VirtualClass.EXE

Virtual Class

MICHAEL CHOURDAKIS

This is a setup program which is used to install the application. The file has been seen being downloaded from www.turboirc.com.
Publisher:
TurboIRC.COM  (signed by MICHAEL CHOURDAKIS)

Product:
Virtual Class

Version:
1.0.0.0

MD5:
1f80f47f1788605fae2ff564b83addf4

SHA-1:
e57cc80fbe9707a972df98ca76149679a70a1add

SHA-256:
d23e6d499d8df9e4e9ce09aa66eb3efe7e4969aa7b373aa2b23d4b09c6177979

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/25/2024 4:17:24 PM UTC  (today)

File size:
422.7 KB (432,816 bytes)

Product version:
1.0.0.0

Copyright:
Chourdakis Michael

Original file name:
VirtualClass.EXE

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\virtualclass.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/27/2014 2:00:00 AM

Valid to:
3/27/2017 2:59:59 AM

Subject:
CN=MICHAEL CHOURDAKIS, O=MICHAEL CHOURDAKIS, STREET=AGIAS PARASKEYIS 61, L=PIRAEUS, S=GREECE, PostalCode=18539, C=GR

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7FB71E0CCD2B7F3D76B0E838C81B4A18

File PE Metadata
Compilation timestamp:
10/8/2015 5:57:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:llVXb9sUzr98ViJ6PuBE4/5MZUsgSPwkx6WGRXd2SpHdiazuNoS6qTuRTfdBp3o3:N/JhoWBE4//ewxTNsSp8k6oS6jpvRo3

Entry address:
0xEE7C0

Entry point:
60, BE, 00, 80, 4A, 00, 8D, BE, 00, 90, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 26, C9, 0E, 00, 57, 83, C3, 04, 53, 68, B4, 67, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Code size:
288 KB (294,912 bytes)

The file VirtualClass.EXE has been seen being distributed by the following URL.

Scan VirtualClass.EXE - Powered by Reason Core Security