× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c1a44af445145ab78c8cab6d41d86545a65b778d6c85dcc4399ff486862fffe0
File name: magent_rfrset_token.exe
Detection ratio: 1 / 55
Analysis date: 2014-10-02 15:44:51 UTC ( 3 years, 10 months ago ) View latest
Antivirus Result Update
Antiy-AVL Trojan[Backdoor]/Win32.Yobdam 20141002
Ad-Aware 20141002
AegisLab 20141002
Yandex 20141001
AhnLab-V3 20141002
Avast 20141002
AVG 20141002
Avira (no cloud) 20141002
AVware 20141002
Baidu-International 20141002
BitDefender 20141002
Bkav 20141002
ByteHero 20141002
CAT-QuickHeal 20141001
ClamAV 20141002
CMC 20140930
Comodo 20141002
Cyren 20141002
DrWeb 20141002
Emsisoft 20141002
ESET-NOD32 20141002
F-Prot 20140930
F-Secure 20141002
Fortinet 20141002
GData 20141002
Ikarus 20141002
Jiangmin 20141001
K7AntiVirus 20141001
K7GW 20141001
Kaspersky 20141002
Kingsoft 20141002
Malwarebytes 20141002
McAfee 20141002
McAfee-GW-Edition 20141001
Microsoft 20141002
eScan 20141002
NANO-Antivirus 20141002
Norman 20141002
nProtect 20141002
Panda 20141002
Qihoo-360 20141002
Rising 20141002
Sophos AV 20141002
SUPERAntiSpyware 20141002
Symantec 20141002
Tencent 20141002
TheHacker 20141001
TotalDefense 20141001
TrendMicro 20141002
TrendMicro-HouseCall 20141002
VBA32 20141002
VIPRE 20141002
ViRobot 20141002
Zillya 20141002
Zoner 20140929
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2001 - 2014

Product Mail.Ru Агент
Original name magentsetup.exe
Internal name magent
File version 6, 3, 8065, 0
Description Mail.Ru Агент
Signature verification Signed file, verified signature
Signing date 3:16 PM 9/30/2014
Signers
[+] LLC Mail.Ru
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Code Signing CA - G2
Valid from 1:00 AM 3/19/2014
Valid to 12:59 AM 3/20/2015
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha1RSA
Thumbprint 3E8B52F1210757D3880CB5E6F55FC7F997E539FB
Serial number 7B B5 DE C9 9F 34 59 5A AD EB 59 E1 E5 A0 BD 73
[+] Thawte Code Signing CA - G2
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 808D62642B7D1C4A9A83FD667F7A2A9D243FB1C7
Serial number 47 97 4D 78 73 A5 BC AB 0D 2F B3 70 19 2F CE 5E
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-09-30 14:16:48
Entry Point 0x002BB6FF
Number of sections 5
PE sections
Overlays
MD5 56615dba2b75bf07f57257ff1cde7e62
File type data
Offset 36154880
Size 6688
Entropy 7.41
PE imports
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
ConvertSidToStringSidW
RegCreateKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
RegSetValueW
RegQueryValueExW
GetFileSecurityW
ConvertStringSidToSidW
OpenProcessToken
DeregisterEventSource
RegEnumKeyW
SetFileSecurityW
RegisterEventSourceA
SetTokenInformation
RegOpenKeyW
LookupAccountNameW
RegQueryValueW
GetTokenInformation
DuplicateTokenEx
GetUserNameW
RegQueryInfoKeyW
RegDeleteValueW
RegEnumKeyExW
OpenThreadToken
GetLengthSid
CreateProcessAsUserW
RegEnumValueW
RegSetValueExW
EqualSid
ReportEventA
SetDIBits
GetTextMetricsW
SetMapMode
GetWindowOrgEx
GetNearestColor
SetICMMode
CombineRgn
PlayMetaFile
GetROP2
GetClipRgn
GetViewportOrgEx
GetObjectType
CreateMetaFileW
SetColorAdjustment
GetBoundsRect
SetLayout
SetPixel
EndDoc
DeleteObject
SetPaletteEntries
OffsetWindowOrgEx
CreateEllipticRgn
GetColorSpace
GetTextFaceW
CreatePalette
CreateDIBitmap
GetPolyFillMode
GetDIBits
SetTextAlign
StretchBlt
StretchDIBits
ScaleViewportExtEx
ArcTo
GetPaletteEntries
SetWindowExtEx
ExtCreatePen
SetBkColor
GetBkColor
SetRectRgn
AddFontResourceW
GetTextCharsetInfo
TextOutW
GetSystemPaletteEntries
OffsetRgn
GetCurrentPositionEx
CreateRectRgnIndirect
LPtoDP
GetBitmapBits
GetLayout
PolyDraw
CloseMetaFile
OffsetViewportOrgEx
SetBkMode
EnumFontFamiliesW
CreateBitmap
PtInRegion
OffsetClipRgn
BitBlt
GetDeviceCaps
FillRgn
SetAbortProc
FrameRgn
ScaleWindowExtEx
PtVisible
GetLogColorSpaceW
ExtSelectClipRgn
SelectPalette
SetROP2
EndPage
GetNearestPaletteIndex
SetDIBColorTable
GetTextColor
SetPixelV
SetViewportExtEx
SetGraphicsMode
PlayMetaFileRecord
GetWindowExtEx
PatBlt
CreatePen
GetCharWidthW
SetStretchBltMode
Rectangle
Polygon
GetObjectA
CreateDCA
LineTo
DeleteDC
SetWorldTransform
GetMapMode
CreateFontIndirectW
EnumMetaFile
StartPage
GetObjectW
CreateDCW
RealizePalette
CreateHatchBrush
CreatePatternBrush
ExtTextOutW
IntersectClipRect
SelectClipPath
RectVisible
GetStockObject
GetBkMode
GdiFlush
SelectClipRgn
RoundRect
GetTextAlign
SetWindowOrgEx
SelectObject
GetViewportExtEx
SetTextCharacterExtra
GetTextExtentPoint32W
CreateDIBPatternBrushPt
CreatePolygonRgn
PolylineTo
GetRgnBox
SaveDC
ModifyWorldTransform
RestoreDC
GetPixel
SetMapperFlags
CreateSolidBrush
SetDIBitsToDevice
CreateDIBSection
GdiAlphaBlend
SetTextColor
ExtFloodFill
GetCurrentObject
ExcludeClipRect
GetClipBox
MoveToEx
EnumFontFamiliesExW
SetViewportOrgEx
SetArcDirection
CreateRoundRectRgn
CreateCompatibleDC
PolyBezierTo
CreateFontW
SetBrushOrgEx
CreateRectRgn
Escape
StartDocW
SetPolyFillMode
CopyMetaFileW
CreateCompatibleBitmap
SetTextJustification
GetStretchBltMode
Polyline
DPtoLP
AbortDoc
Ellipse
DeleteMetaFile
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
SetEvent
FindFirstFileW
HeapDestroy
EncodePointer
ReplaceFileW
GetFileAttributesW
lstrcmpW
VerifyVersionInfoW
CreatePipe
GetCurrentProcess
GetConsoleMode
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
_llseek
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetDiskFreeSpaceW
InterlockedExchange
GetTempPathW
FormatMessageW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
GetProfileIntW
ResumeThread
CreateEventW
OutputDebugStringW
GlobalHandle
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
GetPrivateProfileSectionNamesW
OutputDebugStringA
GetCurrentThread
GetEnvironmentVariableW
SetLastError
GetUserDefaultUILanguage
PeekNamedPipe
InitializeCriticalSection
LocalLock
LoadResource
RemoveDirectoryW
TryEnterCriticalSection
IsDebuggerPresent
HeapAlloc
GetSystemDefaultLCID
GetStringTypeExW
GetVersionExA
LoadLibraryA
GetSystemDefaultLangID
VerSetConditionMask
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesW
InterlockedDecrement
MultiByteToWideChar
FatalAppExitA
SetFilePointerEx
GlobalMemoryStatus
GetPrivateProfileStringW
SetFilePointer
_lclose
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
MoveFileExW
GetSystemDefaultUILanguage
DeleteCriticalSection
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
GetNumberOfConsoleInputEvents
TerminateProcess
SearchPathW
GetModuleHandleExW
SetCurrentDirectoryW
VirtualQuery
CopyFileW
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
ReadConsoleW
GetVersion
GetProcAddress
WriteConsoleW
CreateToolhelp32Snapshot
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetSystemTime
TerminateThread
LoadLibraryW
GetLastError
GetVersionExW
GetOEMCP
QueryPerformanceCounter
ReadConsoleInputA
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
FreeLibrary
GlobalFindAtomW
GlobalSize
LeaveCriticalSection
UnlockFile
FlushConsoleInputBuffer
GetWindowsDirectoryW
SetHandleInformation
GetFileSize
GlobalDeleteAtom
OpenProcess
GetModuleHandleW
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
WaitForMultipleObjects
_lread
GetProcessHeap
GetTempFileNameW
WriteFile
GetTimeFormatW
lstrcpyW
GetFileSizeEx
GlobalReAlloc
GetModuleFileNameW
GetFileInformationByHandle
lstrcmpA
FindFirstFileExA
FindNextFileW
CompareStringA
FindNextFileA
IsValidLocale
DuplicateHandle
FindFirstFileExW
GlobalLock
GlobalAlloc
GetPrivateProfileIntW
GetTimeZoneInformation
CreateFileW
CopyFileA
GetFileType
TlsSetValue
ExitProcess
LocalUnlock
InterlockedIncrement
GlobalGetAtomNameW
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
FindResourceW
CompareStringW
GetThreadLocale
GetVolumeInformationW
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
Process32NextW
OpenFile
Module32FirstW
_lwrite
SizeofResource
GetCurrentDirectoryW
HeapSize
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
GetAtomNameW
CreateSemaphoreW
Process32FirstW
WritePrivateProfileStringW
SuspendThread
ExpandEnvironmentStringsW
RaiseException
TlsFree
GetModuleHandleA
ReadFile
SetEndOfFile
GlobalFlags
LoadLibraryExW
FindFirstFileA
CloseHandle
PeekConsoleInputA
GetACP
GetCurrentThreadId
FreeResource
FileTimeToLocalFileTime
GetFileAttributesExW
GetLocalTime
IsValidCodePage
SetConsoleMode
FindResourceExW
CreateProcessW
Sleep
SetThreadPriority
SystemTimeToTzSpecificLocalTime
OpenSemaphoreW
VirtualAlloc
ResetEvent
TransparentBlt
AlphaBlend
NetUserEnum
NetUserGetInfo
NetApiBufferFree
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
SysStringLen
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SafeArrayDestroyData
OleCreateFontIndirect
SysAllocString
SafeArrayCreate
SafeArrayAllocDescriptor
VariantCopy
SafeArrayGetElemsize
VariantInit
SafeArrayAllocData
CreateErrorInfo
SafeArrayAccessData
SafeArrayGetLBound
VarBstrFromDate
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayGetUBound
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SafeArrayLock
LoadRegTypeLib
VariantChangeType
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayDestroyDescriptor
VarBstrFromCy
VarCyFromStr
SafeArrayRedim
SafeArrayCopy
SetErrorInfo
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocStringLen
RegisterTypeLib
VariantClear
SysReAllocStringLen
OleLoadPicture
VarDateFromStr
GetErrorInfo
SafeArrayGetDim
SafeArrayPutElement
EnumProcesses
GetModuleBaseNameW
GetProcessImageFileNameW
EnumProcessModules
GetModuleFileNameExW
RpcBindingFree
NdrClientCall2
RpcBindingFromStringBindingW
RpcStringBindingComposeW
UuidCreate
RpcBindingSetOption
RpcStringFreeW
SHGetFolderPathW
SHCreateDirectoryExW
SHBrowseForFolderW
DragQueryFileW
Ord(680)
SHGetDesktopFolder
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
FindExecutableW
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
ExtractIconW
SHAddToRecentDocs
SHGetSpecialFolderPathW
SHGetMalloc
CommandLineToArgvW
DragFinish
PathIsRelativeW
SHDeleteKeyW
PathFindFileNameW
SHStrDupW
PathRemoveFileSpecW
PathIsUNCW
PathFindExtensionW
StrFormatKBSizeW
SHDeleteValueW
PathStripToRootW
AssocQueryStringW
PathIsRootW
PathIsDirectoryW
PathRemoveExtensionW
RedrawWindow
GetMessagePos
SetWindowRgn
SetMenuItemBitmaps
LoadBitmapW
MoveWindow
EnableScrollBar
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
GetNextDlgTabItem
IsWindow
GrayStringW
ScreenToClient
ScrollWindowEx
WindowFromPoint
IntersectRect
GetMessageTime
SetMenuItemInfoW
SendMessageW
SetActiveWindow
DispatchMessageW
GetAsyncKeyState
MapDialogRect
GetMenuStringW
GetMenu
UnregisterClassW
GetClassInfoW
CreateAcceleratorTableW
DefWindowProcW
GetDlgItemTextW
SetScrollPos
InSendMessage
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
GetKeyboardState
GetActiveWindow
OpenClipboard
GetWindowTextW
SetDlgItemTextW
CopyAcceleratorTableW
GetWindowTextLengthW
GetMenuBarInfo
LoadAcceleratorsW
ScrollWindow
InvalidateRgn
DrawTextW
CopyImage
PtInRect
DrawEdge
GetUserObjectInformationW
GetClassInfoExW
UpdateWindow
EnumDisplayMonitors
EqualRect
SetClassLongW
EnumWindows
CheckRadioButton
MapVirtualKeyExW
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
SetDlgItemInt
DefMDIChildProcW
PeekMessageW
SetWindowsHookExW
EnableWindow
SetWindowPlacement
GetDC
CharUpperW
MapWindowPoints
GetSystemMenu
TranslateMessage
IsWindowEnabled
GetWindow
GetMenuDefaultItem
GetDlgItemInt
SetClipboardData
GetTabbedTextExtentW
GetIconInfo
SetParent
RegisterClassW
IsZoomed
IsWindowVisible
DestroyWindow
WindowFromDC
DrawMenuBar
IsCharLowerW
EnableMenuItem
InvertRect
TrackPopupMenuEx
DrawFocusRect
SetTimer
LoadStringW
ShowOwnedPopups
FillRect
MonitorFromPoint
SetWindowContextHelpId
DeferWindowPos
GetDialogBaseUnits
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
EndPaint
GetUpdateRect
CharNextW
GetDoubleClickTime
IsChild
SetFocus
RegisterWindowMessageW
GetMonitorInfoW
ReleaseCapture
EmptyClipboard
BeginPaint
OffsetRect
EndDialog
GetScrollPos
CopyIcon
KillTimer
MapVirtualKeyW
GetComboBoxInfo
SendNotifyMessageW
TranslateAcceleratorW
GetClipboardData
GetParent
ToUnicodeEx
SendDlgItemMessageA
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetMenuDefaultItem
SetCapture
DrawIcon
EnumChildWindows
DrawTextExW
CharLowerW
SendDlgItemMessageW
PostMessageW
MonitorFromRect
GetPropW
CharToOemW
CreateDialogParamW
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
CharUpperBuffW
SetWindowTextW
GetDCEx
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
GetWindowPlacement
ClientToScreen
GetProcessWindowStation
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
IsDlgButtonChecked
DestroyAcceleratorTable
CheckDlgButton
ValidateRect
IsDialogMessageW
LoadCursorW
LoadIconW
ReuseDDElParam
GetMenuItemID
InsertMenuW
SetForegroundWindow
NotifyWinEvent
GetMenuItemInfoW
GetCursorPos
CreateDialogIndirectParamW
ReleaseDC
GetScrollRange
SetLayeredWindowAttributes
GetScrollInfo
ModifyMenuW
HideCaret
GetKeyboardLayout
CopyRect
GetCapture
GetDlgCtrlID
GetShellWindow
SetWindowLongW
MessageBeep
LoadMenuW
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
MessageBoxW
DefFrameProcW
LockWindowUpdate
GetMenuState
RegisterClassExW
SetMenu
SetRectEmpty
DialogBoxParamW
MessageBoxA
AppendMenuW
GetWindowDC
DestroyCursor
AdjustWindowRectEx
SendMessageTimeoutW
GetSysColor
RegisterClipboardFormatW
SetScrollInfo
GetKeyState
EndDeferWindowPos
GetWindowRgn
UpdateLayeredWindow
TrackMouseEvent
DestroyIcon
GetTopWindow
GetWindowLongW
BeginDeferWindowPos
WinHelpW
GetDesktopWindow
SubtractRect
UnpackDDElParam
SetCursorPos
SystemParametersInfoW
UnionRect
MonitorFromWindow
FrameRect
SetRect
DeleteMenu
GetKeyNameTextW
CallWindowProcW
GetClassNameW
InvalidateRect
TranslateMDISysAccel
GetClientRect
IsRectEmpty
IsMenu
GetFocus
CreateMenu
InsertMenuItemW
CloseClipboard
SetCursor
UnhookWindowsHookEx
RemovePropW
IsAppThemed
GetThemeSysColor
GetWindowTheme
GetCurrentThemeName
DrawThemeText
OpenThemeData
DrawThemeParentBackground
CloseThemeData
DrawThemeBackground
GetThemeColor
IsThemeBackgroundPartiallyTransparent
GetThemePartSize
WinHttpGetIEProxyConfigForCurrentUser
FindCloseUrlCache
InternetQueryOptionW
DeleteUrlCacheEntryA
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
InternetSetCookieExW
InternetGetCookieExW
PlaySoundW
ClosePrinter
GetJobW
DocumentPropertiesW
OpenPrinterW
setsockopt
htons
htonl
socket
gethostbyname
closesocket
ntohl
inet_addr
send
WSAEventSelect
ioctlsocket
WSAEnumNetworkEvents
ntohs
select
inet_ntoa
WSACreateEvent
recv
getnameinfo
WSAGetLastError
connect
recvfrom
getsockname
bind
accept
WSAAsyncSelect
WSAStartup
shutdown
sendto
WSASetLastError
WSACleanup
getpeername
GdipBitmapLockBits
GdipCreateBitmapFromFile
GdipGetImagePixelFormat
GdipCreateBitmapFromScan0
GdiplusShutdown
GdipGetImagePalette
GdipDisposeImage
GdipBitmapUnlockBits
GdiplusStartup
GdipCreateBitmapFromStreamICM
GdipDeleteGraphics
GdipCreateBitmapFromStream
GdipCreateFromHDC
GdipGetImageWidth
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCreateBitmapFromFileICM
GdipGetImagePaletteSize
GdipDrawImageI
GdipDrawImageRectI
GdipSetInterpolationMode
GdipFree
GdipGetImageHeight
GdipCloneImage
GdipGetImageGraphicsContext
OleLockRunning
CoUninitialize
OleCreateLinkFromData
OleCreate
OleTranslateAccelerator
OleUninitialize
OleDestroyMenuDescriptor
DoDragDrop
StgOpenStorageOnILockBytes
StgCreateDocfile
OleDuplicateData
CoInitialize
OleCreateLinkToFile
StringFromGUID2
OleSaveToStream
ReadClassStg
CreateStreamOnHGlobal
CreateItemMoniker
OleFlushClipboard
ReleaseStgMedium
CoCreateGuid
SetConvertStg
OleCreateFromData
GetHGlobalFromILockBytes
OleCreateFromFile
OleRegGetMiscStatus
StringFromCLSID
OleSave
CoRegisterMessageFilter
RevokeDragDrop
ReadFmtUserTypeStg
OleGetClipboard
OleLoad
CLSIDFromString
CreateOleAdviseHolder
CreateILockBytesOnHGlobal
CoGetClassObject
CoRegisterClassObject
OleRegGetUserType
OleInitialize
CoLockObjectExternal
OleCreateStaticFromData
CoCreateInstance
OleRegEnumVerbs
StgOpenStorage
CreateGenericComposite
OleGetIconOfClass
OleRun
WriteClassStm
PropVariantCopy
OleQueryCreateFromData
OleSetContainedObject
StgIsStorageFile
CoInitializeEx
OleQueryLinkFromData
OleSetClipboard
CreateDataAdviseHolder
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
IsAccelerator
GetRunningObjectTable
CLSIDFromProgID
WriteClassStg
CoRevokeClassObject
CoFreeUnusedLibraries
OleIsRunning
CreateBindCtx
CreateFileMoniker
CoDisconnectObject
OleSetMenuDescriptor
OleCreateMenuDescriptor
CoTreatAsClass
CoGetMalloc
OleIsCurrentClipboard
PropVariantClear
CoTaskMemFree
RegisterDragDrop
WriteFmtUserTypeStg
OleUIBusyW
UrlMkGetSessionOption
Number of PE resources by type
RT_ICON 20
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 15
RT_DIALOG 9
GIF 9
RT_GROUP_ICON 4
RT_BITMAP 3
RT_MANIFEST 2
TOKEN 2
FILES 1
XML 1
BMP 1
RT_VERSION 1
LANG 1
Number of PE resources by language
RUSSIAN 99
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

InitializedDataSize
32028160

ImageVersion
0.0

ProductName
Mail.Ru

FileVersionNumber
6.3.8065.0

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
11.0

FileTypeExtension
exe

OriginalFileName
magentsetup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6, 3, 8065, 0

TimeStamp
2014:09:30 15:16:48+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
magent

ProductVersion
6, 3, 8065, 0

FileDescription
Mail.Ru

OSVersion
5.1

FileOS
Win32

LegalCopyright
Copyright (C) 2001 - 2014

MachineType
Intel 386 or later, and compatibles

CompanyName
Mail.Ru

CodeSize
4254208

FileSubtype
0

ProductVersionNumber
6.3.8065.0

EntryPoint
0x2bb6ff

ObjectFileType
Executable application

PE resource-wise parents
Compressed bundles
File identification
MD5 27c1fe08ee6022862719d46627b9489f
SHA1 7bc1573d7216268f8a62122893d2bcb2e95e6880
SHA256 c1a44af445145ab78c8cab6d41d86545a65b778d6c85dcc4399ff486862fffe0
ssdeep
786432:/JhyukHvTVVU8Ja9UcYSLHAvrfQjFNliY4bas/:Bhtk7k8I9UVSLSMj3li3b

authentihash 6ec06bf72dca36e142ca007794d31d9ee85f826a253017e6a53e0fd9ba3bc426
imphash 239ba3182061e455983eee1d60ee4fbd
File size 34.5 MB ( 36161568 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2014-10-01 04:02:52 UTC ( 3 years, 10 months ago )
Last submission 2017-08-04 05:44:05 UTC ( 1 year ago )
File names magent_rfrset_1250.exe
magent_rfrset_navi.exe
magent_rfrset_damigo.exe
Иорх Анатолий.exe
magent_rfrset.exe
magent_rfrset_damigo.exe
magent_rfrset_distramigo.exe
magent_rfrset_token_8065.exe
magent_rfrset_damigo1315.exe
magent_rfrset_token.exe
magent_rfrset_1315.exe
magent_rfrset_token_1290.exe
magent_rfrset_1314.exe
magentsetup_v6_3_8065.exe
magent_6.3.8065.exe
magent_rfrset_1313.exe
555831
magent_rfrset_1316.exe
magent_rfrtoken.exe
magent_rfrset_1311.exe
magent_rfrset_token_navi.exe
magentsetup.exe
6.3.8065.0.exe
magent
magentsetup6_3.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!