× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: be21c3f44826c81fa7f11d04d5ed3cd2f67443f1008e68e93d0b70ef32fc84cc
File name: 1270427766.SubFileSetup.exe
Detection ratio: 38 / 45
Analysis date: 2012-12-11 00:56:16 UTC ( 5 years, 7 months ago )
Antivirus Result Update
Yandex Trojan.DL.Agent!JFsDpqyLyA4 20121210
AhnLab-V3 Downloader/Win32.Titill 20121210
AntiVir TR/Dldr.A120320 20121210
Avast Win32:Malware-gen 20121211
AVG Downloader.Generic9.BNRI 20121211
BitDefender Trojan.Generic.3618334 20121210
CAT-QuickHeal Trojan.Agent.WD.cw4 20121210
ClamAV Win.Trojan.Agent-20248 20121210
Commtouch W32/Agent.IXL 20121211
Comodo TrojWare.Win32.TrojanDownloader.Agent.~ZCO 20121211
DrWeb Trojan.DownLoad1.51340 20121211
Emsisoft Trojan.Downloader.Win32.Agent.dkpw.AMN (A) 20121211
ESET-NOD32 Win32/Agent.QZE 20121210
F-Prot W32/Agent.IXL 20121211
F-Secure Trojan.Generic.3618334 20121210
Fortinet PossibleThreat 20121211
GData Trojan.Generic.3618334 20121211
Ikarus Trojan-Downloader.A120320 20121210
Jiangmin TrojanDownloader.Agent.cirb 20121210
K7AntiVirus Trojan-Downloader 20121210
Kaspersky Trojan-Downloader.Win32.Agent.dkpw 20121211
Malwarebytes Trojan.Downloader 20121211
McAfee Artemis!AAFEA5955AC1 20121211
McAfee-GW-Edition Artemis!AAFEA5955AC1 20121211
Microsoft TrojanDownloader:Win32/Troxen!rts 20121211
NANO-Antivirus Trojan.Win32.Downloader.rqmf 20121211
Norman W32/DLoader.AHTAK 20121210
nProtect Trojan.Generic.3618334 20121210
Panda Trj/Agent.NNP 20121210
Rising Trojan.Win32.Generic.12E06375 20121210
Sophos AV Mal/Generic-L 20121210
Symantec Downloader 20121211
TheHacker Trojan/Downloader.Agent.dkpw 20121210
TrendMicro TROJ_AGENT.AWBA 20121211
TrendMicro-HouseCall TROJ_AGENT.AWBA 20121211
VBA32 TrojanDownloader.Agent.dkpw 20121210
VIPRE Trojan.Win32.Generic!BT 20121211
ViRobot Trojan.Win32.Downloader.237568.Q 20121210
Antiy-AVL 20121204
ByteHero 20121130
eSafe 20121210
Kingsoft 20121210
eScan 20121211
SUPERAntiSpyware 20121211
TotalDefense 20121210
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-03-26 15:35:17
Entry Point 0x0000E054
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
CloseServiceHandle
RegOpenKeyA
RegCloseKey
OpenServiceA
RegSetValueExA
CreateServiceA
QueryServiceStatus
RegQueryValueExA
RegQueryValueA
ControlService
RegOpenKeyExA
ChangeServiceConfig2A
RegCreateKeyExA
DeleteService
RegEnumKeyA
OpenSCManagerA
GetWindowExtEx
SetMapMode
GetRgnBox
SaveDC
TextOutA
CreateRectRgnIndirect
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
DeleteObject
SetTextColor
GetObjectA
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
ExtSelectClipRgn
Escape
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
GetTextColor
SelectObject
GetViewportExtEx
GetBkColor
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
HeapDestroy
lstrcmpW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
EnumResourceLanguagesA
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GlobalFindAtomA
ExitProcess
GetVersionExA
GetModuleFileNameA
GetVolumeInformationA
SetThreadPriority
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
GlobalAddAtomA
SetUnhandledExceptionFilter
ConvertDefaultLocale
MulDiv
GetSystemDirectoryA
SetEnvironmentVariableA
SetPriorityClass
TerminateProcess
VirtualQuery
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetProcAddress
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
DuplicateHandle
GlobalLock
GlobalAlloc
GetTimeZoneInformation
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetVersion
FreeResource
SizeofResource
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
Ord(12)
Ord(10)
Ord(8)
Ord(184)
Ord(6)
Ord(150)
Ord(7)
Ord(4)
Ord(16)
Ord(420)
Ord(2)
Ord(9)
PathFindFileNameA
PathFindExtensionA
PathIsUNCA
PathStripToRootA
MapWindowPoints
GetMessagePos
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
CopyAcceleratorTableA
GetTopWindow
GetActiveWindow
GetWindowTextA
InvalidateRgn
DestroyWindow
IsRectEmpty
GetParent
UpdateWindow
SetPropA
EqualRect
GetMenuState
GetClassInfoExA
ShowWindow
GetPropA
GetNextDlgGroupItem
ValidateRect
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetWindowLongA
CreateWindowExA
ShowOwnedPopups
CopyRect
GetSysColorBrush
ReleaseDC
PtInRect
IsChild
IsDialogMessageA
SetFocus
GetMessageA
PostMessageA
BeginPaint
OffsetRect
DrawIcon
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
SetCapture
ReleaseCapture
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetSubMenu
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
GetDesktopWindow
GetMenuItemID
SetForegroundWindow
PostThreadMessageA
DrawTextA
IntersectRect
EndDialog
SetWindowContextHelpId
GetCapture
MessageBeep
DrawTextExA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpA
SetRect
InvalidateRect
wsprintfA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetOpenA
HttpQueryInfoA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
GetAdaptersInfo
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
OleFlushClipboard
CLSIDFromProgID
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 13
RT_DIALOG 2
RT_BITMAP 2
RT_VERSION 1
Number of PE resources by language
KOREAN 49
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
86016

ImageVersion
0.0

ProductName
TODO: < >

FileVersionNumber
1.0.0.1

UninitializedDataSize
0

LanguageCode
Korean

FileFlagsMask
0x003f

CharacterSet
Windows, Korea (Shift - KSC 5601)

LinkerVersion
7.1

FileOS
Win32

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0.0.1

TimeStamp
2010:03:26 15:35:17+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
SubFileSetup.exe

ProductVersion
1.0.0.1

FileDescription
TODO: < >

OSVersion
4.0

OriginalFilename
SubFileSetup.exe

LegalCopyright
TODO: (c) < >. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
TODO: < >

CodeSize
159744

FileSubtype
0

ProductVersionNumber
1.0.0.1

EntryPoint
0xe054

ObjectFileType
Executable application

File identification
MD5 aafea5955ac15cc595c0678804b4742a
SHA1 e300f088aef2f0999d30a45ddab04f1a788edc10
SHA256 be21c3f44826c81fa7f11d04d5ed3cd2f67443f1008e68e93d0b70ef32fc84cc
ssdeep
6144:oExhtd3lWgY2GbQ3FZEfDNJgqYaHaian+v4g:oExnd3l7YK3PEJFYsJD

File size 232.0 KB ( 237568 bytes )
File type Win32 EXE
Magic literal
MS-DOS executable PE for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
Tags
peexe

VirusTotal metadata
First submission 2010-03-30 02:59:08 UTC ( 8 years, 3 months ago )
Last submission 2012-12-11 00:56:16 UTC ( 5 years, 7 months ago )
File names PKcjNd.reg
duzn5XWKr.jpg
1270427766.SubFileSetup.exe
aa
Behaviour characterization
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!