× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: 6977b26d0972d4137e2f46663abad7e559e6324f036e1a78857ac0f38ce5f5cd
Dateiname: FontBase Setup 2.0.1.exe
Erkennungsrate: 1 / 61
Analyse-Datum: 2017-05-09 11:44:25 UTC ( vor 2 Jahre ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Rising Malware.Generic.5!tfe (thunder:5:cKUDEAasDhL) 20170509
Ad-Aware 20170509
AegisLab 20170509
AhnLab-V3 20170508
Alibaba 20170509
ALYac 20170509
Antiy-AVL 20170509
Arcabit 20170509
Avast 20170509
AVG 20170509
Avira (no cloud) 20170509
AVware 20170508
Baidu 20170503
BitDefender 20170509
Bkav 20170508
CAT-QuickHeal 20170509
ClamAV 20170509
CMC 20170508
Comodo 20170509
CrowdStrike Falcon (ML) 20170130
Cyren 20170509
DrWeb 20170509
Emsisoft 20170509
Endgame 20170503
ESET-NOD32 20170509
F-Prot 20170509
F-Secure 20170509
Fortinet 20170509
GData 20170509
Ikarus 20170508
Sophos ML 20170413
Jiangmin 20170509
K7AntiVirus 20170509
K7GW 20170509
Kaspersky 20170509
Kingsoft 20170509
Malwarebytes 20170509
McAfee 20170509
McAfee-GW-Edition 20170508
Microsoft 20170509
eScan 20170509
NANO-Antivirus 20170509
nProtect 20170509
Palo Alto Networks (Known Signatures) 20170509
Panda 20170508
Qihoo-360 20170509
SentinelOne (Static ML) 20170330
Sophos AV 20170509
SUPERAntiSpyware 20170509
Symantec 20170508
Symantec Mobile Insight 20170509
Tencent 20170509
TheHacker 20170508
TrendMicro 20170509
TrendMicro-HouseCall 20170509
Trustlook 20170509
VBA32 20170506
VIPRE 20170509
ViRobot 20170509
Webroot 20170509
WhiteArmor 20170502
Yandex 20170504
Zillya 20170505
ZoneAlarm by Check Point 20170509
Zoner 20170509
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2017 Dominik Levitsky Studio

Product FontBase
Internal name FontBase
File version 2.0.1
Description FontBase
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-02-08 07:33:36
Entry Point 0x00009FF9
Number of sections 7
PE sections
PE imports
RegCreateKeyExW
GetTokenInformation
RegDeleteValueW
RegCloseKey
OpenProcessToken
GetUserNameW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegDeleteKeyW
RegQueryValueExW
InitCommonControlsEx
GetStdHandle
WaitForSingleObject
EncodePointer
GetFileAttributesW
VerifyVersionInfoW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
GetExitCodeProcess
OutputDebugStringW
FindClose
TlsGetValue
MoveFileW
SetLastError
LoadResource
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
lstrcmpiW
VerSetConditionMask
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
SetEnvironmentVariableW
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
DecodePointer
TerminateProcess
GetModuleHandleExW
LocalFileTimeToFileTime
GetCurrentThreadId
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
InitializeCriticalSectionEx
RtlUnwind
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
CompareStringW
FindNextFileW
ResetEvent
FindFirstFileExW
CreateEventW
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
GetConsoleCP
FindResourceW
GetEnvironmentStringsW
WaitForSingleObjectEx
lstrlenW
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
FreeResource
IsValidCodePage
GetTempPathW
CreateProcessW
GetOEMCP
VarUI4FromStr
SysFreeString
VariantClear
VariantInit
SysAllocString
SHGetFolderPathW
ShellExecuteW
ShellExecuteExW
PathIsUNCW
MessageBoxW
GetActiveWindow
LoadStringW
wsprintfW
CharNextW
ExitWindowsEx
DestroyWindow
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoTaskMemAlloc
CoCreateInstance
URLDownloadToFileW
Number of PE resources by type
RT_ICON 13
RT_GROUP_ICON 2
RT_MANIFEST 1
RT_STRING 1
DATA 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 19
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
6.0

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.1.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
61295616

SquirrelAwareVersion
1

EntryPoint
0x9ff9

MIMEType
application/octet-stream

LegalCopyright
Copyright 2017 Dominik Levitsky Studio

FileVersion
2.0.1

TimeStamp
2017:02:08 08:33:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
FontBase

ProductVersion
2.0.1.0

FileDescription
FontBase

OSVersion
6.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Dominik Levitsky Studio

CodeSize
113664

ProductName
FontBase

ProductVersionNumber
2.0.1.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 691530fc0cc5c5be16cabff0db3f9e2b
SHA1 f62d280bb6f97f421bdbb0ad6dc62b15d1fdc2f9
SHA256 6977b26d0972d4137e2f46663abad7e559e6324f036e1a78857ac0f38ce5f5cd
ssdeep
1572864:5F/K+uX9cDW/TAlVPPuzQ0ctiw3eSJJAjnU:5F299/TAlt53eSJW

authentihash 78111ac022a2712738af42435887dcfd9c29f763f0850048a7d92599606ee97f
imphash e7536ba0a6bb1ec857fcd176fd7cf803
File size 58.6 MB ( 61410304 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe

VirusTotal metadata
First submission 2017-05-09 11:44:25 UTC ( vor 2 Jahre )
Last submission 2017-05-09 11:44:25 UTC ( vor 2 Jahre )
Dateinamen FontBase
FontBase Setup 2.0.1.exe
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!