× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 8d49d5955468a78233c5a9af2f5493c34fae710eef5fab027083f2b77d2f550f
File name: neptunesystemcare2017.exe
Detection ratio: 19 / 69
Analysis date: 2019-04-15 22:18:04 UTC ( 1 month ago ) View latest
Antivirus Result Update
Antiy-AVL HackTool[Hoax]/Win32.DeceptPCClean 20190415
Avast Win32:PUP-gen [PUP] 20190415
AVG Win32:PUP-gen [PUP] 20190415
Avira (no cloud) PUA/Agent.8384 20190415
CAT-QuickHeal Trojan.Agent 20190415
Cylance Unsafe 20190416
ESET-NOD32 a variant of Win32/WiseCleaner.A potentially unwanted 20190415
Fortinet W32/PossibleThreat 20190416
GData Win32.Trojan.Agent.LY6VGM 20190415
K7AntiVirus Riskware ( dec002ac1 ) 20190415
K7GW Riskware ( dec002ac1 ) 20190415
Kaspersky Hoax.Win32.DeceptPCClean.cpi 20190415
McAfee Artemis!3F0BC32DAA07 20190415
McAfee-GW-Edition Artemis!PUP 20190415
Microsoft Misleading:Win32/Lodi 20190415
Tencent Win32.Trojan-psw.Deceptpcclean.Lknz 20190416
TrendMicro PUA.Win32.SystemCare.AB 20190415
TrendMicro-HouseCall PUA.Win32.SystemCare.AB 20190415
ZoneAlarm by Check Point Hoax.Win32.DeceptPCClean.cpi 20190415
Acronis 20190415
Ad-Aware 20190415
AegisLab 20190415
AhnLab-V3 20190415
Alibaba 20190402
ALYac 20190415
Arcabit 20190415
Avast-Mobile 20190415
Babable 20180918
Baidu 20190318
BitDefender 20190415
Bkav 20190412
ClamAV 20190415
CMC 20190321
Comodo 20190415
CrowdStrike Falcon (ML) 20180202
Cybereason 20190403
Cyren 20190415
DrWeb 20190415
eGambit 20190416
Emsisoft 20190415
Endgame 20190403
F-Prot 20190416
F-Secure 20190415
FireEye 20190415
Ikarus 20190415
Sophos ML 20190313
Jiangmin 20190415
Kingsoft 20190416
Malwarebytes 20190415
MAX 20190416
eScan 20190415
NANO-Antivirus 20190415
Palo Alto Networks (Known Signatures) 20190416
Panda 20190415
Qihoo-360 20190416
Rising 20190415
SentinelOne (Static ML) 20190407
Sophos AV 20190415
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190415
TheHacker 20190411
TotalDefense 20190413
Trapmine 20190325
Trustlook 20190416
VBA32 20190415
ViRobot 20190415
Yandex 20190415
Zillya 20190415
Zoner 20190415
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
www.neptuneutilities.com

Product Neptune SystemCare 2017
File version 2.17
Description Neptune SystemCare 2017
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 2:23 AM 11/15/2017
Signers
[+] Lespeed Technology Ltd.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 12:00 AM 03/30/2017
Valid to 11:59 PM 03/30/2018
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 2C2F949E391AA236860A95E81E39A30D14F32F2D
Serial number 32 3D C5 2B F6 28 87 1C ED FC B8 C9 79 5F 11 8B
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 02/08/2010
Valid to 11:59 PM 02/07/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] DigiCert Timestamp Responder
Status Valid
Issuer DigiCert Assured ID CA-1
Valid from 12:00 AM 10/22/2014
Valid to 12:00 AM 10/22/2024
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 614D271D9102E30169822487FDE5DE00A352B01D
Serial number 03 01 9A 02 3A FF 58 B1 6B D6 D5 EA E6 17 F0 66
[+] DigiCert Assured ID CA-1
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2021
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing
Algorithm sha1RSA
Thumbrint 19A09B5A36F4DD99727DF783C17A51231A56C117
Serial number 06 FD F9 03 96 03 AD EA 00 0A EB 3F 27 BB BA 1B
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Packers identified
F-PROT INNO, appended, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-06 14:39:04
Entry Point 0x000117DC
Number of sections 8
PE sections
Overlays
MD5 ac9904e5a932eda1b3f8927da0b707cf
File type data
Offset 215040
Size 8169152
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetSystemDirectoryW
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 8
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2.1.7.439

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Neptune SystemCare 2017

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
147456

EntryPoint
0x117dc

MIMEType
application/octet-stream

LegalCopyright
www.neptuneutilities.com

FileVersion
2.17

TimeStamp
2016:04:06 14:39:04+00:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2.17

UninitializedDataSize
0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
www.neptuneutilities.com

CodeSize
66560

ProductName
Neptune SystemCare 2017

ProductVersionNumber
2.1.7.439

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3f0bc32daa07eb9107078d35e83327d5
SHA1 62e6a3caac10136f888b635f087064d43f8b92d2
SHA256 8d49d5955468a78233c5a9af2f5493c34fae710eef5fab027083f2b77d2f550f
ssdeep
196608:TSb2rHFJZsxZgGsQKiqe+MdvxKusgca6FYwo4LJ9x:OCrnZsxZgGsEx/vxygN63J97

authentihash 2a009510306642e7064a9686276545e97fc432f6bd33fa7ca11adce1c3ef03c2
imphash 20dd26497880c05caed9305b3c8b9109
File size 8.0 MB ( 8384192 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (52.9%)
Win32 Executable (generic) (16.8%)
Win16/32 Executable Delphi generic (7.7%)
OS/2 Executable (generic) (7.5%)
Generic Win/DOS Executable (7.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-11-17 17:10:56 UTC ( 1 year, 6 months ago )
Last submission 2018-10-22 12:44:51 UTC ( 7 months ago )
File names NeptuneSystemCare2017.exe
NeptuneSystemCare2017.exe
1031871
neptunesystemcare2017.exe
NeptuneSystemCare2017.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs