× Les cookies sont désactivés ! Ce site exige que les cookies soient activés pour fonctionner correctement
SHA256: 2596fbb8534a45416fc307c0cda7b93cdbe01f671da7c4d7da8519d0ba688a9e
Nom du fichier : PS3 Flash Tool.exe
Ratio de détection : 2 / 66
Date d'analyse : 2018-05-20 16:26:41 UTC (il y a 3 jours, 21 heures)
Antivirus Résultat Mise à jour
Cylance Unsafe 20180520
McAfee-GW-Edition BehavesLike.Win32.Downloader.wc 20180520
Ad-Aware 20180520
AegisLab 20180520
AhnLab-V3 20180520
Alibaba 20180518
ALYac 20180520
Antiy-AVL 20180520
Arcabit 20180520
Avast 20180520
Avast-Mobile 20180520
AVG 20180520
Avira (no cloud) 20180520
AVware 20180520
Babable 20180406
Baidu 20180518
BitDefender 20180520
Bkav 20180518
CAT-QuickHeal 20180520
ClamAV 20180520
CMC 20180520
Comodo 20180520
CrowdStrike Falcon (ML) 20180202
Cybereason None
Cyren 20180520
DrWeb 20180520
eGambit 20180520
Emsisoft 20180520
Endgame 20180507
ESET-NOD32 20180520
F-Prot 20180520
F-Secure 20180520
Fortinet 20180520
GData 20180520
Ikarus 20180520
Sophos ML 20180503
Jiangmin 20180520
K7AntiVirus 20180520
K7GW 20180520
Kaspersky 20180520
Kingsoft 20180520
Malwarebytes 20180520
MAX 20180520
McAfee 20180520
Microsoft 20180520
eScan 20180520
NANO-Antivirus 20180520
nProtect 20180520
Palo Alto Networks (Known Signatures) 20180520
Panda 20180520
Qihoo-360 20180520
Rising 20180520
SentinelOne (Static ML) 20180225
Sophos AV 20180520
SUPERAntiSpyware 20180520
Symantec 20180519
Symantec Mobile Insight 20180518
Tencent 20180520
TheHacker 20180516
TotalDefense 20180520
TrendMicro 20180520
TrendMicro-HouseCall 20180520
Trustlook 20180520
VBA32 20180518
VIPRE 20180520
ViRobot 20180520
Webroot 20180520
Yandex 20180518
Zillya 20180519
ZoneAlarm by Check Point 20180520
Zoner 20180519
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Packers identified
F-PROT UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1970-01-03 06:36:48
Entry Point 0x00E39050
Number of sections 3
PE sections
PE imports
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
_ZN4QDirD1Ev
_ZN5QIconC1Ev
_ZN7QDialogD2Ev
CommandLineToArgvW
_Unwind_Resume
Number of PE resources by type
RT_ICON 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1970:01:03 07:36:48+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
11866112

LinkerVersion
2.24

EntryPoint
0xe39050

InitializedDataSize
12288

SubsystemVersion
4.0

ImageVersion
1.0

OSVersion
4.0

UninitializedDataSize
3047424

Compressed bundles
File identification
MD5 bce504badde4f733fa353a9b82e6b046
SHA1 f820ee9e037bace75453405e0e4a0d93046c9580
SHA256 2596fbb8534a45416fc307c0cda7b93cdbe01f671da7c4d7da8519d0ba688a9e
ssdeep
196608:dr6VqveL38GhjGVjxQl1weGyFSyLYbdxYPf1rdf8oGTV7oZnTRnJG+ugUI0htREw:dr9veL38cjQ6lCoFSVbCFGUntnU+yXxd

authentihash ac6838405bedc9b6d38c95d73bf4f385462c793b8bd32377dd051510f926a330
imphash 0f038366e6ac48d6625140e0d63da56a
File size 11.3 MB ( 11874304 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 EXE Yoda's Crypter (60.7%)
Win32 Dynamic Link Library (generic) (15.0%)
Win32 Executable (generic) (10.3%)
OS/2 Executable (generic) (4.6%)
Generic Win/DOS Executable (4.5%)
Tags
peexe upx

VirusTotal metadata
First submission 2015-09-03 13:24:07 UTC (il y a 2 ans, 8 mois)
Last submission 2018-05-20 16:26:41 UTC (il y a 3 jours, 21 heures)
Noms du fichier PS3 Flash Tool.exe
Aucun commentaire. Aucun membre de la communauté VirusTotal n'a encore commenté cet élément, soyez le premier à le faire !

Laissez votre commentaire...

?
Poster un commentaire

Vous n'êtes pas connecté. Seuls les utilisateurs enregistrés peuvent laisser des commentaires, connectez-vous pour commenter !

Aucun vote. Personne n'a encore voté pour cet élément, soyez le premier à le faire !