× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5cc8c4372a5f7d5fc5acc784916ab86ce244577631ea2634d4588c4b9b378002
File name: 405996
Detection ratio: 1 / 57
Analysis date: 2016-03-31 21:08:23 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
TheHacker Trojan/KillAV.nhz 20160330
Ad-Aware 20160331
AegisLab 20160331
AhnLab-V3 20160330
Alibaba 20160323
ALYac 20160331
Antiy-AVL 20160331
Arcabit 20160331
Avast 20160331
AVG 20160331
Avira (no cloud) 20160331
AVware 20160331
Baidu 20160331
Baidu-International 20160331
BitDefender 20160331
Bkav 20160331
CAT-QuickHeal 20160331
ClamAV 20160331
CMC 20160322
Comodo 20160331
Cyren 20160331
DrWeb 20160331
Emsisoft 20160331
ESET-NOD32 20160331
F-Prot 20160331
F-Secure 20160331
Fortinet 20160330
GData 20160331
Ikarus 20160331
Jiangmin 20160331
K7AntiVirus 20160331
K7GW 20160331
Kaspersky 20160331
Kingsoft 20160331
Malwarebytes 20160331
McAfee 20160331
McAfee-GW-Edition 20160331
Microsoft 20160331
eScan 20160331
NANO-Antivirus 20160331
nProtect 20160331
Panda 20160331
Qihoo-360 20160331
Rising 20160331
Sophos AV 20160331
SUPERAntiSpyware 20160331
Symantec 20160331
Tencent 20160331
TotalDefense 20160330
TrendMicro 20160331
TrendMicro-HouseCall 20160331
VBA32 20160331
VIPRE 20160331
ViRobot 20160331
Yandex 20160316
Zillya 20160331
Zoner 20160331
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2004 Macrovision Corporation

Product Appointments Book
Original name Setup.exe
Internal name Setup
File version 2.34.0000
Description Setup Launcher
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2004-10-22 08:17:54
Entry Point 0x0001E14C
Number of sections 4
PE sections
Overlays
MD5 9d273e6d05bd5b84667ea70b7d924509
File type data
Offset 253952
Size 19000737
Entropy 8.00
PE imports
RegDeleteKeyA
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
RegDeleteValueA
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueA
FreeSid
RegQueryValueExA
AllocateAndInitializeSid
OpenThreadToken
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
EqualSid
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
BitBlt
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
lstrcatA
UnhandledExceptionFilter
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetExitCodeProcess
LocalFree
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
CopyFileA
ExitProcess
GetVersionExA
GetModuleFileNameA
QueryPerformanceFrequency
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
GetModuleHandleA
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
TerminateProcess
VirtualQuery
SearchPathA
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
SystemTimeToFileTime
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
GetTempFileNameA
CreateFileMappingA
GlobalLock
RemoveDirectoryA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
GetShortPathNameA
SizeofResource
LocalFileTimeToFileTime
LockResource
SetFileTime
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
MapViewOfFile
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetVersion
GetEnvironmentStrings
CreateProcessA
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
GetOEMCP
ResetEvent
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
SysFreeString
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
CharPrevA
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
MoveWindow
KillTimer
FindWindowA
DefWindowProcA
GetClassInfoA
SetWindowPos
GetDesktopWindow
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
PostMessageA
DrawIcon
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
SendDlgItemMessageA
GetDC
ReleaseDC
GetDlgCtrlID
SetWindowTextA
DestroyIcon
LoadStringA
ShowWindow
GetWindowPlacement
SendMessageA
SubtractRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
CharLowerBuffA
LoadCursorA
ClientToScreen
SetRect
GetWindowLongA
GetWindowTextLengthA
SetTimer
GetClientRect
LoadIconA
GetMessageA
FillRect
CharNextA
WaitForInputIdle
GetSysColorBrush
wsprintfA
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CoInitialize
StgIsStorageFile
GetRunningObjectTable
CoCreateInstance
StgOpenStorage
StringFromCLSID
CoCreateGuid
CoTaskMemFree
CreateItemMoniker
Number of PE resources by type
RT_DIALOG 5
RT_ICON 4
RT_STRING 3
GIF 1
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 17
NEUTRAL 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
10.50.0.125

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Setup Launcher

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
106496

EntryPoint
0x1e14c

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2004 Macrovision Corporation

FileVersion
2.34.0000

TimeStamp
2004:10:22 09:17:54+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
2.34.

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Appointments Book

CodeSize
163840

ProductName
Appointments Book

ProductVersionNumber
10.50.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 bd8debba043f8586d18e63ca35168d4f
SHA1 0d801fb4e10141d21d57b020ec66d4a2642c3ee6
SHA256 5cc8c4372a5f7d5fc5acc784916ab86ce244577631ea2634d4588c4b9b378002
ssdeep
393216:+1h9r7YZC4g5vdLKy6q3GZzHB8ra2Iwd0saB5y53/eRC:+1v4Q4CLK1q3OHz2IzxK3/eRC

authentihash da5688aa546a0dc8c756fc0735985b2b5872036bff4c1a180c338818a6c29e5a
imphash 2dd1f2ca3497e7bf3a3f47dd48596ca8
File size 18.4 MB ( 19254689 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (36.1%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win64 Executable (generic) (23.2%)
Win32 Dynamic Link Library (generic) (5.5%)
Win32 Executable (generic) (3.7%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2009-09-01 23:36:29 UTC ( 9 years, 6 months ago )
Last submission 2016-03-08 02:36:32 UTC ( 3 years ago )
File names 405996
test.exe
Setup
5CC8C4372A5F7D5FC5ACC784916AB86CE244577631EA2634D4588C4B9B378002
appointmentsbooksetup.exe
Setup.exe
_aiiS4TRm.ocx
AppointmentsBookSetup.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!