× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9b6967376ab965d9a3655100eeeda97694a61a2c70781e03b79fc269db7912af
File name: Vape Launcher.exe
Detection ratio: 0 / 52
Analysis date: 2016-07-20 14:18:18 UTC ( 8 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20160720
AegisLab 20160720
AhnLab-V3 20160720
Alibaba 20160720
ALYac 20160720
Antiy-AVL 20160720
Arcabit 20160720
Avast 20160720
AVG 20160720
Avira (no cloud) 20160720
AVware 20160720
Baidu 20160720
BitDefender 20160720
Bkav 20160720
CAT-QuickHeal 20160720
ClamAV 20160720
CMC 20160715
Comodo 20160720
Cyren 20160720
DrWeb 20160720
Emsisoft 20160720
ESET-NOD32 20160720
F-Prot 20160720
F-Secure 20160720
Fortinet 20160720
GData 20160720
Ikarus 20160720
Jiangmin 20160720
K7AntiVirus 20160720
K7GW 20160720
Kaspersky 20160720
Kingsoft 20160720
Malwarebytes 20160720
McAfee 20160720
McAfee-GW-Edition 20160720
Microsoft 20160720
eScan 20160720
NANO-Antivirus 20160720
nProtect 20160720
Panda 20160720
Qihoo-360 20160720
Sophos 20160720
Symantec 20160720
Tencent 20160720
TheHacker 20160720
TrendMicro 20160720
TrendMicro-HouseCall 20160720
VBA32 20160720
VIPRE 20160720
ViRobot 20160720
Zillya 20160720
Zoner 20160720
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
PE header basic information
Target machine x64
Compilation timestamp 2016-07-20 11:52:56
Entry Point 0x000025B8
Number of sections 7
PE sections
PE imports
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
GetStdHandle
FindFirstFileW
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
FormatMessageW
LoadResource
FindClose
TlsGetValue
SetLastError
ReadConsoleInputA
WriteProcessMemory
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
RaiseException
AllocConsole
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TerminateProcess
GetModuleHandleExW
VirtualQueryEx
SetEndOfFile
GetCurrentThreadId
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
FreeLibrary
QueryPerformanceCounter
SetConsoleTextAttribute
TlsAlloc
FlushFileBuffers
CreateRemoteThread
OpenProcess
GetStartupInfoW
GetProcAddress
GetProcessHeap
FindFirstFileExA
FindNextFileW
RtlLookupFunctionEntry
FindNextFileA
RtlUnwindEx
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
VirtualAllocEx
GetConsoleCP
GetEnvironmentStringsW
Process32NextW
SizeofResource
VirtualFreeEx
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
Process32FirstW
SetConsoleTitleW
ReadConsoleW
TlsFree
ReadFile
RtlCaptureContext
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
SetConsoleMode
FindResourceW
GetWindowThreadProcessId
EnumWindows
GetWindowTextW
Number of PE resources by type
BINARY 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
AMD AMD64

FileTypeExtension
exe

TimeStamp
2016:07:20 12:52:56+01:00

FileType
Win64 EXE

PEType
PE32+

CodeSize
76288

LinkerVersion
14.0

EntryPoint
0x25b8

InitializedDataSize
148480

SubsystemVersion
6.0

ImageVersion
0.0

OSVersion
6.0

UninitializedDataSize
0

Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 0ba02030c2ccac586269dc2a0fcbd490
SHA1 fba5d4e8fb12dc6f22520de5cd7cf36c294529b6
SHA256 9b6967376ab965d9a3655100eeeda97694a61a2c70781e03b79fc269db7912af
ssdeep
3072:BooY/9lrmU+HzGMCR1DiTojqL+og4M1N61bjwvgVLhfQMmBoQB+DQ+aLCjqSnerU:tY/9wUwORYojqng48Rozf+TB+8F

authentihash 45555aae40a2be4038496fccfda8ab74318613ba421a357f55a7292afbb364b6
imphash 6f245a1908dfcd21b29079a38c5b5616
File size 216.0 KB ( 221184 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Win64 Executable (generic) (87.3%)
Generic Win/DOS Executable (6.3%)
DOS Executable Generic (6.3%)
Tags
64bits peexe assembly

VirusTotal metadata
First submission 2016-07-20 14:18:18 UTC ( 8 months, 1 week ago )
Last submission 2017-03-30 02:57:00 UTC ( 5 hours, 50 minutes ago )
File names Warface.exe
Vape Launcher.exe
suc.exe
Vape Launcher.exe
vape launcher.exe
lol.exe
Vape Launcher.exe
Lemon Client V1.0 Launcher.exe
vape launcher.exe
r23jirufidweuf.exe
Vape Launcher.exe
1.8 forge error fix!.exe
Vape Launcher.exe
Vape+Launcher.exe
Vape 2.43.exe
Vape Launcher.exe
action.exe.exe
Vape Launcher.exe
Yayane.exe
Vape Launcher.exe
Vape Launcher.exe
3-06-2015.exe
projectCarRace.exe
Vape Launcher.exe
Vape Launcher.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!