× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 205e964fb0836e426d46e8ef5b9b8dd485ade07b84af9a8c8c00f3067eac0b2f
Nombre: GameServer.exe
Detecciones: 0 / 68
Fecha de análisis: 2018-10-07 16:48:40 UTC ( hace 5 meses, 2 semanas ) Ver el más reciente
Antivirus Resultado Actualización
Ad-Aware 20181007
AegisLab 20181007
AhnLab-V3 20181007
Alibaba 20180921
ALYac 20181007
Antiy-AVL 20181007
Arcabit 20181007
Avast 20181007
Avast-Mobile 20181007
AVG 20181007
Avira (no cloud) 20181007
AVware 20180925
Babable 20180918
Baidu 20180930
BitDefender 20181007
Bkav 20181005
CAT-QuickHeal 20181007
ClamAV 20181007
CMC 20181007
Comodo 20181007
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181007
Cyren 20181007
DrWeb 20181007
eGambit 20181007
Emsisoft 20181007
Endgame 20180730
ESET-NOD32 20181007
F-Prot 20181007
F-Secure 20181007
Fortinet 20181007
GData 20181007
Ikarus 20181007
Sophos ML 20180717
Jiangmin 20181007
K7AntiVirus 20181007
K7GW 20181007
Kaspersky 20181007
Kingsoft 20181007
Malwarebytes 20181007
MAX 20181007
McAfee 20181007
McAfee-GW-Edition 20181007
Microsoft 20181007
eScan 20181007
NANO-Antivirus 20181007
Palo Alto Networks (Known Signatures) 20181007
Panda 20181007
Qihoo-360 20181007
Rising 20181007
SentinelOne (Static ML) 20180926
Sophos AV 20181007
SUPERAntiSpyware 20181006
Symantec 20181007
Symantec Mobile Insight 20181001
TACHYON 20181007
Tencent 20181007
TheHacker 20181001
TrendMicro 20181007
TrendMicro-HouseCall 20181007
Trustlook 20181007
VBA32 20181005
VIPRE 20181007
ViRobot 20181007
Webroot 20181007
Yandex 20181005
Zillya 20181005
ZoneAlarm by Check Point 20181007
Zoner 20181006
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © MuEMU.pl 2015

Product MuEMU GameServer
Original name GameServer.exe
Internal name GameServer
File version 1.0.0.0
Description GameServer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-07 04:18:36
Entry Point 0x000E86CE
Number of sections 5
PE sections
PE imports
RegOpenKeyA
SelectObject
CreateFontA
GetStockObject
TextOutA
CreateSolidBrush
SetBkMode
DeleteObject
SetTextColor
GetSystemTime
GetLastError
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
GetSystemInfo
WaitForSingleObject
GetPrivateProfileIntA
QueryPerformanceCounter
IsDebuggerPresent
HeapAlloc
CreateTimerQueue
GetLocalTime
IsProcessorFeaturePresent
GetQueuedCompletionStatus
GetCurrentProcess
GetPrivateProfileStringA
SetThreadPriority
GetFileSize
ReleaseSemaphore
CreateIoCompletionPort
CreateDirectoryA
UnhandledExceptionFilter
SetErrorMode
GetStartupInfoW
DeleteCriticalSection
InterlockedCompareExchange
TerminateThread
EncodePointer
GetProcessHeap
LeaveCriticalSection
CreateMutexA
InterlockedExchangeAdd
CreateSemaphoreA
CreateThread
SetFilePointer
HeapSetInformation
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
FindFirstFileA
CreateTimerQueueTimer
FindNextFileA
DecodePointer
TerminateProcess
InitializeCriticalSection
GlobalAlloc
InterlockedDecrement
Sleep
DeleteTimerQueue
GetTickCount
CreateFileA
ExitProcess
GetCurrentThreadId
InterlockedIncrement
GetCurrentProcessId
CloseHandle
?_Xout_of_range@std@@YAXPBD@Z
?_Xlength_error@std@@YAXPBD@Z
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
??1_Container_base12@std@@QAE@XZ
?_Random_device@tr1@std@@YAIXZ
strncmp
rand
malloc
?what@exception@std@@UBEPBDXZ
strcat_s
_CIatan2
asctime_s
memset
fclose
_time64
__dllonexit
_stricmp
isdigit
_controlfp_s
vsprintf_s
_invoke_watson
isalpha
fread
fopen
_fmode
_cexit
?terminate@@YAXXZ
strtol
?_type_info_dtor_internal_method@type_info@@QAEXXZ
isalnum
floor
??2@YAPAXI@Z
_lock
_onexit
_difftime64
_amsg_exit
exit
_XcptFilter
_commode
_ftelli64
__setusermatherr
fopen_s
_initterm_e
isspace
sprintf
_acmdln
_CxxThrowException
_ismbblead
_localtime64_s
_unlock
_crt_debugger_hook
??3@YAXPAX@Z
_CIsin
_CIsqrt
ceil
__CxxFrameHandler3
_except_handler4_common
_fseeki64
free
_CIcos
__getmainargs
atof
memcpy
??0exception@std@@QAE@ABV01@@Z
??_V@YAXPAX@Z
strcpy_s
strstr
??1exception@std@@UAE@XZ
memmove
_mktime64
_CIpow
??0exception@std@@QAE@ABQBD@Z
atoi
modf
_configthreadlocale
_initterm
_exit
__set_app_type
GetMessageA
UpdateWindow
EndDialog
PostQuitMessage
DefWindowProcA
ShowWindow
DispatchMessageA
MessageBoxA
TranslateMessage
DialogBoxParamA
GetDC
RegisterClassExA
ReleaseDC
SetWindowTextA
LoadStringA
GetClientRect
CreateWindowExA
SetRect
LoadAcceleratorsA
wsprintfA
SetTimer
LoadCursorA
LoadIconA
TranslateAcceleratorA
FillRect
DestroyWindow
connect
WSASocketA
htonl
socket
WSAAccept
ntohl
bind
WSARecv
inet_addr
WSASend
WSAAsyncSelect
WSAStartup
gethostbyname
send
sendto
closesocket
inet_ntoa
htons
recv
WSAGetLastError
listen
MiniDumpWriteDump
Number of PE resources by type
RT_ICON 10
RT_GROUP_ICON 2
RT_DIALOG 1
RT_MANIFEST 1
RT_STRING 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 17
PORTUGUESE BRAZILIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
GameServer

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
6888448

EntryPoint
0xe86ce

OriginalFileName
GameServer.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright MuEMU.pl 2015

FileVersion
1.0.0.0

TimeStamp
2018:10:07 05:18:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
GameServer

ProductVersion
1.0.0.0

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
MuEMU

CodeSize
969728

ProductName
MuEMU GameServer

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 bd8b620974442cdbae06329335e1a88c
SHA1 279a4c51e0941f62deea288ccebbdd8d4ab6db8c
SHA256 205e964fb0836e426d46e8ef5b9b8dd485ade07b84af9a8c8c00f3067eac0b2f
ssdeep
49152:ODhb4hl9v3YPDovs2NtemY9Vju8V/KtWz9/3Kd4Sqbllbcw:Ias4g/KtWLXcw

authentihash d4376d11775c0a1eee46bf9bc8966b59818fb17b37a81e2cff1a0f1a8bc432b3
imphash 739d99f7fd8eeab07674a8ab2bfeccd7
Tamaño del fichero 7.5 MB ( 7859200 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-07 16:48:40 UTC ( hace 5 meses, 2 semanas )
Last submission 2018-10-07 16:48:40 UTC ( hace 5 meses, 2 semanas )
Nombres GameServer
GameServer.exe
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!