× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4d7f50b79ba34d1573c60eb288cf46f0c56e3d5489f58b0ce344cdefd2bd847d
File name: 105526-istoricheskiy-kamuflyazh-amx-50-100-wot.exe
Detection ratio: 0 / 57
Analysis date: 2015-03-04 07:24:44 UTC ( 2 years, 9 months ago )
Antivirus Result Update
Ad-Aware 20150304
AegisLab 20150304
Yandex 20150228
AhnLab-V3 20150303
Alibaba 20150304
ALYac 20150304
Antiy-AVL 20150304
Avast 20150304
AVG 20150304
Avira (no cloud) 20150304
AVware 20150304
Baidu-International 20150303
BitDefender 20150304
Bkav 20150303
ByteHero 20150304
CAT-QuickHeal 20150304
ClamAV 20150304
CMC 20150304
Comodo 20150304
Cyren 20150304
DrWeb 20150304
Emsisoft 20150304
ESET-NOD32 20150304
F-Prot 20150304
F-Secure 20150304
Fortinet 20150304
GData 20150304
Ikarus 20150304
Jiangmin 20150303
K7AntiVirus 20150304
K7GW 20150304
Kaspersky 20150304
Kingsoft 20150304
Malwarebytes 20150304
McAfee 20150304
McAfee-GW-Edition 20150304
Microsoft 20150304
eScan 20150304
NANO-Antivirus 20150304
Norman 20150303
nProtect 20150303
Panda 20150303
Qihoo-360 20150304
Rising 20150303
Sophos AV 20150304
SUPERAntiSpyware 20150303
Symantec 20150304
Tencent 20150304
TheHacker 20150303
TotalDefense 20150303
TrendMicro 20150304
TrendMicro-HouseCall 20150304
VBA32 20150303
VIPRE 20150304
ViRobot 20150304
Zillya 20150303
Zoner 20150303
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
www.GameModding.net

Publisher Game Modding
Product ModInstall
File version 3.1.0.0
Description ModInstall 3.0
Signature verification Signed file, verified signature
Signing date 2:08 PM 3/2/2015
Signers
[+] Game Modding
Status Valid
Issuer None
Valid from 1:00 AM 3/28/2014
Valid to 12:59 AM 3/29/2015
Valid usage Code Signing
Algorithm SHA1
Thumbprint D26D864742B145F97ED2CF74EB576F74019D74DF
Serial number 3E 16 94 7B 50 77 C6 1E F3 CB C7 38 E5 55 88 F2
[+] COMODO Code Signing CA 2
Status Valid
Issuer None
Valid from 1:00 AM 8/24/2011
Valid to 11:48 AM 5/30/2020
Valid usage Code Signing
Algorithm SHA1
Thumbprint B64771392538D1EB7A9281998791C14AFD0C5035
Serial number 10 70 9D 4F F5 54 08 D7 30 60 01 D8 EA 91 75 BB
[+] USERTrust
Status Valid
Issuer None
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] GlobalSign TSA for MS Authenticode - G1
Status Valid
Issuer None
Valid from 1:00 AM 8/23/2013
Valid to 1:00 AM 9/23/2024
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8CE69F5012E1D1A8FB395E2E31E2B42BDE3B343B
Serial number 11 21 40 5C 1F 0E D2 58 88 2B E5 4D 86 86 BA 11 EA 45
[+] GlobalSign Timestamping CA - G2
Status Valid
Issuer None
Valid from 11:00 AM 4/13/2011
Valid to 1:00 PM 1/28/2028
Valid usage All
Algorithm SHA1
Thumbrint C0E49D2D7D90A5CD427F02D9125694D5D6EC5B71
Serial number 04 00 00 00 00 01 2F 4E E1 52 D7
[+] GlobalSign
Status Valid
Issuer None
Valid from 1:00 PM 9/1/1998
Valid to 1:00 PM 1/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm SHA1
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-02-17 09:14:22
Entry Point 0x00001D14
Number of sections 9
PE sections
PE imports
RegCreateKeyExW
RegCloseKey
RegRestoreKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
CryptHashData
RegQueryValueExW
CryptCreateHash
RegFlushKey
OpenProcessToken
RegConnectRegistryW
RegOpenKeyExW
RegReplaceKeyW
GetTokenInformation
CryptVerifySignatureW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
OpenThreadToken
InitiateSystemShutdownW
RegLoadKeyW
CryptAcquireContextW
RegDeleteValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
RegSaveKeyW
EqualSid
RegUnLoadKeyW
ImageList_Merge
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_GetImageInfo
FlatSB_SetScrollInfo
ImageList_SetImageCount
Ord(17)
FlatSB_GetScrollInfo
_TrackMouseEvent
ImageList_DragMove
FlatSB_SetScrollProp
ImageList_Remove
ImageList_GetDragImage
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Replace
ImageList_SetOverlayImage
ImageList_Destroy
ImageList_AddMasked
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_GetIcon
FlatSB_SetScrollPos
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
InitializeFlatSB
ImageList_LoadImageW
FlatSB_GetScrollPos
ImageList_DragShowNolock
ImageList_Create
ImageList_Read
ImageList_Copy
Ord(8)
ImageList_EndDrag
ChooseColorA
GetSaveFileNameW
GetOpenFileNameW
SetDIBits
GetTextMetricsW
SetMapMode
GetWindowOrgEx
ResizePalette
GetPaletteEntries
CombineRgn
CopyEnhMetaFileW
SetPixel
EndDoc
IntersectClipRect
AngleArc
GetTextExtentPointW
CreatePalette
CreateDIBitmap
CreateEllipticRgnIndirect
GetEnhMetaFileBits
StretchBlt
StretchDIBits
ArcTo
Pie
Arc
ExtCreatePen
GetFontData
SetWinMetaFileBits
SetRectRgn
GetDIBColorTable
DeleteEnhMetaFile
TextOutW
CreateFontIndirectW
OffsetRgn
EnumFontsW
GetCurrentPositionEx
TextOutA
CreateRectRgnIndirect
LPtoDP
GetBitmapBits
GetBrushOrgEx
ExcludeClipRect
SetBkMode
BitBlt
FillRgn
SetAbortProc
FrameRgn
CreateBrushIndirect
SelectPalette
SetBkColor
ExtSelectClipRgn
StartDocW
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
DeleteObject
CreatePenIndirect
SetGraphicsMode
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
SetWorldTransform
SetEnhMetaFileBits
GetSystemPaletteEntries
StartPage
GetObjectW
CreateDCW
RealizePalette
CreatePatternBrush
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
PlayEnhMetaFile
ExtTextOutA
UnrealizeObject
GdiFlush
RoundRect
GetWinMetaFileBits
GetEnhMetaFileDescriptionW
GetEnhMetaFileHeader
SetWindowOrgEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
CreateHalftonePalette
GetRgnBox
SaveDC
CreateICW
MaskBlt
GetEnhMetaFilePaletteEntries
RestoreDC
GetPixel
CreateDIBSection
SetTextColor
ExtFloodFill
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
SetStretchBltMode
PolyBezier
Chord
SetBrushOrgEx
CreateRectRgn
SelectObject
CreateCompatibleBitmap
CreateSolidBrush
Polyline
GetDIBits
AbortDoc
Ellipse
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
SetEvent
GetPrivateProfileSectionNamesW
GetFileAttributesW
GetPrivateProfileStructW
CreatePipe
GetCurrentProcess
GetDriveTypeW
GetLocaleInfoA
LocalAlloc
GetVolumeInformationW
SetErrorMode
GetLocaleInfoW
SetStdHandle
GetFileTime
IsDBCSLeadByteEx
GetCPInfo
lstrcmpiA
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
GetTempPathW
WaitForSingleObject
WritePrivateProfileStructW
GetStringTypeW
ResumeThread
EnumDateFormatsW
GetExitCodeProcess
LocalFree
FormatMessageW
GetThreadPriority
GetTimeZoneInformation
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
QueryDosDeviceW
GetFullPathNameW
WritePrivateProfileStringW
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
GetSystemTime
InitializeCriticalSection
CopyFileW
lstrcpynW
GetModuleFileNameW
TryEnterCriticalSection
Beep
IsDebuggerPresent
ExitProcess
lstrcpyW
SwitchToThread
GetModuleFileNameA
GetPriorityClass
InterlockedExchangeAdd
SetConsoleCtrlHandler
WritePrivateProfileSectionW
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetPrivateProfileStringW
SetFilePointer
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
GetSystemDefaultUILanguage
DeleteCriticalSection
GetExitCodeThread
CreateMutexW
MulDiv
ExitThread
SetPriorityClass
WaitForMultipleObjectsEx
TerminateProcess
GetVersion
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
VirtualQueryEx
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
CreateToolhelp32Snapshot
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
FreeLibrary
GlobalFindAtomW
GlobalSize
GetStartupInfoA
GetWindowsDirectoryW
GetFileSize
OpenProcess
DeleteFileA
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
WriteFile
RemoveDirectoryW
ExpandEnvironmentStringsW
FindNextFileW
lstrcpyA
CompareStringA
FindFirstFileW
IsValidLocale
DuplicateHandle
FindFirstFileExW
GetUserDefaultLCID
GetPrivateProfileSectionW
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
SystemTimeToFileTime
GlobalDeleteAtom
GetShortPathNameW
GetSystemInfo
GlobalFree
LCMapStringA
GetTimeFormatW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
lstrlenW
WinExec
Process32NextW
VirtualFree
EnumTimeFormatsW
GetCPInfoExW
GetEnvironmentStrings
CompareFileTime
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
InterlockedCompareExchange
Process32FirstW
GetCurrentThread
SuspendThread
GetSystemDefaultLangID
RaiseException
UnhandledExceptionFilter
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
OpenMutexW
GetACP
GlobalLock
GetModuleHandleW
FreeResource
FileTimeToLocalFileTime
SizeofResource
TlsGetValue
GetLocalTime
GetCurrentDirectoryW
FindResourceW
CreateProcessW
Sleep
SetThreadPriority
VirtualAlloc
ResetEvent
GradientFill
TransparentBlt
AlphaBlend
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CLSIDFromProgID
RevokeDragDrop
IsEqualGUID
CoTaskMemFree
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayUnaccessData
VariantCopyInd
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
GetErrorInfo
SysFreeString
SafeArrayPutElement
VariantInit
DragQueryFileW
SHBrowseForFolderW
DragAcceptFiles
SHFileOperationW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderPathA
DragQueryPoint
ShellExecuteExW
SHGetFileInfoW
ExtractIconW
Shell_NotifyIconW
SHGetPathFromIDListA
SHGetSpecialFolderPathW
SHGetMalloc
ShellExecuteA
DragFinish
SHGetFolderPathW
RedrawWindow
GetForegroundWindow
VkKeyScanExW
DrawTextW
EnableScrollBar
DestroyMenu
PostQuitMessage
GetMessagePos
DrawStateW
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
CharUpperBuffA
WindowFromPoint
IntersectRect
PeekMessageA
CharUpperBuffW
SetMenuItemInfoW
SendMessageW
SetActiveWindow
GetDC
GetCursorPos
DrawTextA
GetMenuStringW
DefFrameProcW
EndMenu
TranslateMessage
OpenClipboard
SendMessageA
UnregisterClassW
GetClassInfoW
SetWindowContextHelpId
DefWindowProcW
CharLowerBuffA
LoadImageW
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
MsgWaitForMultipleObjectsEx
GetClientRect
GetKeyboardState
keybd_event
GetActiveWindow
GetUpdateRgn
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetTopWindow
GetKeyState
GetMenuContextHelpId
DestroyWindow
DrawEdge
GetParent
UpdateWindow
GetPropW
EqualRect
SetClassLongW
EnumWindows
GetMenuState
GetWindowContextHelpId
ShowWindow
DrawFrameControl
SetPropW
EnumDisplayMonitors
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
CharUpperW
LoadIconW
SetParent
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
SetClipboardData
GetMenuItemID
GetIconInfo
GetQueueStatus
RegisterClassW
ScrollWindow
IsZoomed
GetWindowPlacement
LoadStringW
SetWindowLongW
GetKeyboardLayoutList
DrawMenuBar
EnableMenuItem
InvertRect
DrawFocusRect
GetDCEx
GetKeyboardLayout
FillRect
EnumThreadWindows
MonitorFromPoint
CreateAcceleratorTableW
GetSysColorBrush
IsWindowUnicode
CreateWindowExW
ReleaseDC
GetWindowLongW
CharNextW
IsChild
IsDialogMessageA
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
ReleaseCapture
EmptyClipboard
BeginPaint
OffsetRect
DefMDIChildProcW
GetScrollPos
CopyIcon
GetKeyboardLayoutNameW
KillTimer
MapVirtualKeyW
SetTimer
SetMenuContextHelpId
CheckMenuRadioItem
GetClipboardData
LoadBitmapW
GetSystemMetrics
IsIconic
SetScrollRange
BroadcastSystemMessage
GetWindowRect
InflateRect
SetCapture
DrawIcon
EnumChildWindows
GetScrollRange
GetMessageExtraInfo
CharLowerW
ShowOwnedPopups
PostMessageW
InvalidateRect
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
SetWindowTextW
CreateMenu
RemovePropW
FindWindowW
ClientToScreen
CountClipboardFormats
GetMenuItemCount
AttachThreadInput
DestroyAcceleratorTable
GetDesktopWindow
IsDialogMessageW
LoadCursorW
GetSystemMenu
FindWindowExW
DispatchMessageW
InsertMenuW
SetForegroundWindow
ExitWindowsEx
SetFocus
GetMenuItemInfoW
GetAsyncKeyState
wvsprintfW
CharLowerBuffW
DrawTextExW
GetScrollInfo
HideCaret
CreateIconIndirect
GetCapture
ScreenToClient
MessageBeep
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
MessageBoxW
GetMenu
MonitorFromRect
SetMenu
MoveWindow
LoadKeyboardLayoutW
MessageBoxA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
TrackPopupMenu
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
CopyImage
GetWindowRgn
DestroyIcon
IsWindowVisible
WinHelpW
SetCursorPos
SystemParametersInfoW
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
wsprintfA
CallWindowProcW
GetClassNameW
TranslateMDISysAccel
CreateIcon
ValidateRect
GetCursor
GetFocus
InsertMenuItemW
CloseClipboard
TranslateAcceleratorW
UnhookWindowsHookEx
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
timeKillEvent
timeSetEvent
timeGetTime
DocumentPropertiesW
OpenPrinterW
ClosePrinter
EnumPrintersW
Ord(203)
PE exports
Number of PE resources by type
RT_STRING 36
RT_GROUP_CURSOR 7
RT_CURSOR 7
RT_RCDATA 6
RT_ICON 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 42
ENGLISH US 14
RUSSIAN 4
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
788992

ImageVersion
0.0

ProductName
ModInstall

FileVersionNumber
3.1.0.0

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Windows, Cyrillic

LinkerVersion
5.0

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.1.0.0

TimeStamp
2015:02:17 10:14:22+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0.0.0

FileDescription
ModInstall 3.0

OSVersion
4.0

FileOS
Win32

LegalCopyright
www.GameModding.net

MachineType
Intel 386 or later, and compatibles

CompanyName
www.GameModding.net

CodeSize
2555904

FileSubtype
0

ProductVersionNumber
3.1.0.0

EntryPoint
0x1d14

ObjectFileType
Executable application

File identification
MD5 50d52f98a639a836cd39c69200b58e80
SHA1 cccf25a3acd8654509c3192366878d8eee913d7e
SHA256 4d7f50b79ba34d1573c60eb288cf46f0c56e3d5489f58b0ce344cdefd2bd847d
ssdeep
98304:Nu5t3/PmH2m24A1pnOhEOtGsrsECAux8Ga31dJOp5RJPZyPO8GuFC:NuT3/OYOCavIU1dMp5RfcC

authentihash c63eebd5eb62d1640da715e44e9bc6c02b3645edcac437a6bbb36fef1a191741
imphash 9dd410cc200a3f275a72f1606c03b369
File size 7.1 MB ( 7431960 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows Screen Saver (60.5%)
Win32 Executable (generic) (20.8%)
Generic Win/DOS Executable (9.2%)
DOS Executable Generic (9.2%)
VXD Driver (0.1%)
Tags
peexe signed

VirusTotal metadata
First submission 2015-03-04 07:24:44 UTC ( 2 years, 9 months ago )
Last submission 2015-03-04 07:24:44 UTC ( 2 years, 9 months ago )
File names 105526-istoricheskiy-kamuflyazh-amx-50-100-wot.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files
Deleted files
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications