× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b87e40669723c51426cd7586f505ba08f53df7abff33e5ee0c46dbf8759d8dd2
File name: pico8.exe
Detection ratio: 1 / 56
Analysis date: 2016-10-07 22:34:23 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Comodo TrojWare.Win32.TrojanDownloader.Delf.gen 20161007
Ad-Aware 20161007
AegisLab 20161007
AhnLab-V3 20161007
Alibaba 20161003
ALYac 20161007
Antiy-AVL 20161007
Arcabit 20161007
Avast 20161007
AVG 20161007
Avira (no cloud) 20161007
AVware 20161007
Baidu 20161001
BitDefender 20161007
Bkav 20161007
CAT-QuickHeal 20161007
ClamAV 20161007
CMC 20161003
CrowdStrike Falcon (ML) 20160725
Cyren 20161007
DrWeb 20161007
Emsisoft 20161007
ESET-NOD32 20161007
F-Prot 20161007
F-Secure 20161007
Fortinet 20161007
GData 20161007
Ikarus 20161007
Sophos ML 20160928
Jiangmin 20161007
K7AntiVirus 20161007
K7GW 20161007
Kaspersky 20161007
Kingsoft 20161007
Malwarebytes 20161007
McAfee 20161007
McAfee-GW-Edition 20161007
Microsoft 20161007
eScan 20161007
NANO-Antivirus 20161007
nProtect 20161007
Panda 20161007
Qihoo-360 20161007
Rising 20161007
Sophos AV 20161007
SUPERAntiSpyware 20161007
Symantec 20161007
Tencent 20161007
TheHacker 20161007
TrendMicro 20161007
TrendMicro-HouseCall 20161007
VBA32 20161007
VIPRE 20161007
ViRobot 20161007
Yandex 20161007
Zillya 20161007
Zoner 20161007
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1970-01-01 00:00:33
Entry Point 0x000014C0
Number of sections 16
PE sections
Overlays
MD5 2fb3975c738fa2a930e344485c27e8cb
File type data
Offset 965120
Size 150194
Entropy 4.36
PE imports
GetLastError
EnterCriticalSection
GetFileAttributesA
FreeLibrary
QueryPerformanceCounter
GetTickCount
VirtualProtect
GetModuleFileNameA
DeleteCriticalSection
GetCurrentProcess
LoadLibraryExA
GetCurrentProcessId
UnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
TerminateProcess
InitializeCriticalSection
VirtualQuery
TlsGetValue
Sleep
FormatMessageA
GetCurrentThreadId
LeaveCriticalSection
SDL_JoystickGetAxis
SDL_GetWindowSize
SDL_ShowCursor
SDL_JoystickNumBalls
SDL_SetHint
SDL_ClearError
SDL_PauseAudio
SDL_JoystickNumButtons
SDL_RenderCopy
SDL_CreateRGBSurfaceFrom
SDL_IsGameController
SDL_GameControllerGetButton
SDL_JoystickOpen
SDL_GameControllerGetAxis
SDL_GetKeyboardState
SDL_DestroyWindow
SDL_CreateTexture
SDL_GetMouseState
SDL_NumJoysticks
SDL_SetWindowIcon
SDL_GL_SetAttribute
SDL_LockSurface
SDL_UpdateWindowSurface
SDL_CreateWindow
SDL_JoystickClose
SDL_GetClipboardText
SDL_GetWindowSurface
SDL_GameControllerOpen
SDL_GameControllerMapping
SDL_SetClipboardText
SDL_GetScancodeName
SDL_GetModState
SDL_GetError
SDL_PollEvent
SDL_UnlockAudio
SDL_GetVersion
SDL_SetRenderDrawColor
SDL_UpdateTexture
SDL_GetKeyFromScancode
SDL_JoystickNumAxes
SDL_GameControllerGetJoystick
SDL_CreateThread
SDL_InitSubSystem
SDL_RenderClear
SDL_UnlockSurface
SDL_Delay
SDL_Log
SDL_GetTicks
SDL_JoystickNameForIndex
SDL_GameControllerAddMapping
SDL_GetKeyboardFocus
SDL_JoystickGetButton
SDL_GameControllerGetAttached
SDL_DestroyTexture
SDL_Init
SDL_free
SDL_GetDesktopDisplayMode
SDL_HasClipboardText
SDL_LockAudio
SDL_GameControllerNameForIndex
SDL_DestroyRenderer
SDL_DetachThread
SDL_CreateRenderer
SDL_FreeSurface
SDL_OpenAudio
SDL_RenderPresent
ShellExecuteA
InternetReadFile
InternetOpenUrlA
InternetOpenA
__lconv_init
_lock
fclose
fflush
_fmode
__initenv
strtok
fwrite
frexp
mktime
isspace
localtime
strcoll
memcpy
strstr
memmove
signal
remove
freopen
strcmp
memchr
strncmp
fgetc
memset
strcat
cosh
_setmode
fgets
strchr
asin
clock
isxdigit
_unlock
ftell
exit
sprintf
strrchr
_acmdln
_mkdir
fputc
ferror
gmtime
free
sinh
__getmainargs
_stat
isalnum
_findnext
_findfirst
strcpy
islower
_initterm
isupper
strftime
_iob
_sopen
rand
setlocale
realloc
__dllonexit
_setjmp3
toupper
printf
fopen
strncpy
_cexit
puts
fputs
qsort
system
_open
_onexit
isalpha
memcmp
__setusermatherr
log10
fread
_fdopen
getenv
vfprintf
_stricmp
tanh
localeconv
strerror
_beginthreadex
strspn
_close
rename
malloc
sscanf
srand
abort
fprintf
tan
ispunct
feof
_endthreadex
_amsg_exit
_errno
strlen
fseek
_findclose
rewind
longjmp
tolower
atan
_fullpath
strpbrk
isgraph
calloc
acos
iscntrl
time
getc
__set_app_type
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1970:01:01 01:00:33+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
663040

LinkerVersion
2.25

EntryPoint
0x14c0

InitializedDataSize
806912

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
1395712

Compressed bundles
File identification
MD5 e4a1f9da9ce2ae1d46971d4633f65c5a
SHA1 80069296e653bbe4b69898c85e0833137a34dea0
SHA256 b87e40669723c51426cd7586f505ba08f53df7abff33e5ee0c46dbf8759d8dd2
ssdeep
24576:kEJcFkLnrlSpnIQrR4coBP2vk5gV+ZTO8fM3v:7ok/EbcIeA

authentihash 97896246fcc2f9e4196b5f2cf9aa2834086c34de8b180e0916815004abb3dc65
imphash 55d847b0fc9128bc51d0044c247a17ea
File size 1.1 MB ( 1115314 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (64.6%)
Win32 Dynamic Link Library (generic) (15.3%)
Win32 Executable (generic) (10.5%)
Generic Win/DOS Executable (4.6%)
DOS Executable Generic (4.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2016-10-07 22:34:23 UTC ( 1 year, 10 months ago )
Last submission 2017-03-10 23:59:33 UTC ( 1 year, 5 months ago )
File names pico8.exe
pico8.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!