× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d5be3066c1c8c78e351269d6a2b5d9a8cf99cfa2c92f2b03f6f158ed3e6084b9
File name: wnc-twd-finalseason-episode2-TRYama.exe
Detection ratio: 0 / 71
Analysis date: 2018-12-19 19:47:57 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis 20180726
Ad-Aware 20181219
AegisLab 20181219
AhnLab-V3 20181219
Alibaba 20180921
ALYac 20181219
Antiy-AVL 20181219
Arcabit 20181219
Avast 20181219
Avast-Mobile 20181219
AVG 20181219
Avira (no cloud) 20181219
Babable 20180918
Baidu 20181207
BitDefender 20181219
Bkav 20181219
CAT-QuickHeal 20181219
ClamAV 20181219
CMC 20181219
Comodo 20181219
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181219
Cyren 20181219
DrWeb 20181219
eGambit 20181219
Emsisoft 20181219
Endgame 20181108
ESET-NOD32 20181219
F-Prot 20181219
F-Secure 20181219
Fortinet 20181219
GData 20181219
Ikarus 20181219
Sophos ML 20181128
Jiangmin 20181219
K7AntiVirus 20181219
K7GW 20181219
Kaspersky 20181219
Kingsoft 20181219
Malwarebytes 20181219
MAX 20181219
McAfee 20181219
McAfee-GW-Edition 20181219
Microsoft 20181219
eScan 20181219
NANO-Antivirus 20181219
Palo Alto Networks (Known Signatures) 20181219
Panda 20181219
Qihoo-360 20181219
Rising 20181219
SentinelOne (Static ML) 20181011
Sophos AV 20181219
SUPERAntiSpyware 20181212
Symantec 20181219
Symantec Mobile Insight 20181215
TACHYON 20181219
Tencent 20181219
TheHacker 20181216
TotalDefense 20181219
Trapmine 20181205
TrendMicro 20181219
TrendMicro-HouseCall 20181219
Trustlook 20181219
VBA32 20181219
VIPRE 20181218
ViRobot 20181219
Webroot 20181219
Yandex 20181219
Zillya 20181219
ZoneAlarm by Check Point 20181219
Zoner 20181219
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product TWD Final Season Episode 2 Türkçe Yama Install Program
File version 2, 0, 0, 35
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-08 20:29:22
Entry Point 0x0001B912
Number of sections 4
PE sections
Overlays
MD5 ad037ac556542eb03bc3eee0c3691d03
File type data
Offset 192512
Size 1846767
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegOpenKeyA
RegCloseKey
OpenProcessToken
RegSetValueExA
RegQueryValueA
RegQueryValueExA
AdjustTokenPrivileges
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyExA
AddFontResourceA
GetSystemPaletteEntries
CreateHalftonePalette
CreateFontIndirectA
SetStretchBltMode
GetDeviceCaps
DeleteDC
SetBkMode
CreateDIBPatternBrush
BitBlt
RealizePalette
SetTextColor
CreatePalette
GetStockObject
SelectPalette
ExtTextOutA
CreateCompatibleDC
StretchDIBits
SetBrushOrgEx
RemoveFontResourceA
SelectObject
CreateSolidBrush
SetBkColor
DeleteObject
CreateCompatibleBitmap
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
GetCurrentProcess
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
GetDiskFreeSpaceA
GetStringTypeW
GetFullPathNameA
FreeLibrary
MoveFileA
GetExitCodeProcess
GetEnvironmentVariableA
FindClose
FormatMessageA
CopyFileA
HeapAlloc
GetModuleFileNameA
GetPrivateProfileStringA
UnhandledExceptionFilter
MultiByteToWideChar
GetModuleHandleA
SetUnhandledExceptionFilter
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
GetVersion
SetCurrentDirectoryA
HeapFree
SetHandleCount
GetOEMCP
GetTickCount
IsBadWritePtr
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetCPInfo
GetProcAddress
CompareStringW
FindFirstFileA
CompareStringA
FindNextFileA
GlobalLock
GetTimeZoneInformation
GetFileType
CreateFileA
ExitProcess
GetLastError
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
HeapReAlloc
GetEnvironmentStringsW
GlobalUnlock
RemoveDirectoryA
GetShortPathNameA
HeapCompact
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
SetFileTime
GetCurrentDirectoryA
WinExec
GetCommandLineA
SetFilePointer
OpenFile
ReadFile
CloseHandle
GetACP
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
DragFinish
DragAcceptFiles
SHGetSpecialFolderLocation
SHBrowseForFolderA
DragQueryFileA
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SetFocus
RedrawWindow
GetParent
EnableWindow
UpdateWindow
EndDialog
BeginPaint
CheckRadioButton
KillTimer
PostQuitMessage
DefWindowProcA
FindWindowA
GetClipboardData
SendDlgItemMessageA
GetSystemMetrics
GetWindowRect
DispatchMessageA
ScreenToClient
SetDlgItemTextA
PostMessageA
GetDlgItemTextA
MessageBoxA
PeekMessageA
SetWindowPos
AdjustWindowRectEx
TranslateMessage
DialogBoxParamA
GetWindow
GetSysColor
CheckDlgButton
SetWindowLongA
DrawTextA
SetWindowTextA
wsprintfA
ShowWindow
GetLastActivePopup
IsWindowVisible
SendMessageA
IsWindowEnabled
GetClientRect
CreateWindowExA
GetDlgItem
CreateDialogParamA
BringWindowToTop
IsIconic
RegisterClassA
InvalidateRect
GetWindowLongA
IsClipboardFormatAvailable
SetTimer
LoadCursorA
LoadIconA
GetMessageA
FillRect
IsDlgButtonChecked
ValidateRect
CallWindowProcA
GetClassNameA
GetFocus
EndPaint
CloseClipboard
DestroyWindow
ExitWindowsEx
IsDialogMessageA
OpenClipboard
GetFileVersionInfoSizeA
VerFindFileA
GetFileVersionInfoA
VerQueryValueA
GetOpenFileNameA
OleUninitialize
CoCreateInstance
CoGetMalloc
OleInitialize
Number of PE resources by type
RT_ICON 5
RT_DIALOG 4
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 12
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.0.35

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
53248

EntryPoint
0x1b912

MIMEType
application/octet-stream

FileVersion
2, 0, 0, 35

TimeStamp
2009:11:08 21:29:22+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
2, 0, 0, 35

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
139264

ProductName
TWD Final Season Episode 2 T rk e Yama Install Program

ProductVersionNumber
2.0.0.35

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 87270f46f67bb1b11b003377e162aa0d
SHA1 ce45db356b2b58296a12d91a50695889ad7b0bdb
SHA256 d5be3066c1c8c78e351269d6a2b5d9a8cf99cfa2c92f2b03f6f158ed3e6084b9
ssdeep
49152:5wjOQUF6eFPU1hLBB3K00xjNuZmeBeYqPSW:eUpFghLT6rxjKmrNaW

authentihash b065aeeb1655f21509f07cd8c35be6707bf1a1b0322299f6e9cb8ab8267d1d08
imphash e45db0faa2d6ea8117244b8eeec66f7d
File size 1.9 MB ( 2039279 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2018-12-04 23:54:13 UTC ( 2 months, 2 weeks ago )
Last submission 2018-12-04 23:54:13 UTC ( 2 months, 2 weeks ago )
File names wnc-twd-finalseason-episode2-TRYama.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Searched windows
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.