× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a907525b3510d480e1c772e92e774089a8b4ba4e306aa20a935c493d47891a38
File name: PPSSPPWindows.exe
Detection ratio: 0 / 47
Analysis date: 2013-05-31 04:25:10 UTC ( 4 years, 8 months ago ) View latest
Antivirus Result Update
Yandex 20130530
AhnLab-V3 20130530
AntiVir 20130531
Antiy-AVL 20130530
Avast 20130531
AVG 20130531
BitDefender 20130531
ByteHero 20130529
CAT-QuickHeal 20130530
ClamAV 20130531
Commtouch 20130531
Comodo 20130531
DrWeb 20130531
Emsisoft 20130531
eSafe 20130530
ESET-NOD32 20130530
F-Prot 20130531
F-Secure 20130531
Fortinet 20130531
GData 20130531
Ikarus 20130531
Jiangmin 20130530
K7AntiVirus 20130530
K7GW 20130530
Kaspersky 20130531
Kingsoft 20130506
Malwarebytes 20130531
McAfee 20130531
McAfee-GW-Edition 20130531
Microsoft 20130531
eScan 20130531
NANO-Antivirus 20130531
Norman 20130530
nProtect 20130531
Panda 20130530
PCTools 20130521
Rising 20130531
Sophos AV 20130531
SUPERAntiSpyware 20130531
Symantec 20130531
TheHacker 20130531
TotalDefense 20130530
TrendMicro 20130531
TrendMicro-HouseCall 20130531
VBA32 20130530
VIPRE 20130531
ViRobot 20130531
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2006-2013 by Henrik Rydgård

Product PPSSPP
Original name PPSSPP.exe
Internal name s
File version 1, 0, 5, 0
Description PPSSPP
Comments PPSSPP PSP emulator
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-05-31 00:58:52
Entry Point 0x00272135
Number of sections 6
PE sections
PE imports
InitCommonControlsEx
GetOpenFileNameA
GetSaveFileNameA
DirectInput8Create
Ord(11)
CreatePen
TextOutA
SetStretchBltMode
Rectangle
GetObjectA
LineTo
DeleteDC
SetBkMode
ChoosePixelFormat
BitBlt
SetTextColor
CreateFontA
CreateBitmap
MoveToEx
GetStockObject
CreateBrushIndirect
SetPixelFormat
CreateCompatibleDC
StretchBlt
SwapBuffers
SelectObject
DeleteObject
CreateCompatibleBitmap
GetLastError
FreeConsole
GetSystemTimeAsFileTime
EnterCriticalSection
LoadResource
GetSystemInfo
WaitForSingleObject
LoadLibraryA
FreeLibrary
QueryPerformanceCounter
FindFirstFileA
IsDebuggerPresent
GetTickCount
SetConsoleTextAttribute
GetStdHandle
VirtualProtect
GlobalUnlock
GetModuleFileNameA
SetConsoleWindowInfo
SetConsoleScreenBufferSize
RemoveDirectoryA
QueryPerformanceFrequency
HeapSetInformation
GetCurrentProcess
SizeofResource
OutputDebugStringA
GetCurrentProcessId
CreateSemaphoreA
MapViewOfFileEx
FindClose
CreateDirectoryA
DeleteFileA
UnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
SetThreadPriority
GlobalLock
GetConsoleScreenBufferInfo
InterlockedCompareExchange
ExitProcess
SetFilePointer
RaiseException
InterlockedExchangeAdd
ReleaseSemaphore
CreateThread
GetConsoleWindow
GetModuleHandleA
DeleteCriticalSection
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
SetConsoleTitleA
CloseHandle
IsProcessorFeaturePresent
CreateFileMappingA
FindNextFileA
TerminateProcess
DecodePointer
GetProcAddress
FreeResource
SetEvent
MoveFileA
IsWow64Process
GetProcessAffinityMask
WriteConsoleA
ResetEvent
InitializeCriticalSection
UnmapViewOfFile
GlobalAlloc
VirtualFree
CreateEventA
AllocConsole
Sleep
FormatMessageA
GetFileAttributesExA
CreateFileA
EncodePointer
GetCurrentThreadId
FindResourceA
VirtualAlloc
LeaveCriticalSection
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JPBD_J@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??Bid@locale@std@@QAEIXZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEXABVlocale@2@@Z
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?flush@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?always_noconv@codecvt_base@std@@QBE_NXZ
??_7?$basic_istream@DU?$char_traits@D@std@@@std@@6B@
?_Incref@facet@locale@std@@QAEXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAE_JXZ
?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IAE@XZ
?_BADOFF@std@@3_JB
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z
?eof@ios_base@std@@QBE_NXZ
?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAEXXZ
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEPADXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
??7ios_base@std@@QBE_NXZ
?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEPAV12@PAD_J@Z
?_Decref@facet@locale@std@@QAEPAV123@XZ
?_Xlength_error@std@@YAXPBD@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0_Lockit@std@@QAE@H@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?_Xout_of_range@std@@YAXPBD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?_Ios_base_dtor@ios_base@std@@CAXPAV12@@Z
?_Orphan_all@_Container_base0@std@@QAEXXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1_Lockit@std@@QAE@XZ
?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXPAD00@Z
??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UAE@XZ
_FInf
?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z
?uncaught_exception@std@@YA_NXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?_Xfunc@tr1@std@@YAXXZ
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MAEHXZ
?in@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
_FNan
?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Swap_all@_Container_base0@std@@QAEXAAU12@@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z
?id@?$codecvt@DDH@std@@2V0locale@2@A
?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z
?out@?$codecvt@DDH@std@@QBEHAAHPBD1AAPBDPAD3AAPAD@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
?getline@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PAD_J@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
?_Getcat@?$codecvt@DDH@std@@SAIPAPBVfacet@locale@2@PBV42@@Z
?unshift@?$codecvt@DDH@std@@QBEHAAHPAD1AAPAD@Z
?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ
??_7ios_base@std@@6B@
_lock
strncpy_s
fclose
_time64
strtoul
_invoke_watson
fflush
_fmode
strtol
fputc
_ftime64
strtod
fwrite
frexp
_mkgmtime64
_XcptFilter
__libm_sse2_asin
sprintf
_CxxThrowException
_ismbblead
_timezone
??3@YAXPAX@Z
ceil
__libm_sse2_pow
memcpy_s
_isatty
strrchr
memcpy
??0bad_cast@std@@QAE@PBD@Z
strstr
memmove
??0exception@std@@QAE@ABQBD@Z
modf
_configthreadlocale
_initterm
memchr
_purecall
??0bad_cast@std@@QAE@ABV01@@Z
?what@exception@std@@UBEPBDXZ
_acmdln
fgetc
memset
_stricmp
__RTDynamicCast
_stat64i32
fgets
strchr
??1bad_cast@std@@UAE@XZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??2@YAPAXI@Z
fgetpos
__libm_sse2_log
fsetpos
ftell
__libm_sse2_cos
exit
??_V@YAXPAX@Z
__libm_sse2_atan2
fopen_s
_initterm_e
_strnicmp
_crt_debugger_hook
free
__CxxFrameHandler3
_except_handler4_common
_aligned_malloc
_CIsqrt
sinh
_strtoi64
_gmtime64
cos
_vsnprintf
??1exception@std@@UAE@XZ
_CIpow
acos
strftime
strncmp
setlocale
realloc
__getmainargs
__dllonexit
ldexp
printf
fopen
strncpy
_cexit
_splitpath_s
fputs
qsort
_onexit
_snprintf
_commode
__setusermatherr
getenv
atoi
_CIcos
cosh
??0exception@std@@QAE@ABV01@@Z
tanh
_beginthreadex
_wassert
_localtime64
_aligned_realloc
ungetc
_unlock_file
malloc
_CIlog
sscanf
_CIatan2
fread
_controlfp_s
abort
fprintf
strspn
tan
feof
_endthreadex
_amsg_exit
__libm_sse2_sin
fabs
floor
_vscprintf
fseek
vsprintf_s
sin
?terminate@@YAXXZ
tolower
atan
asin
_unlock
_CIsin
_splitpath
_fseeki64
log
_CIatan
_aligned_free
_exit
__argv
_mktime64
__libm_sse2_log10
__iob_func
_lock_file
_CIexp
__argc
exp
_stat64
_CItan
setvbuf
__set_app_type
glTexSubImage2D
glClearColor
glDisable
wglCreateContext
glColorMask
wglGetCurrentDC
glBindTexture
glDrawArrays
glTexImage2D
glCullFace
glGetString
glEnable
glClear
glStencilOp
wglGetProcAddress
glBlendFunc
glDeleteTextures
wglMakeCurrent
glViewport
glGetError
glDrawElements
glDepthMask
glGetFloatv
glDepthRange
wglDeleteContext
glTexParameterf
glGenTextures
glTexParameteri
glFrontFace
glStencilFunc
glDepthFunc
glGetIntegerv
glScissor
glPixelStorei
DragAcceptFiles
ShellExecuteA
DragQueryFileA
SetFocus
GetMessageA
AdjustWindowRect
GetForegroundWindow
GetParent
ReleaseDC
EndDialog
LoadMenuA
DefWindowProcW
MoveWindow
KillTimer
BeginPaint
DestroyIcon
PostQuitMessage
DefWindowProcA
ShowWindow
SetMenuInfo
SetWindowPos
EndPaint
GetWindowThreadProcessId
GetSystemMetrics
GetCursorPos
LoadIconA
GetWindowRect
DispatchMessageA
ScreenToClient
SetMenu
SetDlgItemTextA
SetCapture
LoadImageA
MessageBoxA
CloseClipboard
GetWindowLongA
TranslateMessage
DialogBoxParamA
TrackPopupMenuEx
GetDC
RegisterClassExA
GetAsyncKeyState
DrawTextA
SendMessageA
GetDlgCtrlID
SetWindowTextA
CheckMenuItem
GetMenu
RedrawWindow
SetClipboardData
DrawIconEx
GetWindowPlacement
EmptyClipboard
GetWindowTextA
GetClientRect
SetTimer
GetDlgItem
CreateDialogParamA
BringWindowToTop
SetScrollRange
EnableMenuItem
ClientToScreen
ReleaseCapture
SetWindowLongA
CallNextHookEx
LoadAcceleratorsA
GetSubMenu
CreateWindowExA
LoadCursorA
UpdateWindow
InvalidateRect
SetWindowsHookExA
ShowOwnedPopups
TranslateAcceleratorA
ShowCursor
OpenClipboard
GetSysColorBrush
CallWindowProcA
GetFocus
GetMenuItemCount
EnableWindow
SetForegroundWindow
DestroyWindow
UnhookWindowsHookEx
IsDialogMessageA
SetCursor
timeEndPeriod
timeBeginPeriod
socket
closesocket
send
WSACleanup
WSAStartup
gethostbyname
connect
inet_ntoa
recv
XInputGetState
PE exports
Number of PE resources by type
RT_ICON 7
RT_DIALOG 6
RT_GROUP_ICON 3
RT_MENU 2
IMAGE 1
RT_MANIFEST 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 18
NEUTRAL DEFAULT 4
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
All product names are trademarks of their respective owners.

SubsystemVersion
5.1

Comments
PPSSPP PSP emulator

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

FileDescription
PPSSPP

CharacterSet
Unicode

InitializedDataSize
2934272

EntryPoint
0x272135

OriginalFileName
PPSSPP.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2006-2013 by Henrik Rydg rd

FileVersion
1, 0, 5, 0

TimeStamp
2013:05:31 01:58:52+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
s

ProductVersion
1, 0, 5, 0

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Henrik Rydg rd Inc.

CodeSize
2659840

ProductName
PPSSPP

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Unknown

File identification
MD5 0d8693a0008002d2b53471585fd1f47a
SHA1 64d9f90e8eb5b2883e6187283859ef999944a1ed
SHA256 a907525b3510d480e1c772e92e774089a8b4ba4e306aa20a935c493d47891a38
ssdeep
49152:kcnSBpK5OuWEnhMX79RtHDEJlIrgwjjjtig4mN5AtDyfOSjShe6EQqwGJRSWATHe:fS/KMX7PhpbEuc1GOZXQ

authentihash 878e4c1da51604289b8a2d45be6b53f70e4a3900fe51f235780b5963ef96750c
imphash 9bff5dfa4340b241e701220d79600dbd
File size 5.3 MB ( 5595136 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-31 04:25:10 UTC ( 4 years, 8 months ago )
Last submission 2015-02-05 02:43:58 UTC ( 3 years ago )
File names s
PPSSPP.exe
PPSSPPWindows.exe
ppssppwindows.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Behaviour characterization
Zemana
keylogger

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!