy 20140416
F-Secure Application.Orbitnet.A 20140416
Ikarus not-a-virus:NetTool.Win32.GushUnleashed 20140416
Kaspersky HEUR:Trojan-DDoS.Win32.OrboDDoS.a 20140416
Malwarebytes PUP.OpenCandy.A 20140416
MicroWorld-eScan Application.Orbitnet.A 20140416
TrendMicro ADW_OPENCANDY 20140416
TrendMicro-HouseCall TROJ_GEN.R0CBH07A514 20140416
VIPRE Trojan.Win32.Generic!BT 20140416
AVG 20140416
AegisLab 20140416
Agnitum 20140415
AhnLab-V3 20140415
AntiVir 20140416
Avast 20140416
Baidu-International 20140416
BitDefender 20140416
ByteHero 20140416
CAT-QuickHeal 20140416
CMC 20140411
Commtouch 20140416
DrWeb 20140416
Emsisoft 20140416
F-Prot 20140416
Fortinet 20140416
GData 20140416
Jiangmin 20140416
K7AntiVirus 20140416
K7GW 20140416
Kingsoft 20140416
McAfee 20140416
McAfee-GW-Edition 20140416
Microsoft 20140416
NANO-Antivirus 20140416
Norman 20140416
Panda 20140415
Qihoo-360 20140416
Rising 20140415
SUPERAntiSpyware 20140416
Sophos 20140416
Symantec 20140416
TheHacker 20140416
TotalDefense 20140416
VBA32 20140416
ViRobot 20140416
nProtect 20140415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright (C) 2006-2013 OrbitDownloader.com

Publisher KORAM GAMES LIMITED
Product Orbit Downloader 4.1.1.18
File version 4.1.1.18
Description Orbit Downloader setup
Comments This installation was built with Inno Setup.
Signature verification Certificate out of its validity period
Signers
[+] KORAM GAMES LIMITED
Status Certificate out of its validity period
Valid from 1:00 AM 11/8/2012
Valid to 12:59 AM 1/8/2014
Valid usage Code Signing
Algorithm SHA1
Thumbrint 14CEFE468E924DC3B2ADAF56E9A9CA4966174D60
Serial number 6D E6 80 51 0A EC 82 8B 17 AC 57 B1 4D 7A 0C E3
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Packers identified
Command INNO
F-PROT INNO, NSIS, appended, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-09-23 11:06:57
Link date 12:06 PM 9/23/2009
Entry Point 0x000163C4
Number of sections 9
PE sections
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
EnumCalendarInfoA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
CharToOemW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 4
DUTCH 4
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
60416

ImageVersion
6.0

ProductName
Orbit Downloader 4.1.1.18

FileVersionNumber
4.1.1.18

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
2.25

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
4.1.1.18

TimeStamp
2009:09:23 12:06:57+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:04:16 10:32:49+01:00

ProductVersion
4.1.1.18

FileDescription
Orbit Downloader setup

OSVersion
5.0

FileCreateDate
2014:04:16 10:32:49+01:00

FileOS
Win32

LegalCopyright
Copyright (C) 2006-2013 OrbitDownloader.com

MachineType
Intel 386 or later, and compatibles

CompanyName
www.orbitdownloader.com

CodeSize
86016

FileSubtype
0

ProductVersionNumber
4.1.1.18

EntryPoint
0x163c4

ObjectFileType
Executable application

File identification
MD5 a14d5266da3325bf96e7c73eede18c26
SHA1 476dcb0fb0661e979bf04e3f775125c114ea9b30
SHA256 18756d11b3c62654e2409d1340a8114fbd471f114420e5ba7735a7363cf23ec6
ssdeep
98304:9KyR5J1HQI6enaScWfRs9iaK5tpb/pbhDyCp/BM:9RJuIxndRsoa8BhfpJM

imphash 72faf036969f0d1e2da5e177111256fc
File size 5.3 MB ( 5511496 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (86.4%)
Win32 Dynamic Link Library (generic) (5.1%)
Win32 Executable (generic) (3.5%)
Win16/32 Executable Delphi generic (1.6%)
Generic Win/DOS Executable (1.5%)
Tags
nsis peexe signed

VirusTotal metadata
First submission 2013-05-02 10:00:43 UTC ( 11 months, 2 weeks ago )
Last submission 2014-04-11 06:03:26 UTC ( 6 days, 15 hours ago )
File names --OrbitSetup4.1.18_20130502_1_(20130817)_with_ad.exe
Orbit_Downloader4.1.1.18.exe
d.php
OrbitDownloaderSetup4118(1).exe
18756d11b3c62654e2409d1340a8114fbd471f114420e5ba7735a7363cf23ec6
download-OrbitDownloaderSetup.exe
OrbitDownloaderSetup290---102713.exe
vti-rescan
8261-Orbit-Downloader-4_1_1_18.exe
25321101a93961f860bd9d2dac7c51f23b66e614
OrbitSetup4.1.18_20130502_1.exeg
OrbitDownloader_4.1.1.18.exe
OrbitDownloaderSetup4118.exe
OrbitSetup4.1.18_20130502_1.exe
OrbitDownloaderSetup(Orbit Downloader 4.1.1.18).exe
Orbitdownloader Setup4.1.18.exe
orbit_downloader.exe
OrbitSetup4.1.18_20130502_1_普通安装包.exe
OrbitSetup4.1.18_20130502_1 (1).exe
OrbitDownloaderSetup4.1.1.18.exe
OrbitSetup4.1.18_20130502_1.exe
OrbitSetup4.1.18_20130502_1.exe
OrbitDownloader_4.1.1.18_Setup.exe
OrbitDownloaderSetup4-1-1-18.exe
Orbit.Downloader-4.1.1.18.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Set keys
Deleted keys
Created processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections
UDP communications