11db7f781aff361a7902c95fc2ecda58

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2015-Feb-09 21:57:00
Detected languages English - United States
Comments Created with Setup Factory
FileDescription Setup Application
FileVersion 9.5.0.0
InternalName suf_launch
LegalCopyright Setup Engine Copyright © 2004-2015 Indigo Rose Corporation
LegalTrademarks Setup Factory is a trademark of Indigo Rose Corporation.
OriginalFilename suf_launch.exe
ProductName Setup Factory Runtime
ProductVersion 9.5.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 6.0 - 8.0
Suspicious PEiD Signature: UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser
UPX -> www.upx.sourceforge.net
UPX V2.00-V2.90 -> Markus Oberhumer & Laszlo Molnar & John Reiser
Suspicious Strings found in the binary may indicate undesirable behavior: Contains a XORed PE executable:
  • 53 6f 6e 74 27 77 75 68 60 75 66 6a 27 64 66 69 69 68 73 27 ...
Contains another PE executable:
  • This program cannot be run in DOS mode.
Miscellaneous malware strings:
  • cmd.exe
Contains domain names:
  • comodo.net
  • comodoca.com
  • crl.comodoca.com
  • crl.usertrust.com
  • crt.comodoca.com
  • crt.usertrust.com
  • http://crl.comodoca.com
  • http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
  • http://crl.usertrust.com
  • http://crl.usertrust.com/AddTrustExternalCARoot.crl05
  • http://crl.usertrust.com/UTN-USERFirst-Object.crl05
  • http://crl.usertrust.com/UTN-USERFirst-Object.crl0t
  • http://crt.comodoca.com
  • http://crt.comodoca.com/COMODOCodeSigningCA2.crt0$
  • http://crt.usertrust.com
  • http://crt.usertrust.com/UTNAddTrustObject_CA.crt0%
  • http://ocsp.comodoca.com0
  • http://ocsp.usertrust.com0
  • http://www.indigorose.com
  • http://www.usertrust.com1
  • https://secure.comodo.net
  • https://secure.comodo.net/CPS0A
  • indigorose.com
  • secure.comodo.net
  • usertrust.com
  • www.indigorose.com
  • www.lua.org
Info Cryptographic algorithms detected in the binary: Uses constants related to MD5
Uses constants related to SHA1
Malicious The PE contains functions mostly used by malware. [!] The program may be hiding some of its imports:
  • GetProcAddress
  • LoadLibraryA
  • LoadLibraryW
Functions related to the privilege level:
  • OpenProcessToken
Suspicious The file contains overlay data. 16796149 bytes of data starting at offset 0x11a00.
The overlay data has an entropy of 7.99691 and is possibly compressed or encrypted.
Overlay data amounts for 99.572% of the executable.
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 11db7f781aff361a7902c95fc2ecda58
SHA1 ac685c6efd88431b08855706d4aa0773e3093f08
SHA256 5ed27b3dfbc412143ed0f994354322aed626d66a774be7382b8e25be598e9b68
SHA3 136711510455468d7dbacbf1ce95d6b43077d8aa7a5c01e194f764a40e26dabc
SSDeep 393216:cVjSE+76uayrWMpXRojt6ttOVMYG4JFYk2w6JnbvA:Y476u+t6tzYXJF+w6Jnbo
Imports Hash 1ff847646487d56f85778df99ff3728a

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xd8

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 5
TimeDateStamp 2015-Feb-09 21:57:00
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 10.0
SizeOfCode 0x5800
SizeOfInitializedData 0xbe00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000029E1 (Section: .text)
BaseOfCode 0x1000
BaseOfData 0x7000
ImageBase 0x400000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 5.1
ImageVersion 0.0
SubsystemVersion 5.1
Win32VersionValue 0
SizeOfImage 0x15000
SizeOfHeaders 0x400
Checksum 0x1364a
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 c76b9ce587690b8a39ba7840b7dd540c
SHA1 114d7340e840ad290bdbf90e90e9848d2e1725c5
SHA256 a00ca9a863671b53f3827886406ca4967dad3c431d69e6486eec22e65020bef2
SHA3 9477a30e7bed966312d2065b460a0554cb8c61b0262d124ff625dac3e5450192
VirtualSize 0x5718
VirtualAddress 0x1000
SizeOfRawData 0x5800
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.45945

.rdata

MD5 e96aa4f970e6f6799910a72904df3100
SHA1 80c5981f622e43d6b57fcf3642184de602555aea
SHA256 7ef2a00b505d7c6eea17396996af46b069539da535a30b838e27dcd37a8b70fe
SHA3 08198caf2cff29d6ab5989f028230d3e368b51cac9efd41d4d9b5246e04bfe56
VirtualSize 0x2e82
VirtualAddress 0x7000
SizeOfRawData 0x3000
PointerToRawData 0x5c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.97533

.data

MD5 e504fdbba062ee9bbd9ac425a4f5c0f5
SHA1 43d241c5d9433f431cd187c0aff3a614130ad427
SHA256 9311d3ce61454f57fad8b8bfd0e560fa2c5c50e5adfaf08c6d84a63a4f6d71f8
SHA3 32c881ab5032b7e9c6a3e74f28dea2e2dc803bbbbaf4205898faf63e8a6567f3
VirtualSize 0x1968
VirtualAddress 0xa000
SizeOfRawData 0xc00
PointerToRawData 0x8c00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 2.58663

.rsrc

MD5 7e5ee05610c237f9ebbee1af8b5e5652
SHA1 007dacdb5e130745c2bbf1cde5405eb21e78d4b1
SHA256 dd468b5c2501e0f38f366242c02e85cf26bf668af4bd7a6e02de4e12f07ed591
SHA3 96945dca99bfa62cf512bb4d02a5707f264fdf9152b2baa8f7485ea594296034
VirtualSize 0x6e90
VirtualAddress 0xc000
SizeOfRawData 0x7000
PointerToRawData 0x9800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 5.873

.reloc

MD5 a88bdb6f651ecf67b1b3db4a2866ea4e
SHA1 13996ad6f496c64dff1dbee17649d328463ed818
SHA256 6b4158116338cec89b82463ed9b34c860278f8a421b7e3919e8b9d6be7bddcbf
SHA3 81a7f8f1eb36f73e5d80d1f5b61368fae19a7bdb733c4be6e9f8252c90e73c68
VirtualSize 0x1092
VirtualAddress 0x13000
SizeOfRawData 0x1200
PointerToRawData 0x10800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 3.7122

Imports

KERNEL32.dll _lclose
GetModuleFileNameA
_lread
_llseek
_lopen
_lwrite
_lcreat
CreateDirectoryA
SetCurrentDirectoryA
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
GetFileAttributesA
RemoveDirectoryA
DeleteFileA
lstrlenA
GetCurrentDirectoryA
CloseHandle
GetExitCodeProcess
GetLastError
LocalFree
GetCurrentProcess
MoveFileExA
Sleep
GetStringTypeW
MultiByteToWideChar
LCMapStringW
HeapReAlloc
RtlUnwind
HeapSize
lstrcpyA
GetTempPathA
CompareStringA
IsValidCodePage
GetOEMCP
GetModuleHandleW
ExitProcess
DecodePointer
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
EncodePointer
LoadLibraryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
IsProcessorFeaturePresent
HeapCreate
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
USER32.dll TranslateMessage
DispatchMessageA
PeekMessageA
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
MsgWaitForMultipleObjects
ADVAPI32.dll GetTokenInformation
OpenProcessToken
SHELL32.dll ShellExecuteExA

Delayed Imports

1

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x128
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.37177
MD5 496b9dec82e136f2b5dd974f16e64bf0
SHA1 9018c14ef7230dd5ee908cd193927d44d086782c
SHA256 bb69db8fabd21337e457a739d0c541c759678d349e900d52f5dfa22828f326e5
SHA3 babb83439e7ae90d3eb92f8bf7c442b4661e4f69ff0ca9e57eb882305072e6ff

2

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x568
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.31421
MD5 ceea1f40f26b391da8977d0bc69ce333
SHA1 b0cc7faf384a4a9b55661c9dd00afff3bd478469
SHA256 1f8d3da0dd89dca26c6bb14ac7be9ed5a01bc929574ad46b87524f251e80e2be
SHA3 b2209ce5f96a2132ab957018f921de9955c4e2d755221c41dd1263f681fb7608

3

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x468
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.9477
MD5 286299765e413961c577250b562a9f6d
SHA1 c11066e0b36e102c15530a0a2bcf3ff59a447e38
SHA256 06fb164c24b5774aa1cc61dee3855f98998e7d8b80e7370403da6c202f054da8
SHA3 78911af57398ed019c2227579f388a129529836767481d8f3a52a82fca9ab835

4

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x2e8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.78233
MD5 2bfdea3afd1fff1a7b0289c617cfae05
SHA1 bc3d4258adec91cf01ff8d841bec5c48dd58000f
SHA256 a8af8d3e6282e1efdd38fb2787c9ec42cfbbf9cd1d473f6845590c3e31ea3c11
SHA3 f14c0636ff106d35a48416d618b5f71220091567cea7ad6f582412d2e81f1afd

5

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x8a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 6.14953
MD5 d400262b6638ac150461e04641caf542
SHA1 bff6b574a2d8b8597b021e26699da166d7520104
SHA256 31e4e1eea0a0e2e6443773d356ddca1fe28d32e74727a13638c85bdbd78281a6
SHA3 b007210806cc46ddec9dbe9dcef89d122150393bfd47f2cae5e4419fdbb17ab7

6

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x10a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.83714
MD5 b5c47d2978f629cc35ab63e89cabcb2c
SHA1 2b979114d1a0832ede92cc14a62be2fe3a5572fd
SHA256 7a7ef627be60b3f8f5b2366d513efd6b341eb942f039bfcc9399d82ebd898d0d
SHA3 bb2328d1e5c94651d22cf3798eb92a76f9d12a8f9bc237339608787594276d5a

7

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x668
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.64397
MD5 6acf27cac1ed0cc79e0b5cf6bbfa35af
SHA1 ae882712f338525cbb428dbb0dc5556a858993db
SHA256 d8bbb3fb720499a58160e7956e4bd18855b384c6dbd3aa262fea0e121436c6f2
SHA3 06441aae6d59e83b9369b36d31536ea17a6ecc34b49ea1958dc0fca25ff89567

8

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0xea8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.84115
MD5 5073c50c3a136934f16481bc0b3df044
SHA1 11df1eebfbd55cb5acf95991e7c0169475ef9b8a
SHA256 b65d018eb43b3c976a891e6677049eee014093e7c77774ffa1a4d08565891ecd
SHA3 89b824ae6dc6f8b6f2e1336885fc0cd021eaf37e1efa48eeafc39a70a171b764

9

Type RT_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x25a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.41049
MD5 ca478133475a2622104a5405539831fe
SHA1 8f2ad79e45e19b6ad4c3dc6aa273ea53479b67fa
SHA256 9df16fabe1cfc3dc3095c7c70f5fa39be14a8ca6a4fdf4aeaa194cde7995127c
SHA3 34ec32be9c59ab7710496e0b02eb1c81b11ff5394d1a13e31ade7870126bbc7d

101

Type RT_GROUP_ICON
Language English - United States
Codepage Latin 1 / Western European
Size 0x84
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.89097
Detected Filetype Icon file
MD5 6e71c5b6be8e29bfdcf3d856260f17b4
SHA1 d98d52ae0f3b84f09e2579e87bacdd0987e921d7
SHA256 d5f3b5a9baad2206b061f158ddba8b9feb33508f7b1c45fbdc4167b0d749e9fe
SHA3 97b048b0f05c431eaa5c59b1156fa9107d30ef7da35299cc317df636b40992ac

1 (#2)

Type RT_VERSION
Language English - United States
Codepage Latin 1 / Western European
Size 0x3e0
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.40901
MD5 595dadb742d5481b925afcd23c375d89
SHA1 2371daa5a0e549b7619d49e298faa6aa9a9e71de
SHA256 9b1acbfbf720237c04168d90d4d2b66ed6100e14b9f578a8f2cdabd4b07f78a6
SHA3 78306fc115172ef2f8e7a40997545f80473dacc8b0ccdc0eccc89f63a02dc51f

1 (#3)

Type RT_MANIFEST
Language English - United States
Codepage Latin 1 / Western European
Size 0x591
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.36998
MD5 bc6026c1ccbec7702456103ba17d23db
SHA1 c594ee61d4a4a12d038e2743a13e2b654d06cfa1
SHA256 cdfae727923915b2bf71f5b9b6ac9976b14baa8892c5cad9173491e7368ded79
SHA3 2e7095947185ec6cde878613e1cf541798b6ffd8daba9d3c52e20afef0f7b776

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 9.5.0.0
ProductVersion 9.5.0.0
FileFlags VS_FF_PRIVATEBUILD
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_APP
Language English - United States
Comments Created with Setup Factory
FileDescription Setup Application
FileVersion (#2) 9.5.0.0
InternalName suf_launch
LegalCopyright Setup Engine Copyright © 2004-2015 Indigo Rose Corporation
LegalTrademarks Setup Factory is a trademark of Indigo Rose Corporation.
OriginalFilename suf_launch.exe
ProductName Setup Factory Runtime
ProductVersion (#2) 9.5.0.0
Resource LangID English - United States

TLS Callbacks

Load Configuration

Size 0x48
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x40a020
SEHandlerTable 0x409470
SEHandlerCount 3

RICH Header

XOR Key 0x945cbac7
Unmarked objects 0
ASM objects (VS2010 SP1 build 40219) 14
C objects (VS2010 SP1 build 40219) 67
Imports (VS2008 SP1 build 30729) 9
Total imports 100
C++ objects (VS2010 SP1 build 40219) 25
Resource objects (VS2010 SP1 build 40219) 1
Linker (VS2010 SP1 build 40219) 1

Errors

<-- -->