× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6108cf9af7923bb3f57b502c6bdfdb52f5ddf95ca966608483404196847211d4
File name: PickMeApp.exe
Detection ratio: 0 / 42
Analysis date: 2012-06-02 21:39:54 UTC ( 5 years, 7 months ago ) View latest
Antivirus Result Update
AhnLab-V3 20120602
AntiVir 20120602
Antiy-AVL 20120602
Avast 20120602
AVG 20120602
BitDefender 20120602
ByteHero 20120531
CAT-QuickHeal 20120602
ClamAV 20120602
Commtouch 20120602
Comodo 20120602
DrWeb 20120602
Emsisoft 20120602
eSafe 20120530
F-Prot 20120602
F-Secure 20120602
Fortinet 20120602
GData 20120602
Ikarus 20120602
Jiangmin 20120602
K7AntiVirus 20120601
Kaspersky 20120602
McAfee 20120602
McAfee-GW-Edition 20120602
Microsoft 20120602
NOD32 20120602
Norman 20120602
nProtect 20120602
Panda 20120602
PCTools 20120602
Rising 20120601
Sophos AV 20120602
SUPERAntiSpyware 20120602
Symantec 20120602
TheHacker 20120531
TotalDefense 20120601
TrendMicro 20120602
TrendMicro-HouseCall 20120602
VBA32 20120531
VIPRE 20120602
ViRobot 20120602
VirusBuster 20120602
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright 2011 T-App Ltd. All rights reserved.

Publisher T-App Ltd.
Product Pick Me App
Original name PickMeApp.exe
Internal name PickMeApp.exe
File version 0.5.14.9
Description PMA Application
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-04-23 20:19:49
Entry Point 0x0016EA39
Number of sections 5
PE sections
PE imports
GetTokenInformation
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
OpenProcessToken
GetUserNameW
FreeSid
RegOpenKeyExW
RegEnumKeyExW
AllocateAndInitializeSid
OpenThreadToken
EqualSid
RegEnumKeyW
RegDeleteKeyW
RegEnumValueW
RegQueryValueExW
RegQueryValueW
RegSetValueExW
ImageList_GetIconSize
InitCommonControlsEx
_TrackMouseEvent
GetFileTitleW
CommDlgExtendedError
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetPaletteEntries
CombineRgn
GetViewportOrgEx
GetObjectType
GetBoundsRect
SetLayout
SetPixel
SetPixelV
DeleteObject
IntersectClipRect
OffsetWindowOrgEx
CreateEllipticRgn
GetTextFaceW
CreatePalette
CreateDIBitmap
SetTextAlign
StretchBlt
ScaleViewportExtEx
SetWindowExtEx
SetBkColor
GetBkColor
SetRectRgn
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
CreateRectRgnIndirect
LPtoDP
GetPixel
GetLayout
ExcludeClipRect
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
PtInRegion
BitBlt
FillRgn
FrameRgn
ScaleWindowExtEx
PtVisible
ExtSelectClipRgn
SelectPalette
SetROP2
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
Escape
SetViewportExtEx
GetWindowExtEx
PatBlt
CreatePen
GetClipBox
Rectangle
GetDeviceCaps
LineTo
DeleteDC
GetMapMode
CreateFontIndirectW
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
SetPaletteEntries
CreateBitmap
RectVisible
GetStockObject
SelectClipRgn
SetWindowOrgEx
GetViewportExtEx
GetTextExtentPoint32W
CreatePolygonRgn
Polygon
GetRgnBox
SaveDC
RestoreDC
CreateDIBSection
SetTextColor
ExtFloodFill
GetCurrentObject
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
CreateRoundRectRgn
CreateCompatibleDC
CreateRectRgn
SelectObject
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
CreateSolidBrush
Polyline
DPtoLP
Ellipse
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
DeactivateActCtx
WaitForSingleObject
GetDriveTypeA
EncodePointer
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
InterlockedExchange
FindResourceExW
FormatMessageW
GetSystemTimeAsFileTime
ReleaseActCtx
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
GetProfileIntW
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
MoveFileW
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
PeekNamedPipe
GlobalFindAtomW
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
HeapSetInformation
CreateActCtxW
SetThreadPriority
ActivateActCtx
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetPrivateProfileStringW
FormatMessageA
CreateEventW
GlobalAddAtomW
CreateThread
GetSystemDefaultUILanguage
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SearchPathW
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
InterlockedIncrement
GetNumberFormatW
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetSystemTime
SetHandleCount
TerminateThread
LoadLibraryW
GlobalGetAtomNameW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
CopyFileW
GlobalSize
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetPrivateProfileIntW
GetProcessHeap
GetTempFileNameW
GetComputerNameW
WriteFile
CompareStringW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
GetModuleFileNameW
GetFileInformationByHandle
lstrcmpA
FindFirstFileExA
FindNextFileW
GetCurrentThreadId
ResetEvent
FindFirstFileW
DuplicateHandle
GlobalLock
GlobalAlloc
SetEvent
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
ExitProcess
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
GetTimeFormatW
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
WritePrivateProfileStringW
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
LoadLibraryExW
CloseHandle
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
IsValidCodePage
HeapCreate
FindResourceW
SleepEx
CreateProcessW
Sleep
VirtualAlloc
TransparentBlt
AlphaBlend
CreateStdAccessibleObject
AccessibleObjectFromWindow
LresultFromObject
LoadRegTypeLib
OleCreateFontIndirect
SafeArrayAccessData
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
VarBstrFromDate
SysAllocStringLen
SafeArrayUnaccessData
VarBstrCmp
VariantClear
SysAllocString
SafeArrayDestroy
SafeArrayCreate
DispCallFunc
VariantCopy
SafeArrayGetElemsize
VarUdateFromDate
SysFreeString
VariantChangeType
VariantInit
DragQueryFileW
SHBrowseForFolderW
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
ExtractIconExW
SHGetSpecialFolderLocation
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
DragFinish
PathIsUNCW
PathFindFileNameW
ColorRGBToHLS
PathRemoveFileSpecW
ColorHLSToRGB
PathIsDirectoryEmptyW
PathAddBackslashW
PathAppendW
PathFindExtensionW
PathFileExistsW
PathStripToRootW
PathIsDirectoryW
StrFormatByteSizeW
SetFocus
GetMessagePos
SetWindowRgn
RedrawWindow
SetMenuItemBitmaps
LoadBitmapW
SetRectEmpty
GetParent
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
EndPaint
WindowFromPoint
CopyRect
DrawIcon
GetMessageTime
SendMessageW
SetActiveWindow
DispatchMessageW
GetAsyncKeyState
MapDialogRect
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
GetMenuItemInfoW
DefMDIChildProcW
SetMenuDefaultItem
SetScrollPos
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
TrackPopupMenu
ClientToScreen
GetTopWindow
OpenClipboard
GetWindowTextW
SetDlgItemTextW
LockWindowUpdate
GetWindowTextLengthW
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
DrawTextW
GetKeyState
DestroyWindow
DrawEdge
CopyAcceleratorTableW
UpdateWindow
GetPropW
EqualRect
SetClassLongW
ShowScrollBar
MapVirtualKeyExW
GetMessageW
GetDoubleClickTime
DrawFrameControl
GetNextDlgGroupItem
SetPropW
EnumDisplayMonitors
PeekMessageW
TranslateMDISysAccel
InsertMenuItemW
SetWindowPlacement
GetDC
CharUpperW
LoadIconW
EnableWindow
GetMenuCheckMarkDimensions
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
SetClipboardData
GetIconInfo
SetParent
RegisterClassW
FindWindowExW
IsZoomed
GetWindowPlacement
SetWindowLongW
DrawMenuBar
IsCharLowerW
IsIconic
InvertRect
TrackPopupMenuEx
DrawFocusRect
SetTimer
GetActiveWindow
IsDialogMessageW
FillRect
MonitorFromPoint
SetWindowContextHelpId
DeferWindowPos
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
GetUpdateRect
GetWindowInfo
CharNextW
IsChild
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
DrawAnimatedRects
EmptyClipboard
PostMessageA
BeginPaint
OffsetRect
DefWindowProcW
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
GetClassInfoExW
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
EnumChildWindows
GetScrollRange
CreateIconIndirect
SendDlgItemMessageW
PostMessageW
InvalidateRect
CheckDlgButton
DrawTextExW
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
PtInRect
DrawIconEx
CharUpperBuffW
SetWindowTextW
CreateMenu
GetDlgItem
RemovePropW
BringWindowToTop
FindWindowW
ScreenToClient
GetScrollInfo
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
AttachThreadInput
DestroyAcceleratorTable
GetMenuState
SetWindowsHookExW
LoadCursorW
GetSystemMenu
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
GetClientRect
NotifyWinEvent
GetMenuStringW
GetCursorPos
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
SetLayeredWindowAttributes
EndDialog
HideCaret
GetKeyboardLayout
CreateAcceleratorTableW
GetCapture
ShowWindow
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
DefFrameProcW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
CopyImage
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
TrackMouseEvent
DestroyIcon
ShowOwnedPopups
WinHelpW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CallWindowProcW
GetClassNameW
ModifyMenuW
ValidateRect
IsRectEmpty
IsMenu
GetFocus
wsprintfW
CloseClipboard
IsWindowVisible
SetCursor
SetMenu
TranslateAcceleratorW
GetFileVersionInfoW
GetFileVersionInfoSizeW
DeleteUrlCacheEntryW
PlaySoundW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
getaddrinfo
ioctlsocket
WSAStartup
freeaddrinfo
connect
getsockname
htons
getpeername
WSAGetLastError
gethostname
getsockopt
closesocket
send
ntohs
select
__WSAFDIsSet
WSACleanup
WSASetLastError
recv
setsockopt
socket
bind
ReportFault
GdipBitmapLockBits
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleUninitialize
CoUninitialize
OleTranslateAccelerator
OleLockRunning
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
CreateStreamOnHGlobal
OleFlushClipboard
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
RevokeDragDrop
CoRegisterMessageFilter
OleGetClipboard
OleDuplicateData
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
StgCreateDocfileOnILockBytes
CoInitialize
OleInitialize
CoLockObjectExternal
CoCreateInstance
CoInitializeEx
OleCreateMenuDescriptor
CoTaskMemAlloc
CoRevokeClassObject
CLSIDFromProgID
CoFreeUnusedLibraries
IsAccelerator
OleIsCurrentClipboard
CoTaskMemFree
OleUIBusyW
URLDownloadToFileW
PE exports
Number of PE resources by type
RT_ICON 82
RT_GROUP_ICON 61
RT_DIALOG 30
RT_STRING 24
RT_BITMAP 2
RT_HTML 1
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 203
PE resources
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.5.14.9

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

InitializedDataSize
1816064

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Copyright 2011 T-App Ltd. All rights reserved.

FileVersion
0.5.14.9

TimeStamp
2012:04:23 21:19:49+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
PickMeApp.exe

FileAccessDate
2014:06:16 05:52:37+01:00

ProductVersion
0.5.14.9

FileDescription
PMA Application

OSVersion
5.1

FileCreateDate
2014:06:16 05:52:37+01:00

OriginalFilename
PickMeApp.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
T-App Ltd.

CodeSize
1704960

ProductName
Pick Me App

ProductVersionNumber
0.5.14.9

EntryPoint
0x16ea39

ObjectFileType
Executable application

File identification
MD5 45ba4d842776b3ce38ac921758820445
SHA1 d990d58b9f70c6a42078a0f9bb4a44fe9123924f
SHA256 6108cf9af7923bb3f57b502c6bdfdb52f5ddf95ca966608483404196847211d4
ssdeep
98304:KCtPJ8YQ/fxeaX8mE7cC0QOJZybnr/Oeiuyisb/rlL1I7p:59AggQnGeiuyisbrlLa7

imphash 65c57709caea6af451b2f02a9e09fd01
File size 3.4 MB ( 3522048 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (88.5%)
Win32 Dynamic Link Library (generic) (4.9%)
Win32 Executable (generic) (3.4%)
Generic Win/DOS Executable (1.5%)
DOS Executable Generic (1.5%)
Tags
peexe

VirusTotal metadata
First submission 2012-05-03 08:00:56 UTC ( 5 years, 8 months ago )
Last submission 2014-06-16 04:52:43 UTC ( 3 years, 7 months ago )
File names file-3888629_exe
PickMeApp.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Searched windows
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.