× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d30bc5c18e1baab0131666296ddb53860ef20f9d51cb360c5a5ad25ffb896aa8
File name: 335063
Detection ratio: 0 / 57
Analysis date: 2016-04-02 10:51:05 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware 20160402
AegisLab 20160402
AhnLab-V3 20160401
Alibaba 20160401
ALYac 20160402
Antiy-AVL 20160402
Arcabit 20160402
Avast 20160402
AVG 20160402
Avira (no cloud) 20160402
AVware 20160402
Baidu 20160402
Baidu-International 20160402
BitDefender 20160402
Bkav 20160402
CAT-QuickHeal 20160401
ClamAV 20160402
CMC 20160401
Comodo 20160402
Cyren 20160402
DrWeb 20160402
Emsisoft 20160402
ESET-NOD32 20160402
F-Prot 20160402
F-Secure 20160402
Fortinet 20160401
GData 20160402
Ikarus 20160402
Jiangmin 20160402
K7AntiVirus 20160402
K7GW 20160402
Kaspersky 20160402
Kingsoft 20160402
Malwarebytes 20160402
McAfee 20160402
McAfee-GW-Edition 20160402
Microsoft 20160402
eScan 20160402
NANO-Antivirus 20160402
nProtect 20160401
Panda 20160401
Qihoo-360 20160402
Rising 20160402
Sophos AV 20160402
SUPERAntiSpyware 20160402
Symantec 20160331
Tencent 20160402
TheHacker 20160330
TotalDefense 20160330
TrendMicro 20160402
TrendMicro-HouseCall 20160402
VBA32 20160401
VIPRE 20160402
ViRobot 20160402
Yandex 20160316
Zillya 20160401
Zoner 20160402
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2008 Acresso Software Inc. and/or InstallShield Co. Inc. All Rights Reserved.

Product RSS Feed Creator
Original name Setup.exe
Internal name Setup
File version 3.80.00
Description Setup Launcher
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2008-05-10 04:42:42
Entry Point 0x00032077
Number of sections 4
PE sections
Overlays
MD5 072fcb19536ae56bec865ac9d053bc66
File type data
Offset 458752
Size 1849731
Entropy 8.00
PE imports
SetSecurityDescriptorOwner
GetTokenInformation
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
EqualSid
OpenProcessToken
AdjustTokenPrivileges
FreeSid
SetSecurityDescriptorDacl
RegQueryValueExA
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
RegSetValueExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
SetSecurityDescriptorGroup
GetObjectA
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
GetSystemPaletteEntries
SetBkMode
GetTextExtentPoint32A
CreateFontA
CreatePalette
BitBlt
CreateDIBitmap
GetStockObject
SelectPalette
CreateFontIndirectA
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
RealizePalette
SetTextColor
GetStdHandle
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
HeapReAlloc
GetLocaleInfoA
LocalAlloc
lstrcatA
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetThreadContext
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
MoveFileA
ResumeThread
GetEnvironmentVariableA
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
VerLanguageNameA
InitializeCriticalSection
WriteProcessMemory
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
RaiseException
GetSystemDefaultLCID
InterlockedDecrement
MultiByteToWideChar
FlushInstructionCache
SetFilePointer
CreateThread
GetExitCodeThread
SetUnhandledExceptionFilter
GetCurrentProcess
MulDiv
SetThreadContext
TerminateProcess
VirtualQuery
SearchPathA
GetVersion
LeaveCriticalSection
SetCurrentDirectoryA
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
SetEvent
GetProcAddress
VirtualProtectEx
GetProcessHeap
CompareStringW
lstrcmpA
FindFirstFileA
lstrcpyA
GetTimeFormatA
GetTempFileNameA
CreateFileMappingA
FindNextFileA
DuplicateHandle
ExpandEnvironmentStringsA
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
GlobalAlloc
GetModuleFileNameA
SizeofResource
CompareFileTime
LockResource
lstrlenW
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
QueryPerformanceFrequency
MapViewOfFile
GetModuleHandleA
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetCurrentThreadId
GetEnvironmentStrings
CreateProcessA
ResetEvent
IsValidCodePage
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
FindResourceA
VirtualAlloc
CompareStringA
VariantChangeType
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
SysReAllocStringLen
GetErrorInfo
SysFreeString
UuidToStringA
RpcStringFreeA
UuidCreate
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
SetFocus
CharPrevA
RegisterClassA
GetParent
UpdateWindow
IntersectRect
EndDialog
BeginPaint
DrawIcon
CreateDialogIndirectParamA
KillTimer
CharUpperA
FindWindowA
DefWindowProcA
SetWindowTextA
SetWindowPos
SendDlgItemMessageA
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
PostMessageA
MoveWindow
GetDlgItemTextA
MessageBoxA
PeekMessageA
GetWindowDC
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
GetDC
ReleaseDC
GetDlgCtrlID
GetClassInfoA
DestroyIcon
LoadStringA
ShowWindow
GetWindowPlacement
SendMessageA
SubtractRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
LoadCursorA
ClientToScreen
SetRect
GetWindowLongA
GetWindowTextLengthA
SetTimer
GetClientRect
LoadIconA
GetMessageA
FillRect
GetSysColorBrush
CharNextA
WaitForInputIdle
GetDesktopWindow
wsprintfA
DialogBoxIndirectParamA
MsgWaitForMultipleObjects
EndPaint
GetWindowTextA
DestroyWindow
ExitWindowsEx
IsDialogMessageA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoUninitialize
CLSIDFromProgID
CoInitialize
CoInitializeSecurity
Number of PE resources by type
RT_ICON 9
RT_DIALOG 6
RT_STRING 3
GIF 2
RT_MANIFEST 1
RT_GROUP_CURSOR 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 23
NEUTRAL 2
PE resources
ExifTool file metadata
FileTypeExtension
exe

SubsystemVersion
4.0

InitializedDataSize
163840

ImageVersion
0.0

ProductName
RSS Feed Creator

FileVersionNumber
15.0.0.498

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

LinkerVersion
6.0

InternalBuildNumber
77018

OriginalFileName
Setup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.80.00

TimeStamp
2008:05:10 05:42:42+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
3.80.00

FileDescription
Setup Launcher

OSVersion
4.0

FileOS
Win32

LegalCopyright
Copyright (C) 2008 Acresso Software Inc. and/or InstallShield Co. Inc. All Rights Reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Jitbit Software

CodeSize
290816

FileSubtype
0

ProductVersionNumber
15.0.0.0

EntryPoint
0x32077

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 39e2c70cd1106bb096efc3c80d0e4270
SHA1 b304ecbd14fa13453ad03e62afb70dbe481736d4
SHA256 d30bc5c18e1baab0131666296ddb53860ef20f9d51cb360c5a5ad25ffb896aa8
ssdeep
49152:c3t1uwMWVT25PAXhbdAWRMB+mj+HZIC3ytt/n/pQ3F1w7uzjU8/vMO1TfN9K016S:c3m5PAXhbdT+pjpCCterquzjUFOjVhUo

authentihash 24fdbc827190ba85613c40d17ef01450ee22c8d526f0fda3b393bb90b42bb855
imphash ae1cb14c70506a8bdd66ebf84e83e4a7
File size 2.2 MB ( 2308483 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (44.9%)
Win64 Executable (generic) (39.8%)
Win32 Executable (generic) (6.4%)
OS/2 Executable (generic) (2.9%)
Generic Win/DOS Executable (2.8%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2010-07-26 15:29:45 UTC ( 8 years, 8 months ago )
Last submission 2018-01-27 19:58:14 UTC ( 1 year, 2 months ago )
File names 39e2c70cd1106bb096efc3c80d0e4270
smona132356876613908592895
rssfeedcreatorsetup.exe
smona131491589802876304048
RSSFeedCreatorSetup.exe
Setup
smona130976884537145728739
output.19889700.txt
file-6438636_exe
1283481842-RSSFeedCreatorSetup.exe
smona132749563254222393693
RSSFeedCreatorSetup.exe
smona131977694411877130032
Setup.exe
335063
smona132488060569862896101
19889700
smona_d30bc5c18e1baab0131666296ddb53860ef20f9d51cb360c5a5ad25ffb896aa8.bin
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!