× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 314a951e1ca85b1259eb369f89dc61ca93dee150729d34f941179136b1b8a466
File name: RoboCop_2014_SUB_New_HDts_x264_AC3_V2_-SmY_5BP2PDL5D.exe
Detection ratio: 9 / 49
Analysis date: 2014-03-12 18:36:03 UTC ( 1 year, 2 months ago )
Antivirus Result Update
AVG MalSign.Generic.6A4 20140311
CMC Packed.Win32.TDSS.2!O 20140312
ESET-NOD32 a variant of Win32/AdWare.iBryte.T 20140312
Kaspersky not-a-virus:Downloader.Win32.Agent.bkfx 20140312
Kingsoft Win32.Troj.DownAgent.bk.(kcloud) 20140312
Malwarebytes PUP.Optional.OptimumInstaller.A 20140312
Panda Trj/Genetic.gen 20140312
Rising PE:Malware.iBryte!6.14B5 20140312
VBA32 suspected of Trojan.Downloader.gen.h 20140312
Ad-Aware 20140312
Agnitum 20140312
AhnLab-V3 20140312
AntiVir 20140312
Antiy-AVL 20140311
Avast 20140312
Baidu-International 20140312
BitDefender 20140312
Bkav 20140312
ByteHero 20140312
CAT-QuickHeal 20140312
ClamAV 20140312
Commtouch 20140312
Comodo 20140312
DrWeb 20140312
Emsisoft 20140312
F-Prot 20140312
F-Secure 20140312
Fortinet 20140312
GData 20140312
Ikarus 20140312
Jiangmin 20140312
K7AntiVirus 20140312
K7GW 20140312
McAfee 20140312
McAfee-GW-Edition 20140312
MicroWorld-eScan 20140312
Microsoft 20140312
NANO-Antivirus 20140312
Norman 20140312
Qihoo-360 20140302
SUPERAntiSpyware 20140311
Sophos 20140312
Symantec 20140312
TheHacker 20140312
TotalDefense 20140312
TrendMicro 20140312
TrendMicro-HouseCall 20140312
VIPRE 20140312
ViRobot 20140312
nProtect 20140312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright (C) 2013 Premium Installer

Publisher WARP INSTALL
Product Premium Installer
File version 1.3.7.2
Description Premium Installer
Signature verification Signed file, verified signature
Signers
[+] WARP INSTALL
Status Valid
Valid from 1:00 AM 10/4/2013
Valid to 12:59 AM 9/21/2014
Valid usage Code Signing
Algorithm SHA1
Thumbprint 549D907E6D20823A1F90AA051FC5D54B1AB01C8F
Serial number 52 A3 5E 3A C3 B6 7E 8C D7 BB 42 D4 90 65 8B BA
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-03-12 13:02:32
Entry Point 0x0000D00B
Number of sections 4
PE sections
PE imports
GetDeviceCaps
GetStdHandle
GetConsoleOutputCP
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
InterlockedDecrement
SetLastError
IsDebuggerPresent
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
EnumSystemLocalesA
SetConsoleCtrlHandler
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
FatalAppExitA
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetUserDefaultLCID
CompareStringW
GetTimeFormatA
IsValidLocale
GetProcAddress
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
lstrlenW
GetEnvironmentStrings
GetCurrentProcessId
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
VirtualFree
Sleep
VirtualAlloc
CompareStringA
ReleaseDC
LoadStringA
EndDialog
GetDC
SystemParametersInfoW
DialogBoxIndirectParamA
Number of PE resources by type
RT_ICON 9
RT_MANIFEST 1
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 13
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
59392

ImageVersion
0.0

ProductName
Premium Installer

FileVersionNumber
3.7.1.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

LinkerVersion
9.0

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.3.7.2

TimeStamp
2014:03:12 14:02:32+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:03:12 19:36:15+01:00

ProductVersion
1.3.7.2

FileDescription
Premium Installer

OSVersion
5.0

FileCreateDate
2014:03:12 19:36:15+01:00

FileOS
Win32

LegalCopyright
Copyright (C) 2013 Premium Installer

MachineType
Intel 386 or later, and compatibles

CompanyName
Premium Installer

CodeSize
155136

FileSubtype
0

ProductVersionNumber
3.7.1.0

EntryPoint
0xd00b

ObjectFileType
Executable application

File identification
MD5 b20567e16d13d2250e750fbec6e63985
SHA1 a9f4c7d9ac09c2f706053febd6805ddf3ad4c63a
SHA256 314a951e1ca85b1259eb369f89dc61ca93dee150729d34f941179136b1b8a466
ssdeep
3072:BhRW/j0Ji91+aeMzxVlj+tCSs5/5uzCG5KwpRc:l6p1jXj+gSDswpRc

imphash 14fe94b502d0158bd50fd93c884a8533
File size 215.3 KB ( 220448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.1%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe signed

VirusTotal metadata
First submission 2014-03-12 18:36:03 UTC ( 1 year, 2 months ago )
Last submission 2014-03-12 18:36:03 UTC ( 1 year, 2 months ago )
File names RoboCop_2014_SUB_New_HDts_x264_AC3_V2_-SmY_5BP2PDL5D.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.