setupcirosroboticsrobotprogramsandpositonlists.exe

Visual Patch Runtime

This is a setup program which is used to install the application. The file has been seen being downloaded from exchange.ciros-engineering.com.
Product:
Visual Patch Runtime

Description:
Patch Application

Version:
3.0.3.0

MD5:
49044c19e1951332b7da07615fa7983d

SHA-1:
729b6e3b664b1a431f10327fe33f587cc2efb33c

SHA-256:
65cca5ef918d3792127dcbda4fa79ae0922140d2b93a8a83223d5b691641343a

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
11/27/2024 9:47:24 PM UTC  (today)

Scan engine
Detection
Engine version

Trend Micro House Call
Suspicious_GEN.F47V0228
7.2.195

File size:
2.5 MB (2,582,772 bytes)

Product version:
3.0.3.0

Copyright:
Patch Engine Copyright © 2005-2008 Indigo Rose Corporation

Trademarks:
Visual Patch is a trademark of Indigo Rose Corporation.

Original file name:
vpatch.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

File PE Metadata
Compilation timestamp:
8/21/2008 8:41:58 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:dPYKQlqRPTHYyihXzpI/6Ya9uA+vjk2mnhPkEyh5P3D1MY4B:dpD/uj6JHjk2mNXyzPT1M

Entry address:
0x1E44

Entry point:
55, 8B, EC, 6A, FF, 68, 88, 61, 40, 00, 68, 74, 31, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 88, 60, 40, 00, 33, D2, 8A, D4, 89, 15, 8C, 9C, 40, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 88, 9C, 40, 00, C1, E1, 08, 03, CA, 89, 0D, 84, 9C, 40, 00, C1, E8, 10, A3, 80, 9C, 40, 00, 6A, 01, E8, 07, 03, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C3, 00, 00, 00, 59, E8, 77, 1B, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B2, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
20 KB (20,480 bytes)

The file setupcirosroboticsrobotprogramsandpositonlists.exe has been seen being distributed by the following URL.