× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 75156463123a0fd8fc7e7a25be145b340da7c74d26b714246a3b2050ef5e8331
File name: VSTsetup.exe
Detection ratio: 0 / 57
Analysis date: 2015-04-10 22:35:41 UTC ( 3 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150410
AegisLab 20150410
Yandex 20150409
AhnLab-V3 20150410
Alibaba 20150410
ALYac 20150410
Antiy-AVL 20150410
Avast 20150410
AVG 20150410
Avira (no cloud) 20150410
AVware 20150410
Baidu-International 20150410
BitDefender 20150410
Bkav 20150410
ByteHero 20150410
CAT-QuickHeal 20150410
ClamAV 20150410
CMC 20150410
Comodo 20150410
Cyren 20150410
DrWeb 20150410
Emsisoft 20150410
ESET-NOD32 20150410
F-Prot 20150410
F-Secure 20150410
Fortinet 20150410
GData 20150410
Ikarus 20150410
Jiangmin 20150409
K7AntiVirus 20150410
K7GW 20150410
Kaspersky 20150410
Kingsoft 20150410
Malwarebytes 20150410
McAfee 20150410
McAfee-GW-Edition 20150410
Microsoft 20150410
eScan 20150410
NANO-Antivirus 20150410
Norman 20150410
nProtect 20150410
Panda 20150410
Qihoo-360 20150410
Rising 20150410
Sophos AV 20150410
SUPERAntiSpyware 20150410
Symantec 20150410
Tencent 20150410
TheHacker 20150410
TotalDefense 20150410
TrendMicro 20150410
TrendMicro-HouseCall 20150410
VBA32 20150410
VIPRE 20150410
ViRobot 20150410
Zillya 20150409
Zoner 20150410
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT appended, ZIP
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2002-06-06 19:44:46
Entry Point 0x0000FB6D
Number of sections 4
PE sections
Overlays
MD5 07c0cb490dcc7416171e9d6c059d918d
File type data
Offset 143360
Size 47556
Entropy 7.99
PE imports
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
InitCommonControlsEx
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
MoveFileA
GetEnvironmentVariableA
FindClose
InterlockedDecrement
SetLastError
GetSystemTime
InitializeCriticalSection
ExitProcess
FlushFileBuffers
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
SetFileAttributesA
SetUnhandledExceptionFilter
SetEnvironmentVariableA
TerminateProcess
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
IsBadWritePtr
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetProcAddress
CompareStringW
FindFirstFileA
CompareStringA
GetTempFileNameA
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
LCMapStringA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetEnvironmentStrings
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
SetFilePointer
ReadFile
CloseHandle
GetACP
GetVersion
CreateProcessA
WideCharToMultiByte
HeapCreate
VirtualFree
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
SetFocus
wsprintfA
GetSystemMetrics
SetWindowTextA
GetParent
GetWindowRect
DispatchMessageA
EnableWindow
EndDialog
PostMessageA
SendMessageA
DialogBoxParamA
MessageBoxA
PeekMessageA
GetDlgItem
SetWindowLongA
wvsprintfA
TranslateMessage
GetWindowTextA
ShowWindow
SetWindowPos
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
GetOpenFileNameA
Number of PE resources by type
RT_DIALOG 3
RT_ICON 2
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 6
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2002:06:06 20:44:46+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
102400

LinkerVersion
6.0

EntryPoint
0xfb6d

InitializedDataSize
45056

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 789c46bf5860fe84f53d3388a3a06e34
SHA1 5d951350331633e3d3ab559c24017261bec76ad2
SHA256 75156463123a0fd8fc7e7a25be145b340da7c74d26b714246a3b2050ef5e8331
ssdeep
3072:KGD9hJSG2HNid4wPkfMTNsK40FsQ53JrGoO4zFyfdcO/zJBJ:KGdT4w/NsK4d34M1cIJBJ

authentihash fc72ba814fe5af8c489f5be149508aa4f9d37e3303148ecaf98aae2212c09fcf
imphash 4eb79306b9da539ad596276aee5c24f8
File size 186.4 KB ( 190916 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe overlay

VirusTotal metadata
First submission 2015-04-10 22:35:41 UTC ( 3 years, 7 months ago )
Last submission 2016-10-24 15:21:42 UTC ( 2 years ago )
File names VSTsetup.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications