× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b9ecbf3eabc10f7207c0e9b7a4ef15726e685b742fc4d593591d448545126d73
File name: SopCast.exe
Detection ratio: 0 / 54
Analysis date: 2016-02-07 18:21:24 UTC ( 2 years, 9 months ago )
Antivirus Result Update
Ad-Aware 20160207
AegisLab 20160207
Yandex 20160206
AhnLab-V3 20160207
Alibaba 20160204
Antiy-AVL 20160207
Arcabit 20160207
Avast 20160207
AVG 20160207
Avira (no cloud) 20160207
Baidu-International 20160207
BitDefender 20160207
Bkav 20160204
ByteHero 20160207
CAT-QuickHeal 20160206
ClamAV 20160206
CMC 20160205
Comodo 20160207
Cyren 20160207
DrWeb 20160207
Emsisoft 20160207
ESET-NOD32 20160207
F-Prot 20160129
F-Secure 20160206
Fortinet 20160207
GData 20160207
Ikarus 20160207
Jiangmin 20160207
K7AntiVirus 20160207
K7GW 20160207
Kaspersky 20160207
Malwarebytes 20160207
McAfee 20160207
McAfee-GW-Edition 20160207
Microsoft 20160207
eScan 20160207
NANO-Antivirus 20160207
nProtect 20160205
Panda 20160207
Qihoo-360 20160207
Rising 20160207
Sophos AV 20160207
SUPERAntiSpyware 20160207
Symantec 20160207
Tencent 20160207
TheHacker 20160206
TotalDefense 20160207
TrendMicro 20160207
TrendMicro-HouseCall 20160207
VBA32 20160204
VIPRE 20160207
ViRobot 20160207
Zillya 20160206
Zoner 20160207
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2004 - 2013, SopCast.com. All rights reserved.

Product SopCast
Original name SopCast.exe
Internal name SopCast.exe
File version 3.8.2.201
Description SopCast Main Application
Comments www.sopcast.com
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-14 01:52:03
Entry Point 0x0009A0F8
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegEnumKeyW
ReportEventA
RegCloseKey
GetUserNameW
DeregisterEventSource
RegSetValueExW
RegOpenKeyExW
RegisterEventSourceA
RegOpenKeyW
RegDeleteKeyW
IsTextUnicode
RegQueryValueExW
RegQueryValueW
ImageList_GetImageCount
ImageList_DragMove
_TrackMouseEvent
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_Create
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_DragLeave
Ord(17)
ImageList_GetIcon
ImageList_ReplaceIcon
ImageList_EndDrag
ImageList_AddMasked
GetWindowExtEx
SetMapMode
TextOutW
CreateFontIndirectW
PatBlt
CreatePen
GetRgnBox
SaveDC
CreateRectRgnIndirect
CombineRgn
GetClipBox
GetTextMetricsW
GetPixel
Rectangle
BitBlt
GetDeviceCaps
ExcludeClipRect
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
GetCharWidthW
SetPixel
SelectObject
DeleteObject
IntersectClipRect
CreateBitmap
GetBkMode
CreateDIBSection
CreateCompatibleBitmap
PtVisible
SetTextColor
CreateSolidBrush
CreatePatternBrush
RectVisible
ExtTextOutW
GetObjectW
GetTextExtentPoint32W
MoveToEx
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
LineTo
GetDIBits
ExtSelectClipRgn
SelectClipRgn
CreateCompatibleDC
CreateFontW
StretchDIBits
CreateHatchBrush
ScaleViewportExtEx
CreateRectRgn
Escape
GetBkColor
Ellipse
SetWindowExtEx
GetTextColor
SetWindowOrgEx
DPtoLP
SetBkMode
GetViewportExtEx
SetViewportExtEx
SetRectRgn
GetStdHandle
FileTimeToDosDateTime
ReleaseMutex
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetFileAttributesW
lstrcmpW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
lstrcatW
GetLocaleInfoW
SetStdHandle
GetFileTime
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
SizeofResource
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
FormatMessageW
ResumeThread
GetTimeZoneInformation
OutputDebugStringW
GlobalHandle
FindClose
TlsGetValue
GetFullPathNameW
GetCurrentThread
SetLastError
ReadConsoleInputA
GlobalFindAtomW
GetUserDefaultLangID
LoadResource
RemoveDirectoryW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
lstrcmpiW
EnumResourceLanguagesW
SetConsoleCtrlHandler
GetVolumeInformationW
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
SetFilePointer
GlobalAddAtomW
CreateThread
SetEnvironmentVariableW
GetExitCodeThread
SetUnhandledExceptionFilter
ConvertDefaultLocale
CreateMutexW
MulDiv
GetDateFormatA
ExitThread
SetEnvironmentVariableA
lstrcpynW
TerminateProcess
GetVersion
GlobalAlloc
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
CloseHandle
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
SetEvent
QueryPerformanceCounter
GetTickCount
IsBadWritePtr
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
UnlockFile
GetWindowsDirectoryW
GetFileSize
GlobalDeleteAtom
GetStartupInfoW
GetCPInfo
DeleteFileW
GlobalLock
CompareStringW
lstrcpyW
GlobalReAlloc
GetModuleFileNameW
lstrcmpA
FindNextFileW
GetTimeFormatA
FindFirstFileW
GlobalMemoryStatus
DuplicateHandle
GetProcAddress
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
InitializeCriticalSection
LocalReAlloc
FlushConsoleInputBuffer
LCMapStringW
SetConsoleMode
GetSystemInfo
lstrlenA
GlobalFree
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
lstrlenW
WinExec
CreateProcessW
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
WritePrivateProfileStringW
SuspendThread
RaiseException
FreeResource
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
FindFirstFileA
GetACP
GetModuleHandleW
SetThreadExecutionState
GetLongPathNameW
HeapCreate
FindResourceW
VirtualQuery
VirtualFree
Sleep
IsBadReadPtr
SetThreadPriority
IsBadCodePtr
VirtualAlloc
CompareStringA
OleCreateFontIndirect
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
VariantChangeType
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
SHGetPathFromIDListW
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
ShellExecuteExW
PathIsUNCW
PathStripToRootW
PathFindExtensionW
PathFindFileNameW
MapWindowPoints
GetMessagePos
SetWindowRgn
RedrawWindow
SetMenuItemBitmaps
LoadBitmapW
SetRectEmpty
CopyRect
DestroyMenu
PostQuitMessage
GetForegroundWindow
DrawStateW
SetWindowPos
IsWindow
GrayStringW
EndPaint
WindowFromPoint
AppendMenuW
GetMessageTime
SetActiveWindow
DispatchMessageW
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
GetMenuItemInfoW
DrawTextW
GetNextDlgTabItem
CallNextHookEx
LoadImageW
ClientToScreen
GetTopWindow
GetWindowTextW
LockWindowUpdate
GetWindowTextLengthW
GetActiveWindow
InvalidateRgn
GetMenuItemID
PtInRect
DrawEdge
GetUserObjectInformationW
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
GetMenuState
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetDesktopWindow
PeekMessageW
EnableWindow
CharUpperW
TranslateMessage
IsWindowEnabled
GetWindow
GetIconInfo
SetParent
RegisterClassW
GetWindowPlacement
SetWindowLongW
IsIconic
DrawFocusRect
GetDCEx
IsDialogMessageW
FillRect
SetWindowContextHelpId
DeferWindowPos
CreateWindowExW
TabbedTextOutW
GetWindowLongW
DestroyWindow
IsChild
SetFocus
RegisterWindowMessageW
BeginPaint
OffsetRect
DefWindowProcW
ReleaseCapture
CopyIcon
KillTimer
GetParent
SendDlgItemMessageA
GetSystemMetrics
EnableMenuItem
GetWindowRect
InflateRect
SetCapture
DrawIcon
DrawTextExW
SendDlgItemMessageW
GetProcessWindowStation
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetClassLongW
GetLastActivePopup
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
PostMessageW
TrackPopupMenu
PostThreadMessageW
GetMenuItemCount
ValidateRect
SetWindowsHookExW
LoadCursorW
LoadIconW
GetDC
InsertMenuW
SetForegroundWindow
GetMenuStringW
CreateDialogIndirectParamW
ReleaseDC
IntersectRect
EndDialog
ModifyMenuW
CreateIconIndirect
GetCapture
MessageBeep
RemoveMenu
wvsprintfW
GetSysColorBrush
MessageBoxW
SendMessageW
UnhookWindowsHookEx
MoveWindow
MessageBoxA
IsMenu
GetWindowDC
DestroyCursor
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
SystemParametersInfoA
DestroyIcon
IsWindowVisible
WinHelpW
SystemParametersInfoW
FrameRect
SetRect
DeleteMenu
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
GetClientRect
IsRectEmpty
CopyAcceleratorTableW
GetFocus
CreateMenu
wsprintfW
SetCursor
RemovePropW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
htonl
getsockname
WSARecvFrom
accept
ioctlsocket
WSAStartup
connect
shutdown
htons
getpeername
WSAGetLastError
closesocket
ntohl
inet_addr
send
ntohs
select
listen
__WSAFDIsSet
WSACleanup
gethostbyname
WSASetLastError
recv
setsockopt
socket
bind
WSASendTo
recvfrom
inet_ntoa
sendto
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
MiniDumpWriteDump
OleUninitialize
CoTaskMemFree
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
OleFlushClipboard
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
OleUIBusyW
PE exports
Number of PE resources by type
RT_ICON 33
RT_GROUP_ICON 26
RT_DIALOG 16
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 13
RT_BITMAP 5
Struct(240) 2
RT_HTML 1
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 69
CHINESE SIMPLIFIED 60
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

Comments
www.sopcast.com

InitializedDataSize
1019904

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.8.2.201

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
SopCast Main Application

CharacterSet
Windows, Latin1

LinkerVersion
7.1

EntryPoint
0x9a0f8

OriginalFileName
SopCast.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2004 - 2013, SopCast.com. All rights reserved.

FileVersion
3.8.2.201

TimeStamp
2013:03:14 02:52:03+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
SopCast.exe

ProductVersion
3.8.2.201

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
www.sopcast.com

CodeSize
1228800

ProductName
SopCast

ProductVersionNumber
3.8.2.201

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 478d04dcd175315ad97e712d65f77ae9
SHA1 06fdf6396f01d125d7e97d336035094be703777f
SHA256 b9ecbf3eabc10f7207c0e9b7a4ef15726e685b742fc4d593591d448545126d73
ssdeep
24576:dMrSbxcnpDjbQWbtUwrLRDWM1aFAosDpEYNh5tFclEPpzuDan:nbxcnftUOyRV0pEeh5tx

authentihash 65d8d1fa34d1bfab82a908ef335d4f70673a64094deac041a6f5ea298572fd9c
imphash 35802001933e056b2c1ba8bbd4ef91bb
File size 2.1 MB ( 2207744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-17 08:14:00 UTC ( 5 years, 8 months ago )
Last submission 2015-05-01 22:54:48 UTC ( 3 years, 6 months ago )
File names file-5364064_exe
SopCast.exe
478d04dcd175315ad97e712d65f77ae9
SopCast.exe
SopCast.exe
SopCast.exe
SopCast.exe
sopcast.exe
SopCast.exe
SopCast.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Created mutexes
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications