× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 521f2472c3e0e2f7c54ae6bf683694c4a27479d26e95fe05cd1f605ede131ed1
File name: TurboInstall.exe
Detection ratio: 0 / 68
Analysis date: 2018-06-20 17:09:27 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20180620
AegisLab 20180620
AhnLab-V3 20180620
Alibaba 20180620
ALYac 20180620
Antiy-AVL 20180620
Arcabit 20180620
Avast 20180620
Avast-Mobile 20180620
AVG 20180620
Avira (no cloud) 20180620
AVware 20180620
Babable 20180406
Baidu 20180620
BitDefender 20180620
Bkav 20180620
CAT-QuickHeal 20180620
ClamAV 20180620
CMC 20180620
Comodo 20180620
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180620
Cyren 20180620
DrWeb 20180620
eGambit 20180620
Emsisoft 20180620
Endgame 20180612
ESET-NOD32 20180620
F-Prot 20180620
F-Secure 20180620
Fortinet 20180620
GData 20180620
Ikarus 20180620
Sophos ML 20180601
Jiangmin 20180620
K7AntiVirus 20180620
K7GW 20180620
Kaspersky 20180620
Kingsoft 20180620
Malwarebytes 20180620
MAX 20180620
McAfee 20180620
McAfee-GW-Edition 20180620
Microsoft 20180620
eScan 20180620
NANO-Antivirus 20180620
Palo Alto Networks (Known Signatures) 20180620
Panda 20180620
Qihoo-360 20180620
Rising 20180620
SentinelOne (Static ML) 20180618
Sophos AV 20180620
SUPERAntiSpyware 20180620
Symantec 20180620
Symantec Mobile Insight 20180619
TACHYON 20180620
Tencent 20180620
TheHacker 20180619
TotalDefense 20180620
TrendMicro 20180620
TrendMicro-HouseCall 20180620
Trustlook 20180620
VBA32 20180620
VIPRE 20180620
ViRobot 20180620
Webroot 20180620
Yandex 20180620
Zillya 20180620
ZoneAlarm by Check Point 20180620
Zoner 20180620
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Ates Yazilim, Bilgisayar & Internet Teknolojileri Tic Ltd Sti

Product Turbo Internet Installer
Original name TurboInstall.exe
Internal name Turbo Internet Installer
File version 2.1.0.0
Description Turbo Internet Installer
Comments Turbo Internet Installer
Signature verification Signed file, verified signature
Signing date 2:38 PM 3/12/2011
Signers
[+] Ates Yazilim, Bilgisayar & Internet Teknolojileri Tic Ltd Sti
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2009-2 CA
Valid from 1:00 AM 3/20/2010
Valid to 12:59 AM 5/5/2011
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 626FD648A8DFADEADDA7F9E817A40411685E0D08
Serial number 69 91 61 FB 28 FC 13 01 01 F0 E5 38 14 5B 1D 8B
[+] VeriSign Class 3 Code Signing 2009-2 CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 5/21/2009
Valid to 12:59 AM 5/21/2019
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 12D4872BC3EF019E7E0B6F132480AE29DB5B1CA3
Serial number 65 52 26 E1 B2 2E 18 E1 59 0F 29 85 AC 22 E7 5C
[+] VeriSign Class 3 Public Primary CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 1:00 AM 1/29/1996
Valid to 12:59 AM 8/2/2028
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm md2RSA
Thumbprint 742C3192E607E424EB4549542BE1BBC53E6174E2
Serial number 70 BA E4 1D 10 D9 29 34 B6 38 CA 7B 03 CC BA BF
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 1:00 AM 6/15/2007
Valid to 12:59 AM 6/15/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x000FEA74
Number of sections 9
PE sections
Overlays
MD5 aeeb757361bcda67b7e5cc76798b2623
File type data
Offset 4205568
Size 5536
Entropy 7.19
PE imports
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
SetEntriesInAclA
GetNamedSecurityInfoA
GetTokenInformation
RegFlushKey
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
GetUserNameA
RegQueryValueExA
LookupPrivilegeValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
LookupPrivilegeNameA
RegOpenKeyExA
RegEnumKeyExA
ImageList_BeginDrag
ImageList_SetBkColor
InitCommonControls
ImageList_SetDragCursorImage
ImageList_Read
ImageList_GetDragImage
ImageList_Create
ImageList_DragMove
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Remove
ImageList_EndDrag
GetBrushOrgEx
GetDIBColorTable
DeleteEnhMetaFile
SetMapMode
GetWindowOrgEx
PatBlt
GetClipBox
GetNearestColor
GetCurrentPositionEx
SaveDC
TextOutA
GdiFlush
GetTextMetricsA
CreateRectRgnIndirect
MaskBlt
CreateBrushIndirect
SetStretchBltMode
GetEnhMetaFilePaletteEntries
GetMapMode
GetPixel
Rectangle
BitBlt
GetObjectA
ExcludeClipRect
TranslateCharsetInfo
LineTo
DeleteDC
RestoreDC
SetBkMode
GetSystemPaletteEntries
SetPixel
CreateSolidBrush
IntersectClipRect
CreateHalftonePalette
CreateDIBSection
CreateFontA
CopyEnhMetaFileA
RealizePalette
SetTextColor
GetDeviceCaps
GetCurrentObject
MoveToEx
SetEnhMetaFileBits
CreateBitmap
RectVisible
CreatePalette
GetStockObject
CreateDIBitmap
SetViewportOrgEx
SelectPalette
ExtTextOutA
UnrealizeObject
GetDIBits
CombineRgn
GetEnhMetaFileBits
SetBrushOrgEx
GetDCOrgEx
PlayEnhMetaFile
StretchBlt
GetBitmapBits
CreateCompatibleDC
SetROP2
CreateRectRgn
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
GetWinMetaFileBits
SetDIBColorTable
GetEnhMetaFileHeader
GetPaletteEntries
SetWindowOrgEx
Polyline
GetTextExtentPointA
SetBkColor
SetWinMetaFileBits
DeleteObject
CreateCompatibleBitmap
CreatePenIndirect
SetThreadLocale
GetStdHandle
FileTimeToDosDateTime
CreateFileMappingA
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
GetHandleInformation
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetErrorMode
GetLogicalDrives
GetThreadContext
GetLocaleInfoW
GetFullPathNameA
GetTempPathA
WideCharToMultiByte
InterlockedExchange
WriteFile
GetDiskFreeSpaceA
GetThreadPriority
SetFileAttributesA
SetEvent
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
GetStringTypeExA
OutputDebugStringA
SetLastError
GetSystemTime
GetEnvironmentVariableA
GlobalFindAtomA
ExitProcess
GetModuleFileNameA
EnumCalendarInfoA
GetVolumeInformationA
LoadLibraryExA
GetPrivateProfileStringA
SetThreadPriority
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
ExitThread
SetEnvironmentVariableA
GlobalMemoryStatus
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
EnterCriticalSection
TerminateThread
FreeLibrary
GetTickCount
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GetSystemDirectoryA
GlobalSize
GetStartupInfoA
GetDateFormatA
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetCPInfo
GetProcAddress
GlobalReAlloc
FindFirstFileA
lstrcpyA
GetProfileStringA
ResetEvent
GetComputerNameA
FindNextFileA
TerminateProcess
DuplicateHandle
GlobalLock
CreateEventA
CopyFileA
GetFileType
TlsSetValue
CreateFileA
LeaveCriticalSection
GetLastError
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
GetThreadLocale
GlobalUnlock
GlobalAlloc
GetShortPathNameA
FileTimeToLocalFileTime
SizeofResource
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
GetCurrentDirectoryA
GetCommandLineA
GetCurrentThread
SuspendThread
GetSystemDefaultLangID
RaiseException
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetPriorityClass
GetACP
GetVersion
FreeResource
EnumSystemLocalesA
CreateProcessA
UnmapViewOfFile
VirtualFree
Sleep
IsBadReadPtr
FindResourceA
VirtualAlloc
CompareStringA
WNetGetConnectionA
CoUninitialize
CoCreateInstance
CoInitialize
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
GetErrorInfo
SysFreeString
VariantInit
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
RedrawWindow
GetForegroundWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
SetMenuItemInfoA
CharUpperBuffA
WindowFromPoint
DrawIcon
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
CharLowerBuffA
SetScrollPos
CallNextHookEx
GetKeyboardState
ClientToScreen
GetTopWindow
ShowCursor
MsgWaitForMultipleObjects
ScrollWindow
GetWindowTextA
InvalidateRgn
GetKeyState
PtInRect
DrawEdge
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
DefMDIChildProcA
ShowWindow
SetClassLongA
GetPropA
GetDesktopWindow
TranslateMDISysAccel
EnableWindow
SetWindowPlacement
PeekMessageA
GetClipboardData
TranslateMessage
IsWindowEnabled
GetWindow
ActivateKeyboardLayout
InsertMenuItemA
CreatePopupMenu
GetIconInfo
LoadStringA
SetParent
SetClipboardData
CharLowerA
IsZoomed
GetWindowPlacement
GetKeyboardLayoutList
DrawMenuBar
IsIconic
RegisterClassA
GetMenuItemCount
GetWindowLongA
SetTimer
OemToCharA
GetActiveWindow
ShowOwnedPopups
FillRect
EnumThreadWindows
CharNextA
WaitForInputIdle
GetSysColorBrush
IsWindowUnicode
CreateMenu
DestroyWindow
IsChild
IsDialogMessageA
SetFocus
MapVirtualKeyA
GetKeyboardLayoutNameA
SetCapture
BeginPaint
OffsetRect
GetScrollPos
CopyIcon
KillTimer
RegisterWindowMessageA
DefWindowProcA
DrawFocusRect
MapWindowPoints
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
PostMessageA
ReleaseCapture
GetScrollRange
SetWindowLongA
EndDialog
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
DrawIconEx
CreateWindowExA
GetDlgItem
CreateDialogParamA
ScreenToClient
InsertMenuA
LoadCursorA
LoadIconA
TrackPopupMenu
SetWindowsHookExA
GetMenuStringA
GetMenuState
GetKeyboardLayout
GetSystemMenu
GetDC
SetForegroundWindow
OpenClipboard
EmptyClipboard
DrawTextA
IntersectRect
GetScrollInfo
CopyRect
GetCapture
WaitMessage
FindWindowA
MessageBeep
RemoveMenu
GetWindowThreadProcessId
ShowScrollBar
DrawFrameControl
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
CallWindowProcA
MessageBoxA
GetClassNameA
GetWindowDC
DestroyCursor
AdjustWindowRectEx
DialogBoxParamA
LoadKeyboardLayoutA
GetSysColor
SetScrollInfo
GetMenuItemInfoA
SystemParametersInfoA
DestroyIcon
GetKeyNameTextA
IsWindowVisible
CharToOemA
GetDCEx
WinHelpA
FrameRect
SetRect
DeleteMenu
InvalidateRect
DefFrameProcA
SendMessageTimeoutA
CreateIcon
IsRectEmpty
GetCursor
GetFocus
CloseClipboard
GetKeyboardType
SetMenu
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
WSCGetProviderPath
WSACleanup
WSAStartup
WSCDeinstallProvider
ntohs
WSCInstallProvider
WSCEnumProtocols
inet_ntoa
PE exports
Number of PE resources by type
RT_STRING 33
RT_BITMAP 32
RT_RCDATA 14
RT_DIALOG 11
RT_GROUP_CURSOR 11
RT_CURSOR 11
RT_ICON 8
RT_MANIFEST 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 99
TURKISH DEFAULT 21
GERMAN 4
PE resources
ExifTool file metadata
CodeSize
1039872

SubsystemVersion
4.0

Comments
Turbo Internet Installer

InitializedDataSize
3164672

ImageVersion
0.0

ProductName
Turbo Internet Installer

FileVersionNumber
2.1.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileTypeExtension
exe

OriginalFileName
TurboInstall.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.1.0.0

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Turbo Internet Installer

ProductVersion
2.1

FileDescription
Turbo Internet Installer

OSVersion
4.0

FileOS
Win32

LegalCopyright
Ates Yazilim, Bilgisayar & Internet Teknolojileri Tic Ltd Sti

MachineType
Intel 386 or later, and compatibles

CompanyName
Ates Yazilim, Bilgisayar & Internet Teknolojileri Tic Ltd Sti

LegalTrademarks
Ates Yazilim, Bilgisayar & Internet Teknolojileri Tic Ltd Sti

FileSubtype
0

ProductVersionNumber
2.1.0.0

EntryPoint
0xfea74

ObjectFileType
Executable application

Execution parents
Compressed bundles
File identification
MD5 8c73a849453360a86694f375b6487347
SHA1 8b2430f8325f6f277a3afb58cb16550590f46886
SHA256 521f2472c3e0e2f7c54ae6bf683694c4a27479d26e95fe05cd1f605ede131ed1
ssdeep
98304:IkdfubQZrPSMAi1GHdrdLRp3karyYx5NHw+FfAxOitoU:+ajNAqGNdLRCHYRwawcU

authentihash f363219613adfe436c504457ee2db9e176432ea48192ee5d346fc251a8038f2b
imphash 34570b81db7bca48db8201abeea19d11
File size 4.0 MB ( 4211104 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (46.3%)
Win32 Executable Delphi generic (15.2%)
Windows screen saver (14.0%)
DOS Borland compiled Executable (generic) (10.7%)
Win32 Executable (generic) (4.8%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2011-03-16 11:46:23 UTC ( 7 years, 5 months ago )
Last submission 2018-06-20 17:09:27 UTC ( 1 month, 3 weeks ago )
File names 8b2430f8325f6f277a3afb58cb16550590f46886
smona132510483143374199792
Turbo-Internet2116.exe
smona132603783386266983068
110285
smona132148558862487069446
TurboInstalll.exe
smona131924181347226944782
smona130553474617642271137
Turbo İnternet v2.1.16.exe
smona131929204172828435225
smona130804204092407785401
8B2430F8325F6F277A3AFB58CB16550590F46886.exe
8c73a849453360a86694f375b6487347.8b2430f8325f6f277a3afb58cb16550590f46886
Setup TurboInstall v2.1.16.exe
filename
smona131229882607816469139
turboinstall.exe
4646.exe
smona132349085256193796742
TurboInstall (1).exe
smona132567988617968604659
turbo-internet_2116.exe
TurboInstall v2.1.16.exe
smona132537542550715311633
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!