× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ab522f7eff1092b0815b6b3b90d8efd09af12dab26219e67858075a496c23aa2
File name: Setup Project64 2.2.exe
Detection ratio: 9 / 54
Analysis date: 2015-11-04 03:25:22 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
AVG BundleApp.MPL 20151104
Baidu-International Adware.Win32.Somoto.Q 20151103
ESET-NOD32 Win32/Somoto.Q potentially unwanted 20151104
K7AntiVirus Adware ( 004b94f11 ) 20151103
K7GW Adware ( 004b94f11 ) 20151103
McAfee Artemis!0E858FBA5D93 20151104
McAfee-GW-Edition Artemis 20151104
NANO-Antivirus Riskware.InnoSetup.Downloader.dvsumk 20151104
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20151103
Ad-Aware 20151104
AegisLab 20151103
Yandex 20151102
AhnLab-V3 20151103
Alibaba 20151104
ALYac 20151104
Antiy-AVL 20151104
Arcabit 20151104
Avast 20151104
Avira (no cloud) 20151104
AVware 20151104
BitDefender 20151104
Bkav 20151104
ByteHero 20151104
CAT-QuickHeal 20151103
ClamAV 20151103
CMC 20151102
Comodo 20151104
Cyren 20151104
DrWeb 20151104
Emsisoft 20151104
F-Prot 20151104
F-Secure 20151103
Fortinet 20151104
GData 20151104
Ikarus 20151104
Jiangmin 20151104
Kaspersky 20151104
Malwarebytes 20151104
Microsoft 20151104
eScan 20151104
nProtect 20151103
Panda 20151103
Sophos AV 20151104
SUPERAntiSpyware 20151104
Symantec 20151103
Tencent 20151104
TheHacker 20151103
TrendMicro 20151104
TrendMicro-HouseCall 20151104
VBA32 20151103
VIPRE 20151104
ViRobot 20151104
Zillya 20151103
Zoner 20151104
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright

Product Project 64
File version 2.2.0.3
Description Installation Setup of Project64 2.2
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-12-20 14:16:50
Entry Point 0x00016478
Number of sections 8
PE sections
Overlays
MD5 2f5284c444e166d190ec590f92de290a
File type data
Offset 162816
Size 2970108
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_ICON 6
RT_STRING 6
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 10
NEUTRAL 9
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
75776

ImageVersion
6.0

ProductName
Project 64

FileVersionNumber
2.2.0.3

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

LinkerVersion
2.25

FileTypeExtension
exe

MIMEType
application/octet-stream

FileVersion
2.2.0.3

TimeStamp
2011:12:20 15:16:50+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2.2.0.3

FileDescription
Installation Setup of Project64 2.2

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
86016

FileSubtype
0

ProductVersionNumber
2.2.0.3

EntryPoint
0x16478

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 0e858fba5d93fb9bfd982c2a3de67a3e
SHA1 5b95315844b22672c2e867d8e3d45d9f05ed2016
SHA256 ab522f7eff1092b0815b6b3b90d8efd09af12dab26219e67858075a496c23aa2
ssdeep
49152:DaNnbgiV0lk7sqae0V27o0U3t/ie3ZdUImtJtkR7Yoc9CFXa/Bf4AZhZgzXp:Wtgqt7shZ0U3oj5JtkRNc6tAZhUZ

authentihash 27d38e5567dc6ea879648be69ea58dfccdac431c7085cb952db9cf7afd17de8a
imphash 483f0c4259a9148c34961abbda6146c1
File size 3.0 MB ( 3132924 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (80.3%)
Win32 Executable Delphi generic (10.3%)
Win32 Executable (generic) (3.3%)
Win16/32 Executable Delphi generic (1.5%)
OS/2 Executable (generic) (1.4%)
Tags
peexe via-tor overlay

VirusTotal metadata
First submission 2015-04-01 11:03:34 UTC ( 3 years, 6 months ago )
Last submission 2018-05-08 20:15:41 UTC ( 5 months, 2 weeks ago )
File names 未確認 699072.exe
Setup Project64 2.2.exe
Unconfirmed 85532.crdownload
setup Project64 2.2.exe
Unconfirmed 799681.exe
Setup_Project64_2.2.exe
Setup Project64 2.2 (2).exe
Setup Project64 2.2 (1).exe
Project64 2.2 (pj64-emu.com [01 2 2015 oficial]).exe
Project64-2.2.exe
Niet bevestigd 319426.exe
ab522f7eff1092b0815b6b3b90d8efd09af12dab26219e67858075a496c23aa2.bin
Setup Project64 2.2-try2.exe
setup Project64 2.2.exe
filename
0E858FBA5D93FB9BFD982C2A3DE67A3E
VirusShare_0e858fba5d93fb9bfd982c2a3de67a3e
Setup Project64 2.2.exe
ab522f7eff1092b0815b6b3b90d8efd09af12dab26219e67858075a496c23aa2.exe
Project64 v2.2 Win.exe
project64.exe
project64-2.2.exe
Не подтвержден 5051.exe
Setup Project64 2.2.exe.part
setup Project64 2.2.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
HTTP requests
DNS requests
TCP connections