× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5ae34c910dac83f69d28cc3cd8c47f3f685fa0c4cf29d1385d97e2ed454d3b48
File name: setup.exe
Detection ratio: 0 / 49
Analysis date: 2014-03-22 05:41:02 UTC ( 4 weeks, 1 day ago )
Antivirus Result Update
AVG 20140321
Ad-Aware 20140322
AegisLab 20140322
Agnitum 20140321
AhnLab-V3 20140321
AntiVir 20140322
Antiy-AVL 20140320
Avast 20140322
Baidu-International 20140321
BitDefender 20140322
Bkav 20140321
ByteHero 20140322
CAT-QuickHeal 20140320
CMC 20140319
ClamAV 20140322
Commtouch 20140322
Comodo 20140322
DrWeb 20140322
ESET-NOD32 20140322
Emsisoft 20140322
F-Prot 20140322
F-Secure 20140322
Fortinet 20140322
GData 20140322
Ikarus 20140322
Jiangmin 20140322
K7AntiVirus 20140321
K7GW 20140321
Kaspersky 20140322
Kingsoft 20140322
Malwarebytes 20140322
McAfee 20140322
McAfee-GW-Edition 20140322
MicroWorld-eScan 20140322
Microsoft 20140322
NANO-Antivirus 20140322
Norman 20140321
Panda 20140321
Qihoo-360 20140322
Rising 20140321
SUPERAntiSpyware 20140322
Sophos 20140322
Symantec 20140322
TheHacker 20140321
TotalDefense 20140321
TrendMicro 20140322
TrendMicro-HouseCall 20140322
VBA32 20140321
VIPRE 20140322
ViRobot 20140322
nProtect 20140321
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
© Microsoft Corporation. All rights reserved.

Publisher NORTHAMERICA\scottha
Original name setup.exe
Internal name setup.exe
File version 9.0.30729.1 built by: SP
Description Setup
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-07-29 13:45:50
Link date 2:45 PM 7/29/2008
Entry Point 0x00028EE8
Number of sections 4
PE sections
PE imports
GetObjectA
GetDeviceCaps
CreateCompatibleDC
DeleteDC
SelectObject
GetTextExtentPoint32A
GetStockObject
CreateFontIndirectA
GetTextMetricsA
GetObjectW
EnumFontFamiliesExA
DeleteObject
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
BeginUpdateResourceW
FormatMessageA
BeginUpdateResourceA
SetLastError
GetEnvironmentVariableA
CopyFileW
UpdateResourceW
GetModuleFileNameW
CopyFileA
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
UpdateResourceA
HeapSetInformation
EnumSystemLocalesA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
MulDiv
GetSystemDirectoryA
InterlockedDecrement
GetDiskFreeSpaceExA
WriteConsoleA
GlobalAlloc
SetEndOfFile
GetVersion
GetProcAddress
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
EndUpdateResourceA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetDateFormatA
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
GetTempFileNameW
WriteFile
FindFirstFileA
GetCurrentThreadId
InterlockedIncrement
CompareStringA
GetTempFileNameA
FindNextFileA
IsValidLocale
ExpandEnvironmentStringsA
CreateFileW
CreateEventA
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
lstrlenW
Process32NextW
SizeofResource
GetCurrentProcessId
LockResource
GetCPInfo
HeapSize
GetCommandLineA
Process32FirstW
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
GetEnvironmentStrings
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
TerminateProcess
FindResourceA
VirtualAlloc
GetOEMCP
GetTimeFormatA
ShellExecuteExA
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
ShellExecuteA
SetFocus
ReleaseDC
CreateDialogIndirectParamA
ShowWindow
SetClassLongA
SendDlgItemMessageA
ShowScrollBar
MessageBoxW
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
MoveWindow
MessageBoxA
PeekMessageA
TranslateMessage
GetDC
SystemParametersInfoA
SetWindowTextA
GetSystemMetrics
SendMessageA
GetClientRect
GetDlgItem
CreateDialogParamA
DrawTextW
ScreenToClient
LoadCursorA
LoadIconA
CharNextA
GetDialogBaseUnits
LoadImageA
GetFocus
MsgWaitForMultipleObjects
SetForegroundWindow
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
CoUninitialize
CoInitialize
Number of PE resources by type
Struct(43) 92
RT_ICON 11
RT_DIALOG 3
Struct(44) 3
Struct(40) 3
Struct(45) 2
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_VERSION 1
Struct(41) 1
Number of PE resources by language
NEUTRAL 101
ENGLISH US 18
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
9.0

FileVersionNumber
9.0.30729.1

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
168448

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
9.0.30729.1 built by: SP

TimeStamp
2008:07:29 14:45:50+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup.exe

FileAccessDate
2014:03:22 06:38:50+01:00

ProductVersion
9.0.30729.1

FileDescription
Setup

OSVersion
5.0

FileCreateDate
2014:03:22 06:38:50+01:00

OriginalFilename
setup.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
297984

FileSubtype
0

ProductVersionNumber
9.0.30729.1

EntryPoint
0x28ee8

ObjectFileType
Executable application

File identification
MD5 f116db02dcae4133a47fdaa09aace69d
SHA1 565fde101058d9add1975e4ed3088c6eca0ecba2
SHA256 5ae34c910dac83f69d28cc3cd8c47f3f685fa0c4cf29d1385d97e2ed454d3b48
ssdeep
6144:+XaNjt6LuPHmLyiBvuJiFkJ+2Qw+MMq6FlOUeKJ6qjagojDuUli1I:WYYuUx65QwDMq6TOUBeDuUlkI

imphash 784112ee3c1da4bbf1f4ee95a0d306fb
File size 457.5 KB ( 468432 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2008-11-29 21:41:15 UTC ( 5 years, 4 months ago )
Last submission 2014-03-13 20:34:14 UTC ( 1 month, 1 week ago )
File names setup.exe
BabyMash.exe
file-3193684_exe
Baby Smash setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!