× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 8e1c055e2f8179b44b0a1caf5120206b9c424449eaa20cf7ca2fa443160357b5
Nombre: JoinServer.exe
Detecciones: 0 / 68
Fecha de análisis: 2018-10-07 16:38:07 UTC ( hace 3 meses, 1 semana ) Ver el más reciente
Antivirus Resultado Actualización
Ad-Aware 20181007
AegisLab 20181007
AhnLab-V3 20181007
Alibaba 20180921
ALYac 20181007
Antiy-AVL 20181007
Arcabit 20181007
Avast 20181007
Avast-Mobile 20181007
AVG 20181007
Avira (no cloud) 20181007
AVware 20180925
Babable 20180918
Baidu 20180930
BitDefender 20181007
Bkav 20181005
CAT-QuickHeal 20181007
ClamAV 20181007
CMC 20181007
Comodo 20181007
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181007
Cyren 20181007
DrWeb 20181007
eGambit 20181007
Emsisoft 20181007
Endgame 20180730
ESET-NOD32 20181007
F-Prot 20181007
F-Secure 20181007
Fortinet 20181007
GData 20181007
Ikarus 20181007
Sophos ML 20180717
Jiangmin 20181007
K7AntiVirus 20181007
K7GW 20181007
Kaspersky 20181007
Kingsoft 20181007
Malwarebytes 20181007
MAX 20181007
McAfee 20181007
McAfee-GW-Edition 20181007
Microsoft 20181007
eScan 20181007
NANO-Antivirus 20181007
Palo Alto Networks (Known Signatures) 20181007
Panda 20181007
Qihoo-360 20181007
Rising 20181007
SentinelOne (Static ML) 20180926
Sophos AV 20181007
SUPERAntiSpyware 20181006
Symantec 20181006
Symantec Mobile Insight 20181001
TACHYON 20181007
Tencent 20181007
TheHacker 20181001
TrendMicro 20181007
TrendMicro-HouseCall 20181007
Trustlook 20181007
VBA32 20181005
VIPRE 20181007
ViRobot 20181007
Webroot 20181007
Yandex 20181005
Zillya 20181005
ZoneAlarm by Check Point 20181007
Zoner 20181006
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © SetecSoft 2018

Product JoinServer
Original name JoinServer.exe
Internal name JoinServer
File version 1.0.0.0
Description JoinServer
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-04 17:41:36
Entry Point 0x0000B25A
Number of sections 5
PE sections
PE imports
SetBkMode
CreateFontA
GetStockObject
TextOutA
CreateSolidBrush
SelectObject
DeleteObject
SetTextColor
GetLastError
EnterCriticalSection
TerminateThread
WaitForSingleObject
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
GetLocalTime
GetQueuedCompletionStatus
GetCurrentProcess
SetThreadPriority
GetCurrentProcessId
ReleaseSemaphore
CreateIoCompletionPort
CreateDirectoryA
UnhandledExceptionFilter
SetErrorMode
GetStartupInfoW
InterlockedCompareExchange
GetSystemInfo
CreateSemaphoreA
CreateThread
SetFilePointer
HeapSetInformation
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
DecodePointer
TerminateProcess
InitializeCriticalSection
DeleteCriticalSection
Sleep
GetTickCount
CreateFileA
EncodePointer
GetCurrentThreadId
LeaveCriticalSection
?_Xout_of_range@std@@YAXPBD@Z
??1_Container_base12@std@@QAE@XZ
?_Swap_all@_Container_base12@std@@QAEXAAU12@@Z
?uncaught_exception@std@@YA_NXZ
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_Xlength_error@std@@YAXPBD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
malloc
?what@exception@std@@UBEPBDXZ
strncpy_s
memset
fread
_time64
__dllonexit
_stricmp
_controlfp_s
_invoke_watson
_onexit
_fmode
_cexit
?terminate@@YAXXZ
fopen
?_type_info_dtor_internal_method@type_info@@QAEXXZ
strtol
??2@YAPAXI@Z
_lock
memcpy
vsprintf_s
_amsg_exit
exit
_XcptFilter
_commode
_ftelli64
__setusermatherr
strcpy_s
_initterm_e
_acmdln
_CxxThrowException
_ismbblead
tolower
_localtime64_s
_unlock
fclose
_crt_debugger_hook
??3@YAXPAX@Z
asctime_s
free
__CxxFrameHandler3
_except_handler4_common
atoi
__getmainargs
_initterm
??0exception@std@@QAE@ABV01@@Z
??1exception@std@@UAE@XZ
memmove
??0exception@std@@QAE@ABQBD@Z
_fseeki64
_configthreadlocale
_exit
__set_app_type
Ord(24)
Ord(75)
Ord(11)
Ord(36)
Ord(20)
Ord(31)
Ord(16)
Ord(7)
Ord(4)
Ord(26)
Ord(8)
Ord(18)
Ord(13)
GetMessageA
UpdateWindow
EndDialog
PostQuitMessage
DefWindowProcA
ShowWindow
DispatchMessageA
MessageBoxA
TranslateMessage
DialogBoxParamA
GetDC
RegisterClassExA
ReleaseDC
SetWindowTextA
LoadStringA
GetClientRect
CreateWindowExA
LoadAcceleratorsA
wsprintfA
SetTimer
LoadCursorA
LoadIconA
FillRect
TranslateAcceleratorA
DestroyWindow
WSASocketA
htonl
socket
WSAAccept
bind
WSARecv
inet_addr
WSASend
WSAStartup
gethostbyname
sendto
inet_ntoa
htons
closesocket
WSAGetLastError
listen
MiniDumpWriteDump
Number of PE resources by type
RT_ICON 10
RT_GROUP_ICON 2
RT_DIALOG 1
RT_MANIFEST 1
RT_STRING 1
RT_MENU 1
RT_ACCELERATOR 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 17
PORTUGUESE BRAZILIAN 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
JoinServer

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
237056

EntryPoint
0xb25a

OriginalFileName
JoinServer.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright SetecSoft 2018

FileVersion
1.0.0.0

TimeStamp
2018:10:04 18:41:36+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
JoinServer

ProductVersion
1.0.0.0

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SetecSoft

CodeSize
45056

ProductName
JoinServer

ProductVersionNumber
1.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 57172c4f431d5a0b4c8cb228f5b9a527
SHA1 77003e2ad6452f95153df543b5299748d2d1d601
SHA256 8e1c055e2f8179b44b0a1caf5120206b9c424449eaa20cf7ca2fa443160357b5
ssdeep
3072:b8dxLo7bbTtdOEHK8PI+NpYf1lmhOK8PI+NpYf1lmhY:b8dxLEbbpdOEHHsdgwHsdg

authentihash a10546bfc7ed3f8606d34a2914c4e62664ee84bde0668190cb2b843fb5d94691
imphash ad0fbe8ffda81dcbe94008a984387d90
Tamaño del fichero 276.5 KB ( 283136 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-07 16:38:07 UTC ( hace 3 meses, 1 semana )
Last submission 2018-10-07 16:38:07 UTC ( hace 3 meses, 1 semana )
Nombres JoinServer.exe
JoinServer
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!