× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e2be82dd439b7c0eacf2b82b807ddcdc39174a3d95f33f0cf877b67294ea0d3b
File name: Cosmoball.exe
Detection ratio: 0 / 61
Analysis date: 2017-04-23 09:56:47 UTC ( 1 year, 9 months ago )
Antivirus Result Update
Ad-Aware 20170423
AegisLab 20170423
AhnLab-V3 20170422
Alibaba 20170421
ALYac 20170423
Antiy-AVL 20170423
Arcabit 20170423
Avast 20170423
AVG 20170423
Avira (no cloud) 20170423
AVware 20170423
Baidu 20170421
BitDefender 20170423
Bkav 20170422
CAT-QuickHeal 20170422
ClamAV 20170423
CMC 20170421
Comodo 20170423
CrowdStrike Falcon (ML) 20170130
Cyren 20170423
DrWeb 20170423
Emsisoft 20170423
Endgame 20170419
ESET-NOD32 20170423
F-Prot 20170423
F-Secure 20170423
Fortinet 20170423
GData 20170423
Ikarus 20170423
Sophos ML 20170413
Jiangmin 20170422
K7AntiVirus 20170423
K7GW 20170423
Kaspersky 20170423
Kingsoft 20170423
Malwarebytes 20170423
McAfee 20170423
McAfee-GW-Edition 20170423
Microsoft 20170423
eScan 20170423
NANO-Antivirus 20170423
nProtect 20170423
Palo Alto Networks (Known Signatures) 20170423
Panda 20170423
Qihoo-360 20170423
Rising 20170423
SentinelOne (Static ML) 20170330
Sophos AV 20170423
SUPERAntiSpyware 20170423
Symantec Mobile Insight 20170422
Tencent 20170423
TheHacker 20170420
TotalDefense 20170423
TrendMicro 20170423
TrendMicro-HouseCall 20170423
Trustlook 20170423
VBA32 20170421
VIPRE 20170423
ViRobot 20170423
Webroot 20170423
WhiteArmor 20170409
Yandex 20170421
Zillya 20170421
ZoneAlarm by Check Point 20170423
Zoner 20170423
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Media Contact LLC

File version
Description Cosmoball Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009A54
Number of sections 8
PE sections
Overlays
MD5 22e19390c3ba7819a7407b594ac86c88
File type data
Offset 53248
Size 5124390
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
DUTCH 4
ENGLISH US 3
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
17408

ImageVersion
0.0

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

LinkerVersion
2.25

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

FileDescription
Cosmoball Setup

OSVersion
1.0

FileOS
Win32

LegalCopyright
Copyright (C) Media Contact LLC

MachineType
Intel 386 or later, and compatibles

CompanyName
Media Contact LLC

CodeSize
37376

FileSubtype
0

ProductVersionNumber
0.0.0.0

EntryPoint
0x9a54

ObjectFileType
Executable application

File identification
MD5 45161fa1f3906f4eeecc80687a9dda54
SHA1 b4eb066a7e3575f8f4906350a7dac9b3bfe0fd83
SHA256 e2be82dd439b7c0eacf2b82b807ddcdc39174a3d95f33f0cf877b67294ea0d3b
ssdeep
98304:MWA5eOP10cCLM1gfpiP1LQqSSkkc5ngUIIlWe1f0Ubo5gL:3+eOycCw1gxi9+N6UPW8bFL

authentihash 3ca7d1e2f57efd9b85e5662597f8d5a505ffabf88759daaa6286aafd4d4a5b4d
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 4.9 MB ( 5177638 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable PowerBASIC/Win 9.x (51.2%)
Inno Setup installer (37.9%)
Win32 Executable Delphi generic (4.9%)
Win32 Dynamic Link Library (generic) (2.2%)
Win32 Executable (generic) (1.5%)
Tags
peexe overlay

VirusTotal metadata
First submission 2012-12-25 21:19:38 UTC ( 6 years ago )
Last submission 2016-11-05 22:26:29 UTC ( 2 years, 2 months ago )
File names e2be82dd439b7c0eacf2b82b807ddcdc39174a3d95f33f0cf877b67294ea0d3b
Cosmoball.exe
Cosmoball.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications