× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8a720e67e8a2078588e3ba85450d83c94de1f4cb0e8fb4632f3d1366bb9f6bee
File name: toplu_sms_programi_demo.exe
Detection ratio: 1 / 55
Analysis date: 2017-01-23 13:06:30 UTC ( 2 years, 3 months ago )
Antivirus Result Update
TheHacker Trojan/Dropper.Agent.afd 20170117
Ad-Aware 20170123
AegisLab 20170123
AhnLab-V3 20170123
Alibaba 20170122
ALYac 20170123
Antiy-AVL 20170123
Arcabit 20170123
Avast 20170123
AVG 20170123
Avira (no cloud) 20170123
AVware 20170123
Baidu 20170123
BitDefender 20170123
CAT-QuickHeal 20170123
ClamAV 20170123
CMC 20170123
Comodo 20170123
CrowdStrike Falcon (ML) 20161024
Cyren 20170123
DrWeb 20170123
Emsisoft 20170123
ESET-NOD32 20170123
F-Prot 20170123
F-Secure 20170123
Fortinet 20170123
GData 20170123
Ikarus 20170123
Sophos ML 20170111
Jiangmin 20170123
K7AntiVirus 20170123
K7GW 20170123
Kaspersky 20170123
Kingsoft 20170123
Malwarebytes 20170123
McAfee 20170123
McAfee-GW-Edition 20170123
Microsoft 20170123
eScan 20170123
NANO-Antivirus 20170123
nProtect 20170123
Panda 20170122
Qihoo-360 20170123
Rising 20170123
Sophos AV 20170123
SUPERAntiSpyware 20170123
Symantec 20170122
Tencent 20170123
TrendMicro 20170123
TrendMicro-HouseCall 20170123
Trustlook 20170123
VBA32 20170123
VIPRE 20170123
ViRobot 20170123
WhiteArmor 20170123
Yandex 20170122
Zillya 20170120
Zoner 20170123
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2001 - 2002 Indigo Rose Corporation

Product setup
Original name setup.exe
Internal name setup
File version 6.0.1.2
Description Setup Factory 6.0 Setup Launcher
Comments This setup code is the property of Indigo Rose Corporation
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2002-09-23 19:04:04
Entry Point 0x00002821
Number of sections 4
PE sections
Overlays
MD5 97cd1335ebeac607adec85ac36237db0
File type data
Offset 73728
Size 8620145
Entropy 7.97
PE imports
GetDeviceCaps
SelectObject
CreateFontA
SetBkMode
GetLastError
HeapFree
GetStdHandle
LCMapStringW
SetHandleCount
lstrlenA
GetFileAttributesA
GetOEMCP
LCMapStringA
HeapReAlloc
HeapDestroy
HeapAlloc
GetEnvironmentStringsW
_lclose
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
GetCurrentProcess
_lwrite
GetEnvironmentStrings
GetPrivateProfileStringA
WritePrivateProfileStringA
lstrcatA
CreateDirectoryA
DeleteFileA
WideCharToMultiByte
UnhandledExceptionFilter
_llseek
FreeEnvironmentStringsW
MultiByteToWideChar
GetProcAddress
_lread
GetStartupInfoA
GetSystemDefaultLangID
GetTempPathA
GetCPInfo
GetStringTypeA
_lcreat
lstrcmpA
WriteFile
_lopen
CloseHandle
GetCommandLineA
GetACP
GetDiskFreeSpaceA
GetStringTypeW
TerminateProcess
CreateProcessA
HeapCreate
lstrcpyA
VirtualFree
GetFileType
ExitProcess
GetVersion
VirtualAlloc
SetCurrentDirectoryA
GetModuleHandleA
GetMessageA
UpdateWindow
BeginPaint
PostQuitMessage
DefWindowProcA
ShowWindow
GetWindowRect
DispatchMessageA
EndPaint
PostMessageA
MessageBoxA
PeekMessageA
TranslateMessage
RegisterClassExA
DrawTextA
LoadStringA
SendMessageA
GetClientRect
RegisterClassA
wsprintfA
CreateWindowExA
LoadCursorA
LoadIconA
GetDesktopWindow
MsgWaitForMultipleObjects
DestroyWindow
Number of PE resources by type
RT_BITMAP 1
RT_STRING 1
RT_VERSION 1
RT_GROUP_ICON 1
RT_ICON 1
Number of PE resources by language
ENGLISH US 5
PE resources
ExifTool file metadata
LegalTrademarks
Setup Factory is a trademark of Indigo Rose Corporation.

SubsystemVersion
4.0

Comments
This setup code is the property of Indigo Rose Corporation

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.0.1.2

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Setup Factory 6.0 Setup Launcher

CharacterSet
Windows, Latin1

InitializedDataSize
53248

EntryPoint
0x2821

OriginalFileName
setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2001 - 2002 Indigo Rose Corporation

FileVersion
6.0.1.2

TimeStamp
2002:09:23 20:04:04+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup

ProductVersion
6.0.1.2

UninitializedDataSize
0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Indigo Rose Corporation http://www.indigorose.com

CodeSize
20480

ProductName
setup

ProductVersionNumber
6.0.1.2

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 b5f3c9071a8ee1f175e44a36f055e129
SHA1 97d2d0fa97c699ecd9ea6e521a03da9145ada820
SHA256 8a720e67e8a2078588e3ba85450d83c94de1f4cb0e8fb4632f3d1366bb9f6bee
ssdeep
196608:vF8k1zLgvNA7mXZzzMX5x2r8smvjxjmgMn9GnU41AEs0:98YLgvN+Epg5u8sm7Ugc9Gn7T

authentihash d09a8ee85295c099328ad6ec00cae38ad76f6bf41741b1e4f53404a781e4ee29
imphash d02b258601410d6bdc58dda2cbe5f615
File size 8.3 MB ( 8693873 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (22.1%)
Win64 Executable (generic) (19.6%)
UPX compressed Win32 Executable (19.2%)
Win32 EXE Yoda's Crypter (18.8%)
Windows screen saver (9.3%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2012-12-18 02:28:05 UTC ( 6 years, 5 months ago )
Last submission 2017-01-23 13:06:30 UTC ( 2 years, 3 months ago )
File names setup.exe
8a720e67e8a2078588e3ba85450d83c94de1f4cb0e8fb4632f3d1366bb9f6bee
setup
toplu_sms_programi_demo.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created processes
Created mutexes
Opened service managers
Opened services
Hooking activity
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications