mipony 2.2.4 offline_by_maikooool.exe

The program is a setup application that uses the Self-extracting archive installer. The file has been seen being downloaded from fileshare1150.depositfiles.org.
MD5:
5ba8e179a65f0b516196eabeb10d18e9

SHA-1:
d30bd7c494d2edb9119b14ffc55aa9f854965023

SHA-256:
2d2bee7adaef374ff0b434fda038c929ec9507cf7464ba2af67327bc9199cdd4

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
12/28/2024 12:20:53 PM UTC  (today)

Scan engine
Detection
Engine version

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
1.0.0.1015

File size:
5.7 MB (5,955,012 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\mipony 2.2.4 offline_by_maikooool.exe

File PE Metadata
Compilation timestamp:
2/15/2015 5:00:31 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:BFvVJMX4z+DIrCOZrM8Tf8/3wxluCcmUGQ4Or4VM+IanLg/DLDdXr1:7VJ245rxZz8vYcaQ4VM+jnkbRr1

Entry address:
0x1D7CB

Entry point:
E8, 85, 63, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 82, FC, FF, FF, C7, 06, 20, B2, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 20, B2, 42, 00, E9, 37, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, 20, B2, 42, 00, E8, 24, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 52, CA, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Code size:
162 KB (165,888 bytes)

The file mipony 2.2.4 offline_by_maikooool.exe has been seen being distributed by the following URL.

Scan mipony 2.2.4 offline_by_maikooool.exe - Powered by Reason Core Security