× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 808a3b15b5d575609342d044eb4594e42b78df05e81289efee5d04558d4105ad
File name: xonotic-x64-sdl.exe
Detection ratio: 0 / 55
Analysis date: 2014-08-24 08:36:24 UTC ( 4 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20140824
AegisLab 20140824
Yandex 20140823
AhnLab-V3 20140823
AntiVir 20140823
Antiy-AVL 20140824
Avast 20140824
AVG 20140824
AVware 20140824
Baidu-International 20140824
BitDefender 20140824
Bkav 20140821
ByteHero 20140824
CAT-QuickHeal 20140823
ClamAV 20140824
CMC 20140822
Commtouch 20140824
Comodo 20140824
DrWeb 20140824
Emsisoft 20140824
ESET-NOD32 20140824
F-Prot 20140823
F-Secure 20140824
Fortinet 20140824
GData 20140824
Ikarus 20140824
Jiangmin 20140823
K7AntiVirus 20140822
K7GW 20140822
Kaspersky 20140824
Kingsoft 20140824
Malwarebytes 20140824
McAfee 20140824
McAfee-GW-Edition 20140823
Microsoft 20140824
eScan 20140824
NANO-Antivirus 20140824
Norman 20140824
nProtect 20140824
Panda 20140823
Qihoo-360 20140824
Rising 20140823
Sophos AV 20140824
SUPERAntiSpyware 20140823
Symantec 20140824
Tencent 20140824
TheHacker 20140822
TotalDefense 20140823
TrendMicro 20140824
TrendMicro-HouseCall 20140824
VBA32 20140822
VIPRE 20140824
ViRobot 20140824
Zillya 20140824
Zoner 20140822
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
FileVersionInfo properties
Copyright
id Software, Forest Hale, and contributors

Product DarkPlaces
Original name darkplaces.exe
Internal name darkplaces.exe
File version 1.0
Description DarkPlaces Game Engine
PE header basic information
Target machine x64
Compilation timestamp 2013-06-05 01:08:33
Entry Point 0x00001550
Number of sections 19
PE sections
PE imports
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetSystemPaletteEntries
SetDeviceGammaRamp
GetDeviceGammaRamp
DeleteDC
ChoosePixelFormat
SetPaletteEntries
BitBlt
CreateDIBSection
RealizePalette
DescribePixelFormat
CreatePalette
SelectPalette
UnrealizeObject
GetDIBits
SetPixelFormat
CreateCompatibleDC
SwapBuffers
SelectObject
SetDIBColorTable
GetSystemPaletteUse
DeleteObject
CreateCompatibleBitmap
SetSystemPaletteUse
GetLastError
InitializeCriticalSection
EnterCriticalSection
ReadFile
TerminateThread
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
QueryPerformanceCounter
GetTickCount
GlobalUnlock
VirtualProtect
GetVersionExA
GetModuleFileNameA
LoadLibraryA
GlobalSize
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
GetCurrentProcessId
ReleaseSemaphore
RtlVirtualUnwind
ReleaseMutex
UnhandledExceptionFilter
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
GetCurrentThread
CreateMutexA
SetFilePointer
QueryPerformanceFrequency
CreateSemaphoreA
WideCharToMultiByte
SetDllDirectoryA
GetModuleHandleA
FindFirstFileA
SetUnhandledExceptionFilter
RtlLookupFunctionEntry
GetStartupInfoA
RtlCaptureContext
CloseHandle
GetSystemTimeAsFileTime
FindNextFileA
GlobalMemoryStatusEx
GetACP
GlobalLock
SetEnvironmentVariableA
RtlAddFunctionTable
FreeLibrary
TerminateProcess
GetEnvironmentVariableA
WriteFile
CreateFileW
VirtualQuery
FindClose
TlsGetValue
Sleep
SetThreadPriority
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
MapWindowPoints
GetMessageA
RegisterClassA
GetKeyboardLayoutNameA
SetCapture
BeginPaint
SetFocus
ReleaseCapture
SetClassLongPtrA
KillTimer
ChangeDisplaySettingsA
ClipCursor
PostQuitMessage
DefWindowProcA
SetWindowTextA
SetWindowLongA
ToAsciiEx
GetClipboardData
GetSystemMetrics
GetMenu
GetWindowRect
DispatchMessageA
EndPaint
PostMessageA
LoadImageA
ScreenToClient
WindowFromPoint
PeekMessageA
DestroyCursor
AdjustWindowRectEx
TranslateMessage
LoadKeyboardLayoutA
CreateCursor
GetKeyState
GetCursorPos
ReleaseDC
GetClassInfoA
DestroyIcon
UnregisterClassA
ShowWindow
PtInRect
IsZoomed
MapVirtualKeyExA
GetClientRect
SetTimer
SetCursorPos
SetForegroundWindow
LoadIconA
SetCursor
GetWindowLongPtrA
SetWindowPos
ClientToScreen
InvalidateRect
GetWindowLongA
CreateWindowExA
EnumDisplaySettingsA
GetKeyboardState
ToUnicode
GetKeyboardLayout
AdjustWindowRect
CreateIconFromResourceEx
CallWindowProcA
GetCursor
GetDC
CloseClipboard
SetWindowLongPtrA
OpenClipboard
DestroyWindow
timeKillEvent
waveOutOpen
joyGetNumDevs
waveOutUnprepareHeader
waveOutClose
timeSetEvent
timeGetTime
timeEndPeriod
waveOutPrepareHeader
mciGetErrorStringA
waveOutWrite
waveOutGetErrorTextA
mciSendCommandA
joyGetDevCapsA
joyGetPosEx
timeBeginPeriod
recvfrom
getaddrinfo
socket
ioctlsocket
setsockopt
bind
WSACleanup
WSAStartup
freeaddrinfo
select
getsockname
sendto
ntohs
htons
closesocket
WSAGetLastError
__lconv_init
_lock
fclose
_time64
fflush
_fmode
strtol
fwrite
frexp
_setjmp
_close
ceil
strrchr
_write
memcpy
_putch
strstr
memmove
signal
remove
freopen
strcmp
memchr
strncmp
_kbhit
fgetc
memset
_stricmp
strchr
asin
isxdigit
ftell
exit
_unlink
_acmdln
_mkdir
strcspn
ferror
free
_aligned_malloc
__getmainargs
log
_lseeki64
cos
_vsnprintf
_read
islower
acos
isupper
strftime
_sopen
rand
realloc
__dllonexit
ldexp
toupper
_getch
fopen
_cexit
raise
isalnum
qsort
_dup
_onexit
memcmp
__setusermatherr
_gmtime64
srand
getenv
atoi
vfprintf
atof
isspace
_beginthreadex
strspn
_localtime64
_strnicmp
malloc
__iob_func
sscanf
fread
abort
fprintf
tan
strlen
_endthreadex
_amsg_exit
_errno
fseek
__initenv
_strdup
sin
tolower
atan
_unlock
calloc
setbuf
_aligned_free
_initterm
wcstombs
floor
atan2
exp
setvbuf
__set_app_type
PE exports
Number of PE resources by type
RT_ICON 9
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 11
PE resources
ExifTool file metadata
SubsystemVersion
5.2

LinkerVersion
2.56

ImageVersion
0.0

FileSubtype
3014758

FileVersionNumber
1.0.0.0

UninitializedDataSize
27922944

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

InitializedDataSize
2192856

EntryPoint
0x1550

OriginalFileName
darkplaces.exe

MIMEType
application/octet-stream

LegalCopyright
id Software, Forest Hale, and contributors

FileVersion
1.0

TimeStamp
2013:06:05 02:08:33+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
darkplaces.exe

ProductVersion
1.0

FileDescription
DarkPlaces Game Engine

OSVersion
4.0

FileOS
Unknown (0x6e0069)

Subsystem
Windows GUI

MachineType
AMD AMD64

CompanyName
Forest Hale Digital Services

CodeSize
2996736

ProductName
DarkPlaces

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 335aa76b9a18480a3b9b0d3508d399a7
SHA1 492b22da959523a8c7755ff3291046d9ae6e27e3
SHA256 808a3b15b5d575609342d044eb4594e42b78df05e81289efee5d04558d4105ad
ssdeep
98304:EOwkNve6M0qCN7bG4sX0QLErs8REFGRGY:dbNbN7a4sX0IGR

authentihash 5c432c91778f76f54efb82a09bbd319788413c98e0e05a4bee399edf1b997112
imphash 9f6008f212a390477f8b92fa1c9b716e
File size 6.3 MB ( 6632448 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI)

TrID Win64 Executable (generic) (87.3%)
Generic Win/DOS Executable (6.3%)
DOS Executable Generic (6.3%)
Tags
64bits peexe

VirusTotal metadata
First submission 2014-08-24 08:36:24 UTC ( 4 years, 3 months ago )
Last submission 2017-01-19 20:15:30 UTC ( 1 year, 11 months ago )
File names darkplaces.exe
xonotic-x64-sdl.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!