PUP.DotSetupIo.C

Analysis Report

General information

Family Name: PUP.DotSetupIo.C
Packers: UPX
Signature status: Modified signature

Known Samples

MD5: b3778284a028dcc3f48e38b00174d600
SHA1: ecdf05a090a44a3a9d6eb95722f517dae65aa5b3
SHA256: F89A11889F809F7AEDCBAC97067F9CF8C3B920D55569BE337D13B6ED88DF7E54
File Size: 9.90 MB, 9895424 bytes
MD5: e631f464d74ccf80a86256e19863195d
SHA1: 86c41a0b5cebbcb9865d50a957c7c197ed895038
SHA256: 5519B02A91ED8F5E713737D12B2C8A046D61AF87BAEB8006217586A6399E152C
File Size: 7.01 MB, 7014240 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have relocations information
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Microvirt Software Technology Co. Ltd.
File Description
  • MEmu Uninstaller
  • 联想模拟器卸载程序
File Version
  • 8.0.8.0
  • 7.2.1.0
Internal Name MEmuSetup.exe
Legal Copyright
  • Copyright (C) 2020 Microvirt Software Technology Co. Ltd. All rights reserved
  • Copyright (C) 2022 Microvirt Software Technology Co. Ltd. All rights reserved
Original Filename MEmuSetup.exe
Product Name
  • MEmu Uninstaller
  • 联想模拟器卸载程序
Product Version
  • 8.0.8.0
  • 7.2.1.0

Digital Signatures

Signer Root Status
Shanghai Microvirt Software Technology Co., Ltd. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed
Shanghai Microvirt Software Technology Co., Ltd. DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Self Signed

File Traits

  • .UPX
  • 2+ executable sections
  • GetConsoleWindow
  • HighEntropy
  • imgui
  • Installer Manifest
  • Installer Version
  • packed
  • upx
  • UPX!
Show More
  • x86

Block Information

Total Blocks: 22,161
Potentially Malicious Blocks: 1,461
Whitelisted Blocks: 20,520
Unknown Blocks: 180

Visual Map

0 0 0 0 0 x 0 0 x 0 0 0 0 0 0 x x 0 0 0 x 0 0 x x 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 x x x x ? ? ? 0 x x x x x x x x x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x x x x ? x x x x x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 ? x x 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 x ? ? ? ? ? ? x x x x x x x ? ? ? ? ? ? x x ? 0 0 x x x x 0 0 x x ? ? 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 0 0 ? 0 ? ? ? 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 ? ? ? ? x 0 x x 0 x x 0 0 0 0 0 x x x x x x x x x 0 x x x ? x x x 0 x x ? 0 x x x x x x x 0 0 0 0 0 0 x ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x x x x x x x ? ? x ? ? x 0 0 x 0 0 1 0 0 0 0 1 0 x 0 0 0 x 0 0 0 x ? 0 x x ? 0 0 0 x x 0 x x x 0 x 0 x 0 x 0 x 0 x 0 0 0 0 x x x 0 0 0 x x ? x ? 0 x x x x ? ? ? ? ? ? ? x ? ? ? ? ? 0 ? x ? ? ? x ? ? ? ? ? ? x ? 0 ? 0 ? x ? x x 0 x x ? x x x x ? ? 0 x ? ? ? ? ? ? x 0 0 0 1 x x ? 0 ? x ? 0 x ? 0 0 x x ? ? ? x ? 0 x ? 0 x ? x x 0 x x ? ? ? ? ? x x x x x 0 0 0 x x x x 0 x x x ? x x 0 x 0 ? 0 0 0 0 0 0 x x x 0 x 0 0 0 x 0 x 0 0 0 0 x x 0 x x x x 0 0 x x x ? ? 0 0 x 0 0 x ? x x 0 0 x x 0 ? 0 x x x x 0 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x x x 0 0 x ? x 0 0 x x x ? 0 x x x 0 0 x x x x 0 ? ? ? x ? x x ? ? 0 0 0 0 0 0 0 0 0 x x x 0 0 x x x 0 0 x x x x x 0 x ? 0 0 0 x x 0 0 x x x x x x x 0 0 0 0 x x x 0 0 x 0 x 0 x 0 x x x 0 x x x x x 0 0 0 0 0 0 x x x ? x ? x x 0 0 ? 0 x 0 x x x x x x 0 0 x x x x 0 x x x x x 0 x 0 x x 0 ? ? ? 0 0 ? 0 0 x x ? ? x ? ? 0 x x ? x 0 0 0 x ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 x x 0 x x 0 x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x x x x x 0 0 0 0 0 0 0 0 0 0 x x 0 0 x x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x x x 0 x 0 x 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 x 0 x 0 x 0 0 0 0 0 x 0 x x x 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 x 0 0 x x 0 0 x x x 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 x 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 x x x x x 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 x x x 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 x x 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 x 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 x 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • DotSetupIo.C

Files Modified

File Attributes
\device\namedpipe\__lemu_installer_pipe_name___ Generic Read,Write Data,Write Attributes,Write extended,Append data
\device\namedpipe\__memu_installer_pipe_name__ Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\lenovo\fusionengine\setup\lemusetup.log Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
  • OutputDebugString
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Network Info Queried
  • GetAdaptersInfo
Network Winsock2
  • WSAConnect
  • WSASend
  • WSASocket
  • WSAStartup
  • WSAttemptAutodialName
Network Winsock
  • closesocket
  • freeaddrinfo
  • getaddrinfo
  • getpeername
  • getsockname
  • setsockopt

Trending

Most Viewed

Loading...