bolshoy kush tv one piece tv uda konosuke 001-067 iz 500 bez hardsaba rusint 1999 g priklyucheniya w

N e t M e e t i n g

Mobilnye Proekty , Ooo

The file bolshoy kush tv one piece tv uda konosuke 001-067 iz 500 bez hardsaba rusint 1999 g priklyucheniya w, “N e t Me eti n g® I ns ta ll er” by Mobilnye Proekty , Ooo has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
P i r i f o r m L t d .  (signed by Mobilnye Proekty , Ooo)

Product:
N e t M e e t i n g

Description:
N e t Me eti n g® I ns ta ll er

Version:
6.1.0.4

MD5:
c85114d3962cb42a5f0a789b704e0e1e

SHA-1:
9705d73e174926e623ce92c83b4990018e0bd39e

SHA-256:
619d484fae1af272725393a498bdaa9d3a73a56af3c9d437f41891cfa8236d56

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
2/28/2025 8:25:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.11.4.7

File size:
292.4 KB (299,368 bytes)

Copyright:
C o p y r i g h t © 2008 - 2012 P i r i f o r m L t d .

Common path:
C:\users\{user}\downloads\torrents\bolshoy kush tv one piece tv uda konosuke 001-067 iz 500 bez hardsaba rusint 1999 g priklyucheniya wbr komediya fentezi senen iptvrip.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/21/2014 6:00:00 AM

Valid to:
5/22/2015 5:59:59 AM

Subject:
CN="Mobilnye Proekty , Ooo", O="Mobilnye Proekty , Ooo", STREET="Tymenskaya 5, bld. 1", L=Moscow, S=Moscow region, PostalCode=107370, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D812EDF6481CAD30D5A8D2B9E47437D4

File PE Metadata
Compilation timestamp:
6/20/1992 4:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
6144:NkeUVImDxjpkp/SOv+zoxVop1uZk74XCGzUYy6PpXpt/2ZGa:NngImDhpe/bvPAgHCu1HP7t/2ga

Entry address:
0x1000

Entry point:
E9, A7, EF, 03, 00, 8D, 05, 81, 10, 44, 00, 83, 60, 0C, 01, 83, F8, FF, 74, 0E, 89, 1D, 13, 10, 44, 00, 89, 05, 40, 10, 44, 00, EB, 07, 89, 1D, 15, 10, 44, 00, 4F, 89, 15, 59, 10, 44, 00, 66, C7, 05, 5C, 10, 44, 00, E3, 19, C3, 8D, 40, 00, C3, 8D, 40, 00, FF, 25, 24, 10, 44, 00, B8, 3C, 10, 40, 00, C3, 8D, 35, 82, 10, 44, 00, 83, 66, 1C, 25, 83, FA, FF, 7E, 0E, 89, 1D, 13, 10, 44, 00, 89, 05, 40, 10, 44, 00, EB, 07, 89, 1D, 15, 10, 44, 00, 4F, 89, 15, 59, 10, 44, 00, 66, C7, 05, 5C, 10, 44, 00, E3, 19, E8...
 
[+]

Packer / compiler:
Xtreme-Protector v1.05

Code size:
252.5 KB (258,560 bytes)