× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 198069809febd1d7b21b0de873bbffbc347839d2266f86f329cd18895507af28
Dateiname: Neon-Soft Media-Player Setup.exe
Erkennungsrate: 2 / 48
Analyse-Datum: 2014-07-11 12:12:56 UTC ( vor 4 Jahre, 2 Monate ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Jiangmin Trojan/Agent.kfiu 20140711
Zoner Trojan.Autoit.NPP 20140711
Ad-Aware 20140711
AegisLab 20140711
Yandex 20140711
AhnLab-V3 20140711
AntiVir 20140711
Antiy-AVL 20140711
Avast 20140711
AVG 20140711
Baidu-International 20140711
BitDefender 20140711
Bkav 20140711
ByteHero 20140711
CAT-QuickHeal 20140711
ClamAV 20140711
CMC 20140711
Commtouch 20140711
Emsisoft 20140711
F-Prot 20140711
F-Secure 20140711
Fortinet 20140711
GData 20140711
Ikarus 20140711
K7AntiVirus 20140710
K7GW 20140711
Kaspersky 20140711
Kingsoft 20140711
Malwarebytes 20140711
McAfee 20140711
eScan 20140711
NANO-Antivirus 20140711
Norman 20140711
nProtect 20140711
Panda 20140711
Qihoo-360 20140711
Rising 20140711
SUPERAntiSpyware 20140711
Symantec 20140711
Tencent 20140711
TheHacker 20140708
TotalDefense 20140711
TrendMicro 20140711
TrendMicro-HouseCall 20140711
VBA32 20140710
VIPRE 20140711
ViRobot 20140711
Zillya 20140710
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Neon-Soft(2008-2014). All Rights Reserved.

Publisher Neon-Soft
Product Neon-Soft Media-Player
File version 0.0.1.13
Description A Simple but Powerfull Media-Player
Packers identified
F-PROT AutoIt, NSIS, appended, UTF-8, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-07-14 20:09:44
Entry Point 0x0000324D
Number of sections 5
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumValueA
ImageList_Create
Ord(17)
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SelectObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetBkColor
DeleteObject
SetTextColor
GetLastError
ReadFile
lstrlenA
lstrcmpiA
GlobalFree
WaitForSingleObject
GetExitCodeProcess
CopyFileA
ExitProcess
SetFileTime
GlobalUnlock
GetModuleFileNameA
DeleteFileA
LoadLibraryA
GetShortPathNameA
GetCurrentProcess
LoadLibraryExA
CompareFileTime
GetPrivateProfileStringA
WritePrivateProfileStringA
GetFileSize
lstrcatA
CreateDirectoryA
ExpandEnvironmentStringsA
GetWindowsDirectoryA
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GlobalLock
SetFileAttributesA
SetFilePointer
GetTempPathA
CreateThread
GetFileAttributesA
GetModuleHandleA
lstrcmpA
FindFirstFileA
lstrcpyA
CloseHandle
GetTempFileNameA
lstrcpynA
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
GetProcAddress
SetEnvironmentVariableA
GetFullPathNameA
FreeLibrary
MoveFileA
CreateProcessA
WriteFile
GlobalAlloc
SearchPathA
FindClose
Sleep
CreateFileA
GetTickCount
GetVersion
SetCurrentDirectoryA
MulDiv
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
CharPrevA
GetMessagePos
EndPaint
ReleaseDC
EndDialog
BeginPaint
ShowWindow
DefWindowProcA
GetClassInfoA
SetClassLongA
LoadBitmapA
SetWindowPos
GetSystemMetrics
IsWindow
AppendMenuA
PostQuitMessage
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
MessageBoxIndirectA
LoadImageA
GetDlgItemTextA
PeekMessageA
SetWindowLongA
IsWindowEnabled
GetSysColor
CheckDlgButton
GetDC
SystemParametersInfoA
CreatePopupMenu
wsprintfA
DialogBoxParamA
SetClipboardData
IsWindowVisible
SendMessageA
DrawTextA
GetClientRect
SetTimer
GetDlgItem
SetForegroundWindow
CreateDialogParamA
EnableMenuItem
RegisterClassA
SendMessageTimeoutA
InvalidateRect
GetWindowLongA
FindWindowExA
CreateWindowExA
LoadCursorA
TrackPopupMenu
SetWindowTextA
FillRect
OpenClipboard
CharNextA
CallWindowProcA
GetSystemMenu
EmptyClipboard
EnableWindow
CloseClipboard
DestroyWindow
ExitWindowsEx
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CoTaskMemFree
OleUninitialize
CoCreateInstance
OleInitialize
Number of PE resources by type
RT_DIALOG 6
RT_VERSION 2
RT_ICON 1
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 11
GERMAN 1
PE resources
ExifTool file metadata
CodeSize
23552

UninitializedDataSize
1024

LinkerVersion
6.0

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.1.13

LanguageCode
German

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
119808

MIMEType
application/octet-stream

LegalCopyright
Neon-Soft(2008-2014). All Rights Reserved.

FileVersion
0.0.1.13

TimeStamp
2013:07:14 21:09:44+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

FileAccessDate
2014:08:19 07:32:15+01:00

ProductVersion
0.0.1.13

FileDescription
Ein simpler aber Leistungs-starker Media-Player

OSVersion
4.0

FileCreateDate
2014:08:19 07:32:15+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Neon-Soft

LegalTrademarks
Neon-Soft Media-Player und CustomGUI sind marken von Neon-Soft

ProductName
Neon-Soft Media-Player

ProductVersionNumber
0.0.1.13

EntryPoint
0x324d

ObjectFileType
Executable application

File identification
MD5 d44707f5e2e11f0853f29c674e0b182a
SHA1 af867549f2fc1a0f9b8e83252cd936dfbb393d8d
SHA256 198069809febd1d7b21b0de873bbffbc347839d2266f86f329cd18895507af28
ssdeep
196608:voXlX2zqI8eXU3eyht3o49ZIqYGp1weEpvmWWCkOzawvDY:vqlncUOyL3o49JLORWCkOmwrY

imphash e990dd07e89d04c53e337ab9b3f5e0cc
File size 8.5 MB ( 8916759 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID NSIS - Nullsoft Scriptable Install System (94.8%)
Win32 Executable MS Visual C++ (generic) (3.4%)
Win32 Dynamic Link Library (generic) (0.7%)
Win32 Executable (generic) (0.5%)
Generic Win/DOS Executable (0.2%)
Tags
nsis peexe upx

VirusTotal metadata
First submission 2014-07-11 12:12:56 UTC ( vor 4 Jahre, 2 Monate )
Last submission 2014-07-11 12:12:56 UTC ( vor 4 Jahre, 2 Monate )
Dateinamen Neon-Soft Media-Player Setup.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.