× Cookies sind ausgeschaltet! Diese Seite erfordert aktivierte Cookies, um vollständig zu funktionieren.
SHA256: b6a57c262d6573277dabd1d123118c92839e2fe2a83f601c8d6f09f6f2c4411d
Dateiname: Force-qt.exe
Erkennungsrate: 0 / 67
Analyse-Datum: 2017-10-27 10:14:45 UTC ( vor 9 Monate, 3 Wochen ) Zeige Neueste
Antivirus Ergebnis Aktualisierung
Ad-Aware 20171027
AegisLab 20171027
AhnLab-V3 20171027
Alibaba 20170911
ALYac 20171027
Antiy-AVL 20171027
Arcabit 20171027
Avast 20171027
Avast-Mobile 20171027
AVG 20171027
Avira (no cloud) 20171027
AVware 20171027
Baidu 20171027
BitDefender 20171027
Bkav 20171025
CAT-QuickHeal 20171027
ClamAV 20171027
CMC 20171026
Comodo 20171027
CrowdStrike Falcon (ML) 20171016
Cybereason 20170628
Cylance 20171027
Cyren 20171027
DrWeb 20171027
eGambit 20171027
Emsisoft 20171027
Endgame 20171024
ESET-NOD32 20171027
F-Prot 20171027
F-Secure 20171027
Fortinet 20171027
GData 20171027
Ikarus 20171027
Sophos ML 20170914
Jiangmin 20171027
K7AntiVirus 20171027
K7GW 20171027
Kaspersky 20171027
Kingsoft 20171027
Malwarebytes 20171027
MAX 20171027
McAfee 20171027
McAfee-GW-Edition 20171027
Microsoft 20171027
eScan 20171027
NANO-Antivirus 20171027
nProtect 20171027
Palo Alto Networks (Known Signatures) 20171027
Panda 20171026
Qihoo-360 20171027
Rising 20171027
SentinelOne (Static ML) 20171019
Sophos AV 20171027
SUPERAntiSpyware 20171027
Symantec 20171027
Symantec Mobile Insight 20171027
Tencent 20171027
TheHacker 20171024
TrendMicro 20171027
TrendMicro-HouseCall 20171027
Trustlook 20171027
VBA32 20171026
VIPRE 20171027
ViRobot 20171027
Webroot 20171027
WhiteArmor 20171024
Yandex 20171026
Zillya 20171027
ZoneAlarm by Check Point 20171027
Zoner 20171027
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2009-2014 The Bitcoin developers, 2012-2014 The NovaCoin & PPCoin developers, 2015-2017 The Force developers

Product Force-Qt
Original name Force-qt.exe
Internal name Force-qt
File version 2.1.0.3
Description Force-Qt (OSS GUI client for Force)
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1977-05-13 11:36:32
Entry Point 0x000014C0
Number of sections 11
PE sections
PE imports
RegCreateKeyExW
SetSecurityDescriptorOwner
RegCloseKey
CopySid
RegQueryValueExA
InitializeAcl
RegDeleteKeyW
RegQueryValueExW
SetSecurityDescriptorDacl
RegFlushKey
OpenProcessToken
DeregisterEventSource
AddAccessAllowedAce
RegOpenKeyExW
RegisterEventSourceA
GetTokenInformation
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
GetLengthSid
RegDeleteValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
ReportEventA
SetSecurityDescriptorGroup
PrintDlgExW
CertFreeCertificateContext
CertFreeCertificateChain
CertCreateCertificateContext
CertGetCertificateChain
SetGraphicsMode
StartDocW
GetCharABCWidthsW
GetCharABCWidthsFloatW
RemoveFontMemResourceEx
CreateFontIndirectW
SetBkMode
GetGlyphOutlineW
CreatePen
GetBkMode
SaveDC
SetTextAlign
EndPath
CombineRgn
GetTextMetricsW
GetBitmapBits
GetDeviceCaps
CreateDCA
LineTo
OffsetRgn
DeleteDC
SetWorldTransform
RestoreDC
PolyBezierTo
StretchBlt
EndDoc
StartPage
GetRegionData
FillPath
CreateDCW
CreateDIBSection
SetTextColor
GetObjectA
MoveToEx
ExtTextOutW
GetObjectW
GetTextFaceW
CreateBitmap
BitBlt
EnumFontFamiliesExW
AddFontMemResourceEx
GetStockObject
GetOutlineTextMetricsW
GetDIBits
GdiFlush
SelectClipRgn
CreateCompatibleDC
GetTextExtentPoint32W
RemoveFontResourceExW
StrokePath
EndPage
CreateRectRgn
CloseFigure
AbortDoc
SetPolyFillMode
AddFontResourceExW
CreateSolidBrush
ExtCreatePen
SelectObject
GetFontData
ResetDCW
BeginPath
DeleteObject
CreateCompatibleBitmap
SelectClipPath
ImmSetCompositionWindow
ImmGetDefaultIMEWnd
ImmNotifyIME
ImmGetContext
ImmSetCandidateWindow
ImmReleaseContext
ImmGetCompositionStringW
GetIpAddrTable
GetBestRoute
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
CreateFileMappingA
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
GetHandleInformation
GetFileAttributesW
lstrcmpW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
MoveFileW
UnhandledExceptionFilter
IsValidLanguageGroup
OpenFileMappingA
SetErrorMode
GetLogicalDrives
GetFileInformationByHandle
GetThreadContext
GetLocaleInfoW
GetFileTime
IsDBCSLeadByteEx
GetTempPathA
CheckRemoteDebuggerPresent
WideCharToMultiByte
GetOverlappedResult
GetTempPathW
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetThreadPriority
SetEvent
LocalFree
FormatMessageW
ConnectNamedPipe
SetWaitableTimer
GetEnvironmentVariableA
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
GetFullPathNameW
QueueUserWorkItem
OutputDebugStringA
VirtualQuery
SetLastError
GetUserDefaultUILanguage
GetSystemTime
DeviceIoControl
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
GetModuleFileNameW
TryEnterCriticalSection
ExitProcess
GetVersionExA
GetModuleFileNameA
FlushViewOfFile
QueueUserAPC
VerSetConditionMask
SetThreadPriority
CreateDirectoryExW
GetVolumeInformationW
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
SetProcessAffinityMask
MoveFileExW
FindNextChangeNotification
SetFilePointer
SetFileAttributesW
LockFileEx
CreateSemaphoreA
CreateThread
VirtualLock
GetGeoInfoW
GetSystemDirectoryW
DisconnectNamedPipe
CreateSemaphoreW
CreateMutexW
MoveFileExA
SetThreadContext
MoveFileA
GlobalMemoryStatus
FindCloseChangeNotification
SetUnhandledExceptionFilter
GetVersion
SetCurrentDirectoryW
GlobalAlloc
GetDiskFreeSpaceExW
SetEndOfFile
GetCurrentThreadId
SleepEx
CloseHandle
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
PeekNamedPipe
TerminateThread
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
WaitForSingleObjectEx
GlobalSize
GetStartupInfoA
UnlockFile
SetHandleInformation
OpenProcess
CreateDirectoryA
DeleteFileA
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GetProcAddress
GetSystemInfo
GetProcessHeap
CreateWaitableTimerW
CompareStringW
SetCriticalSectionSpinCount
GetFileSizeEx
RemoveDirectoryW
ExpandEnvironmentStringsW
FindNextFileW
WaitForMultipleObjectsEx
ResetEvent
CreateWaitableTimerA
FindNextFileA
IsValidLocale
DuplicateHandle
FindFirstFileExW
GetUserDefaultLCID
GetProcessAffinityMask
CreateEventW
CreateFileW
GetConsoleWindow
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
GetCurrencyFormatW
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
CreateFileMappingW
VirtualAllocEx
CreateNamedPipeW
GlobalFree
ResumeThread
GetTimeFormatW
GlobalUnlock
GetUserGeoID
FindFirstChangeNotificationW
VirtualFree
GetQueuedCompletionStatus
LockFile
SwitchToThread
GetCurrentDirectoryW
VirtualFreeEx
GetCurrentProcessId
WaitNamedPipeW
CreateIoCompletionPort
SetFileTime
GetCommandLineW
CancelIo
GetCurrentThread
SuspendThread
QueryPerformanceFrequency
ReleaseSemaphore
MapViewOfFile
TlsFree
GetModuleHandleA
VirtualUnlock
ReadFile
PulseEvent
FindFirstFileA
VerifyVersionInfoW
GlobalLock
GetModuleHandleW
GetFileAttributesExW
GetLongPathNameW
UnmapViewOfFile
WriteFile
PostQueuedCompletionStatus
CreateProcessW
WaitForMultipleObjects
Sleep
TerminateProcess
OpenEventA
VirtualAlloc
GetAcceptExSockaddrs
AcceptEx
VariantInit
SysAllocStringLen
SHBrowseForFolderW
Shell_NotifyIconW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderPathA
SHGetFileInfoW
SHGetSpecialFolderPathW
SHGetMalloc
PathFileExistsW
PathRemoveFileSpecW
SetFocus
GetForegroundWindow
SetWindowRgn
TrackMouseEvent
SetWindowPos
EndPaint
SetMenuItemInfoW
GetDC
DestroyCursor
GetCursorPos
ChildWindowFromPointEx
GetMenu
TranslateMessage
UnregisterClassW
GetClassInfoW
ToAscii
SetCaretPos
CallNextHookEx
GetSysColor
LoadImageW
GetWindowTextW
DestroyWindow
GetUserObjectInformationW
GetParent
GetCursorInfo
EnumWindows
CreateCaret
ShowWindow
FlashWindowEx
EnumDisplayMonitors
PeekMessageW
GetClipboardFormatNameW
GetSystemMenu
SetParent
DestroyCaret
CreateCursor
CharNextExA
GetIconInfo
GetQueueStatus
RegisterClassW
IsZoomed
GetWindowPlacement
SetWindowLongW
GetKeyboardLayoutList
IsIconic
TrackPopupMenuEx
SetTimer
GetKeyboardLayout
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetUpdateRect
IsChild
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
BeginPaint
DefWindowProcW
KillTimer
MapVirtualKeyW
SetClipboardViewer
GetSystemMetrics
EnableMenuItem
GetWindowRect
SetCapture
ReleaseCapture
GetMessageExtraInfo
GetProcessWindowStation
DrawIconEx
SetWindowTextW
FindWindowW
ClientToScreen
PostMessageW
GetKeyboardState
GetDesktopWindow
SetWindowsHookExW
LoadIconW
FindWindowExW
DispatchMessageW
SetForegroundWindow
NotifyWinEvent
GetAsyncKeyState
GetCaretBlinkTime
ReleaseDC
HideCaret
CreateIconIndirect
GetCapture
ScreenToClient
MessageBeep
GetWindowThreadProcessId
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
MessageBoxA
ChangeClipboardChain
AdjustWindowRectEx
MsgWaitForMultipleObjectsEx
RegisterClipboardFormatW
GetKeyState
GetDoubleClickTime
DestroyIcon
RealGetWindowClassW
IsWindowVisible
SetCursorPos
SystemParametersInfoW
InvalidateRect
GetClientRect
ToUnicode
GetFocus
GetAncestor
SetCursor
PlaySoundW
DeviceCapabilitiesW
DocumentPropertiesW
GetDefaultPrinterW
EnumPrintersW
GetPrinterW
ClosePrinter
OpenPrinterW
getaddrinfo
htonl
WSAConnect
WSARecvFrom
WSARecv
accept
ioctlsocket
WSAStartup
freeaddrinfo
WSASocketW
getsockname
WSAAddressToStringA
htons
getnameinfo
WSAGetLastError
gethostname
getsockopt
WSAAccept
recv
WSAHtons
ntohl
inet_addr
WSASend
ntohs
WSAHtonl
select
gethostbyaddr
listen
WSANtohl
__WSAFDIsSet
shutdown
WSACleanup
gethostbyname
WSASetLastError
WSAAsyncSelect
closesocket
WSAIoctl
WSANtohs
setsockopt
socket
getpeername
bind
WSASendTo
sendto
send
connect
__lconv_init
wcsftime
fseek
fclose
_snwprintf
strtoul
fflush
isxdigit
_fmode
strtol
fputc
system
strtok
fwrite
frexp
fputs
_fstat64
isspace
_close
iswctype
_timezone
wcscoll
_exit
__dllonexit
_wfopen
strstr
_write
_clearfp
memcpy
perror
ctime
memmove
localtime
signal
remove
freopen
_initterm
strcmp
memchr
strncmp
wcscmp
fgetc
memset
strcat
_stricmp
_setmode
fgets
__pioinfo
strchr
asin
clock
_beginthread
fgetpos
fsetpos
strftime
ftell
__initenv
exit
sprintf
strrchr
_acmdln
strcspn
ferror
gmtime
free
ungetc
_getdrive
__getmainargs
ungetwc
_stat
_lseeki64
_vsnprintf
putchar
puts
_read
wcsxfrm
strcpy
__mb_cur_max
islower
acos
isupper
_ftime
_iob
rand
_putenv
setlocale
realloc
_getcwd
strxfrm
__doserrno
_open_osfhandle
fwprintf
isprint
_setjmp3
toupper
printf
fopen
_memicmp
strncpy
_cexit
raise
isalnum
mktime
qsort
_tzset
_open
_onexit
wcslen
isalpha
_snprintf
putc
memcmp
__setusermatherr
log10
srand
_fdopen
getenv
atoi
vfprintf
atol
atof
strcoll
localeconv
strerror
wcscpy
_beginthreadex
_strnicmp
putwc
_tzname
malloc
sscanf
fread
_waccess
abort
fprintf
getwc
tan
ispunct
feof
_endthreadex
_amsg_exit
_control87
strlen
_lock
_get_osfhandle
_strdup
towlower
_fileno
wcsrchr
longjmp
tolower
atan
_unlock
calloc
setbuf
_getch
towupper
iswprint
_errno
atan2
_filelengthi64
setvbuf
time
wcsstr
_wgetdcwd
getc
_wchmod
__set_app_type
OleUninitialize
CoUninitialize
CoInitialize
OleFlushClipboard
CoLockObjectExternal
ReleaseStgMedium
CoCreateGuid
RegisterDragDrop
CoCreateInstance
DoDragDrop
RevokeDragDrop
OleSetClipboard
CoGetMalloc
OleGetClipboard
OleIsCurrentClipboard
CoTaskMemFree
OleInitialize
PE exports
Number of PE resources by type
RT_ICON 5
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
UninitializedDataSize
49664

LinkerVersion
2.24

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
2.1.0.3

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

FileDescription
Force-Qt (OSS GUI client for Force)

CharacterSet
Windows, Latin1

InitializedDataSize
28515328

EntryPoint
0x14c0

OriginalFileName
Force-qt.exe

MIMEType
application/octet-stream

LegalCopyright
2009-2014 The Bitcoin developers, 2012-2014 The NovaCoin & PPCoin developers, 2015-2017 The Force developers

FileVersion
2.1.0.3

LegalTrademarks1
Distributed under the MIT/X11 software license, see the accompanying file COPYING or http://www.opensource.org/licenses/mit-license.php.

TimeStamp
1977:05:13 12:36:32+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Force-qt

ProductVersion
2.1.0.3

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Force

CodeSize
18292224

ProductName
Force-Qt

ProductVersionNumber
2.1.0.3

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 552534161fc55232a7f599f7d5d9ed2e
SHA1 fbd2d889df89e4b2ae44ca95c7111a59c7293418
SHA256 b6a57c262d6573277dabd1d123118c92839e2fe2a83f601c8d6f09f6f2c4411d
ssdeep
393216:2IW561xw8Yf4RVO/zPol94QuvRh8XJsv6tWKFdu9C9EP:w2ZYf3LYaNRn

authentihash da0db1b03bf713d322859fb4ea1bdfd745f6bfddf216925a85bd8cc7b709ae5c
imphash 5dbea40aa2821ae73f2021487298830e
File size 27.2 MB ( 28516352 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 EXE PECompact compressed (generic) (83.0%)
Win32 Executable (generic) (9.0%)
Generic Win/DOS Executable (3.9%)
DOS Executable Generic (3.9%)
Tags
peexe

VirusTotal metadata
First submission 2017-10-27 10:14:45 UTC ( vor 9 Monate, 3 Wochen )
Last submission 2017-11-15 12:12:31 UTC ( vor 9 Monate, 1 Woche )
Dateinamen Force-qt
Force-qt.exe
Keine Kommentare. Bisher hat kein Mitglied der VirusTotal-Community einen Kommentar zu diesem Punkt verfasst, seien Sie der Erste!

Hinterlassen Sie Ihren Kommentar...

?
Kommentar abschicken

Sie sind nicht angemeldet. Nur registrierte Nutzer können Kommentare hinterlassen, melden Sie sich an und sagen Sie etwas dazu!

Keine Bewertungen. Niemand hat diesen Punkt bisher bewertet, seien Sie der Erste!