× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 87184f0b3b8b37ad606b1315560858fef73abbc806b79749137a9c719e19c016
File name: Vape Launcher.exe
Detection ratio: 0 / 53
Analysis date: 2016-07-19 21:07:08 UTC ( 1 year, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160719
AegisLab 20160719
AhnLab-V3 20160719
Alibaba 20160719
ALYac 20160719
Antiy-AVL 20160719
Arcabit 20160719
Avast 20160719
AVG 20160719
AVware 20160719
Baidu 20160719
BitDefender 20160719
Bkav 20160719
CAT-QuickHeal 20160719
ClamAV 20160719
CMC 20160715
Comodo 20160719
Cyren 20160719
DrWeb 20160719
Emsisoft 20160719
ESET-NOD32 20160719
F-Prot 20160719
F-Secure 20160719
Fortinet 20160719
GData 20160719
Ikarus 20160719
Jiangmin 20160719
K7AntiVirus 20160719
K7GW 20160719
Kaspersky 20160719
Kingsoft 20160719
Malwarebytes 20160719
McAfee 20160719
McAfee-GW-Edition 20160719
Microsoft 20160719
eScan 20160719
NANO-Antivirus 20160719
nProtect 20160719
Panda 20160719
Qihoo-360 20160719
Sophos AV 20160719
SUPERAntiSpyware 20160719
Symantec 20160719
Tencent 20160719
TheHacker 20160719
TrendMicro 20160719
TrendMicro-HouseCall 20160719
VBA32 20160719
VIPRE 20160719
ViRobot 20160719
Yandex 20160717
Zillya 20160719
Zoner 20160719
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
PE header basic information
Target machine x64
Compilation timestamp 2016-07-19 21:00:39
Entry Point 0x000025B8
Number of sections 7
PE sections
PE imports
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
GetStdHandle
FindFirstFileW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
FormatMessageW
LoadResource
FindClose
TlsGetValue
SetLastError
ReadConsoleInputA
WriteProcessMemory
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
RaiseException
AllocConsole
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TerminateProcess
GetModuleHandleExW
VirtualQueryEx
SetEndOfFile
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
FreeLibrary
QueryPerformanceCounter
SetConsoleTextAttribute
TlsAlloc
FlushFileBuffers
CreateRemoteThread
OpenProcess
GetStartupInfoW
GetProcAddress
GetProcessHeap
FindFirstFileExA
FindNextFileW
RtlLookupFunctionEntry
FindNextFileA
RtlUnwindEx
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
VirtualAllocEx
GetConsoleCP
GetEnvironmentStringsW
Process32NextW
SizeofResource
VirtualFreeEx
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
Process32FirstW
SetConsoleTitleW
ReadConsoleW
TlsFree
ReadFile
RtlCaptureContext
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
SetConsoleMode
FindResourceW
GetWindowThreadProcessId
EnumWindows
GetWindowTextW
Number of PE resources by type
BINARY 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
AMD AMD64

TimeStamp
2016:07:19 22:00:39+01:00

FileType
Win64 EXE

PEType
PE32+

CodeSize
76288

LinkerVersion
14.0

FileTypeExtension
exe

InitializedDataSize
148480

SubsystemVersion
6.0

EntryPoint
0x25b8

OSVersion
6.0

ImageVersion
0.0

UninitializedDataSize
0

Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 0d32c4033b75e62d29d6fcab32f63314
SHA1 e2691383097c2f30cab90853c20e13a828397949
SHA256 87184f0b3b8b37ad606b1315560858fef73abbc806b79749137a9c719e19c016
ssdeep
3072:VooY/9lrmU+HzGMCR1DiTojqL+og4M1u61bjwqIVLhfQMmBoQB+DQvaaLCjqSnea:BY/9wUwORYojqng4XRRzf+TB+8vpk

authentihash 551f15b4d1ae2b0c344b6527f46f3c3a3697f77c8bb59ffb15150fcc323ef9d7
imphash 6f245a1908dfcd21b29079a38c5b5616
File size 216.0 KB ( 221184 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Win64 Executable (generic) (87.3%)
Generic Win/DOS Executable (6.3%)
DOS Executable Generic (6.3%)
Tags
64bits peexe assembly

VirusTotal metadata
First submission 2016-07-19 21:07:08 UTC ( 1 year, 5 months ago )
Last submission 2017-12-05 09:59:29 UTC ( 1 week, 6 days ago )
File names FPS Regedit.exe
AWFA
Vape.exe
Adobe.exe
WinPcap_4_1_3.exe
cv.exe
2HC4 Launcher.exe
Vape Launcher.exe
Vape Launcheur.exe
asddf.exe
346sf2.exe
tekkit launcher.exe
date ariane.exe
MICROSOFT.PHOTOS.exe
iTunes 1.1.6 setup.exe
Run IF.exe
fxplugins.exe
vape launcher.exe
Vape Launcher.exe
Vape Launcher.exe
vape.exe
Vape (ReloxEdited).exe
Calin.exe
zombie_villager4.exe
ScuolaGuida.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!