× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4a79bedc0ce8f009f696f964b49a82d722ed2f969a9e831f3ceb570f53cf2354
File name: StarWars.exe
Detection ratio: 1 / 56
Analysis date: 2015-10-11 19:28:31 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Jiangmin Trojan/Blocker.akvw 20151010
Ad-Aware 20151011
AegisLab 20151011
Yandex 20151011
AhnLab-V3 20151011
Alibaba 20151010
ALYac 20151011
Antiy-AVL 20151011
Arcabit 20151011
Avast 20151011
AVG 20151011
Avira (no cloud) 20151011
AVware 20151011
Baidu-International 20151011
BitDefender 20151011
Bkav 20151010
ByteHero 20151011
CAT-QuickHeal 20151010
ClamAV 20151009
CMC 20151009
Comodo 20151011
Cyren 20151011
DrWeb 20151011
Emsisoft 20151011
ESET-NOD32 20151011
F-Prot 20151011
F-Secure 20151010
Fortinet 20151011
GData 20151011
Ikarus 20151011
K7AntiVirus 20151011
K7GW 20151010
Kaspersky 20151011
Kingsoft 20151011
Malwarebytes 20151011
McAfee 20151011
McAfee-GW-Edition 20151011
Microsoft 20151011
eScan 20151011
NANO-Antivirus 20151011
nProtect 20151008
Panda 20151011
Qihoo-360 20151011
Rising 20151010
Sophos AV 20151011
SUPERAntiSpyware 20151011
Symantec 20151011
Tencent 20151011
TheHacker 20151010
TrendMicro 20151011
TrendMicro-HouseCall 20151011
VBA32 20151009
VIPRE 20151011
ViRobot 20151011
Zillya 20151011
Zoner 20151011
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
FileVersionInfo properties
Copyright
2015

Internal name K-Toggler
File version 0.2.5.0
Description Macro program for Starwars Battlefront
PE header basic information
Target machine x64
Compilation timestamp 2015-01-24 23:47:30
Entry Point 0x000C7EC0
Number of sections 7
PE sections
PE imports
RegCreateKeyExW
CloseServiceHandle
RegEnumValueW
RegConnectRegistryW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegDeleteValueW
RegQueryInfoKeyW
GetUserNameW
OpenSCManagerW
RegEnumKeyExW
LockServiceDatabase
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
UnlockServiceDatabase
RegQueryValueExW
ImageList_Destroy
CreateStatusWindowW
ImageList_AddMasked
ImageList_GetIconSize
ImageList_Create
Ord(17)
ImageList_ReplaceIcon
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
CreatePolygonRgn
GetTextMetricsW
GetSystemPaletteEntries
GetClipBox
GetPixel
GetDeviceCaps
ExcludeClipRect
DeleteDC
SetBkMode
GetObjectW
BitBlt
CreateDIBSection
SetTextColor
FillRgn
CreateEllipticRgn
GetTextFaceW
CreateDCW
EnumFontFamiliesExW
GetStockObject
GetDIBits
GdiFlush
CreateRoundRectRgn
CreateCompatibleDC
CreateFontW
CreateRectRgn
SelectObject
CreateSolidBrush
GetClipRgn
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
GetPrivateProfileSectionNamesW
FlsGetValue
GetFileAttributesW
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
UnhandledExceptionFilter
RtlUnwindEx
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
GetDiskFreeSpaceW
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
FormatMessageW
IsWow64Process
InitializeCriticalSection
OutputDebugStringW
FindClose
QueryDosDeviceW
MoveFileW
GetFullPathNameW
EncodePointer
GetEnvironmentVariableW
SetLastError
GetSystemTime
DeviceIoControl
CopyFileW
WriteProcessMemory
LoadResource
RemoveDirectoryW
Beep
IsDebuggerPresent
ExitProcess
FlushFileBuffers
HeapSetInformation
SetThreadPriority
WritePrivateProfileSectionW
RtlVirtualUnwind
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
SetFileAttributesW
CreateThread
SetEnvironmentVariableW
GetExitCodeThread
SetUnhandledExceptionFilter
CreateMutexW
MulDiv
DecodePointer
SetPriorityClass
TerminateProcess
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
VirtualProtect
FlsSetValue
lstrcmpiW
FreeLibrary
GlobalSize
RtlPcToFileHeader
GetWindowsDirectoryW
GetFileSize
OpenProcess
GetModuleHandleW
GetDateFormatW
GetStartupInfoW
ReadProcessMemory
CreateDirectoryW
DeleteFileW
GlobalLock
GetProcessHeap
GetComputerNameW
EnumResourceNamesW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
FindNextFileW
RtlLookupFunctionEntry
FindFirstFileW
GetProcAddress
SetVolumeLabelW
GetPrivateProfileSectionW
CreateFileW
GetFileType
HeapAlloc
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
GetShortPathNameW
VirtualAllocEx
GlobalFree
GetConsoleCP
FindResourceW
GetTimeFormatW
GetEnvironmentStringsW
GlobalUnlock
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
VirtualFreeEx
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
GetCPInfo
HeapSize
FlsAlloc
FlsFree
WritePrivateProfileStringW
RaiseException
SetFilePointer
ReadFile
RtlCaptureContext
CloseHandle
GetACP
GetCurrentThreadId
IsValidCodePage
HeapCreate
GetTempPathW
CreateProcessW
Sleep
SafeArrayDestroy
VariantChangeType
SafeArrayAccessData
SafeArrayGetLBound
SysFreeString
SafeArrayPtrOfIndex
SafeArrayCreate
SafeArrayUnaccessData
VariantCopyInd
VariantClear
SysAllocString
GetActiveObject
SafeArrayUnlock
SafeArrayGetUBound
SafeArrayLock
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCopy
OleLoadPicture
SysStringLen
GetModuleFileNameExW
GetModuleBaseNameW
SHGetFolderPathW
SHBrowseForFolderW
DragQueryFileW
SHFileOperationW
ExtractIconW
SHGetPathFromIDListW
DragQueryPoint
ShellExecuteExW
SHGetDesktopFolder
Shell_NotifyIconW
SHGetMalloc
DragFinish
RedrawWindow
GetMessagePos
SetWindowRgn
RegisterWindowMessageW
UnregisterHotKey
SetMenuDefaultItem
DestroyMenu
PostQuitMessage
GetForegroundWindow
SetWindowPos
IsWindow
ScreenToClient
WindowFromPoint
SetMenuItemInfoW
SetActiveWindow
GetDC
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetKeyState
GetMenu
GetClientRect
DrawTextW
CallNextHookEx
IsClipboardFormatAvailable
LoadImageW
CountClipboardFormats
GetTopWindow
RegisterHotKey
GetWindowTextW
EnumClipboardFormats
GetWindowTextLengthW
LoadAcceleratorsW
GetQueueStatus
DestroyWindow
GetClassInfoExW
UpdateWindow
EnumWindows
CheckRadioButton
GetMessageW
ShowWindow
SetMenuInfo
GetDesktopWindow
IsCharAlphaW
PeekMessageW
EnableWindow
CharUpperW
GetClipboardFormatNameW
SetClipboardViewer
TranslateMessage
IsWindowEnabled
GetWindow
GetIconInfo
SetParent
SetClipboardData
IsZoomed
IsCharLowerW
EnableMenuItem
TrackPopupMenuEx
GetSubMenu
CreateMenu
GetKeyboardLayout
FlashWindow
CreateAcceleratorTableW
GetSysColorBrush
CreateWindowExW
GetWindowLongW
GetMenuStringW
MapWindowPoints
VkKeyScanExW
SetWindowLongPtrW
IsIconic
EmptyClipboard
SystemParametersInfoW
DefWindowProcW
keybd_event
KillTimer
MapVirtualKeyW
GetClipboardData
GetParent
ToUnicodeEx
GetSystemMetrics
SetWindowLongW
GetWindowRect
IsDialogMessageW
EnumChildWindows
IsMenu
CharLowerW
SendDlgItemMessageW
SetKeyboardState
GetCursor
CreatePopupMenu
CheckMenuItem
PtInRect
DrawIconEx
SetWindowTextW
SetTimer
GetDlgItem
BringWindowToTop
SendInput
ClientToScreen
PostMessageW
GetKeyboardState
PostThreadMessageW
GetMenuItemCount
GetClassLongPtrW
AttachThreadInput
DestroyAcceleratorTable
CreateIconFromResourceEx
SetWindowsHookExW
LoadCursorW
FindWindowW
GetMenuItemID
FillRect
SetForegroundWindow
ExitWindowsEx
SetFocus
OpenClipboard
GetAsyncKeyState
IntersectRect
SetLayeredWindowAttributes
EndDialog
CreateIconIndirect
MessageBeep
GetCaretPos
RemoveMenu
GetWindowThreadProcessId
MessageBoxW
SendMessageW
RegisterClassExW
UnhookWindowsHookEx
MoveWindow
DialogBoxParamW
AppendMenuW
ChangeClipboardChain
AdjustWindowRectEx
mouse_event
GetFocus
GetSysColor
SetDlgItemTextW
CopyImage
DestroyIcon
IsWindowVisible
IsCharAlphaNumericW
GetLastInputInfo
DispatchMessageW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
IsCharUpperW
SendMessageTimeoutW
CloseClipboard
DefDlgProcW
SetMenu
TranslateAcceleratorW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
mixerGetLineControlsW
mixerGetControlDetailsW
mixerOpen
waveOutSetVolume
mixerSetControlDetails
mciSendStringW
mixerClose
mixerGetDevCapsW
waveOutGetVolume
mixerGetLineInfoW
joyGetPosEx
joyGetDevCapsW
WSAStartup
gethostbyname
gethostname
inet_addr
WSACleanup
CreateStreamOnHGlobal
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateInstance
CoGetObject
CLSIDFromString
StringFromGUID2
Number of PE resources by type
RT_ICON 9
RT_RCDATA 7
RT_GROUP_ICON 5
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 26
PE resources
ExifTool file metadata
SubsystemVersion
5.2

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
0.2.5.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
434176

EntryPoint
0xc7ec0

MIMEType
application/octet-stream

LegalCopyright
2015

FileVersion
0.2.5.0

TimeStamp
2015:01:25 00:47:30+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
K-Toggler

ProductVersion
1.1.19.2

FileDescription
Macro program for Starwars Battlefront

OSVersion
5.2

FileOS
Win32

Subsystem
Windows GUI

MachineType
AMD AMD64

CompanyName
MontagesNmore

CodeSize
886272

FileSubtype
0

ProductVersionNumber
1.1.19.2

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e7449549a373429506caa0a22f9ea0da
SHA1 c792c99fe0819fcfafa696dc9fb47a9c43ae68db
SHA256 4a79bedc0ce8f009f696f964b49a82d722ed2f969a9e831f3ceb570f53cf2354
ssdeep
24576:TNLxuPtrN+ZAHArIm2rWvKuVLMunRaQM+OVPyhY9MFr115CY1jTaQKCnnqcPZ0ea:TNLxuPtrN+ZAHAMTrWvKuVLMURaQM5Fj

authentihash e8d258cf7d0afea76564788c27aee6bddf2964be27d45fde06c7de2ddba37193
imphash 18a0aef7f7323cb3179567f887934ab5
File size 1.3 MB ( 1321472 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Generic Win/DOS Executable (49.9%)
DOS Executable Generic (49.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
Tags
64bits peexe assembly

VirusTotal metadata
First submission 2015-10-11 19:28:31 UTC ( 3 years, 1 month ago )
Last submission 2015-10-11 19:28:31 UTC ( 3 years, 1 month ago )
File names StarWars.exe
K-Toggler
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!