× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c2d3ea7624b77ab73b1fa180265c5d913a4bc1b701f4c58b4064aa40dc9ab4c4
File name: 1342025845-fptsetup.dmg
Detection ratio: 0 / 57
Analysis date: 2015-08-25 23:54:53 UTC ( 3 years, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150826
AegisLab 20150825
Yandex 20150822
AhnLab-V3 20150826
Alibaba 20150826
ALYac 20150826
Antiy-AVL 20150826
Arcabit 20150826
Avast 20150826
AVG 20150825
Avira (no cloud) 20150825
AVware 20150826
Baidu-International 20150825
BitDefender 20150826
Bkav 20150826
ByteHero 20150826
CAT-QuickHeal 20150826
ClamAV 20150825
CMC 20150825
Comodo 20150825
Cyren 20150826
DrWeb 20150826
Emsisoft 20150826
ESET-NOD32 20150825
F-Prot 20150826
F-Secure 20150826
Fortinet 20150826
GData 20150826
Ikarus 20150826
Jiangmin 20150823
K7AntiVirus 20150825
K7GW 20150826
Kaspersky 20150826
Kingsoft 20150826
Malwarebytes 20150826
McAfee 20150826
McAfee-GW-Edition 20150825
Microsoft 20150825
eScan 20150826
NANO-Antivirus 20150826
nProtect 20150825
Panda 20150825
Qihoo-360 20150826
Rising 20150824
Sophos AV 20150826
SUPERAntiSpyware 20150826
Symantec 20150824
Tencent 20150826
TheHacker 20150824
TotalDefense 20150826
TrendMicro 20150826
TrendMicro-HouseCall 20150826
VBA32 20150825
VIPRE 20150826
ViRobot 20150826
Zillya 20150825
Zoner 20150826
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright

Product USB Foot Pedal Tester
File version
Description USB Foot Pedal Tester Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009A58
Number of sections 8
PE sections
Overlays
MD5 4e460a782a0275f083cd5f1610a2c211
File type data
Offset 53248
Size 975300
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
DUTCH 4
ENGLISH US 3
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
17408

EntryPoint
0x9a58

MIMEType
application/octet-stream

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

FileDescription
USB Foot Pedal Tester Setup

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
James M. Voelker

CodeSize
37376

ProductName
USB Foot Pedal Tester

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 a89de4bca3a3b38b6057ae9b3792e0df
SHA1 68deffc4f770a78d697f0cab61ac90459aa33169
SHA256 c2d3ea7624b77ab73b1fa180265c5d913a4bc1b701f4c58b4064aa40dc9ab4c4
ssdeep
24576:v2UzCGsc/u3Jgtgi/1pp5WIfYWNxb9PPM8YaXag:v2Igg2i1p3xmaV

authentihash 1c9578a1b36dda334f63327c62a4adbd6bf79f11a2266a544e6e94b1f0e387a0
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 1004.4 KB ( 1028548 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (77.7%)
Win32 Executable Delphi generic (10.0%)
Win32 Dynamic Link Library (generic) (4.6%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe overlay

VirusTotal metadata
First submission 2009-09-26 08:37:36 UTC ( 9 years, 1 month ago )
Last submission 2015-08-22 17:27:05 UTC ( 3 years, 3 months ago )
File names output.12291873.txt
12291873
fptsetup.exe
aa
file-2014472_swat
14A6205AC44CA605B1650F7FD347C7006C4CA3A3.exe
1342025845-fptsetup.dmg
a89de4bca3a3b38b6057ae9b3792e0df.68deffc4f770a78d697f0cab61ac90459aa33169
pFGdp5azg.vsd
fptsetup.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!