× Cookies estão desativados! Este site requer que os cookies estejam habilitados para funcionar corretamente
SHA256: fa2200ec64f4905cb889fe8581f0fe85993753096c5ffd551ba0a3fe0156709d
Nome do arquivo: Crack Anno 2070.exe
Taxa de detecção: 2 / 46
Data da análise: 2013-08-16 22:37:15 UTC ( 4 anos atrás )
Antivírus Resultado Atualização
K7AntiVirus Spyware 20130816
K7GW Spyware 20130816
Yandex 20130816
AhnLab-V3 20130816
AntiVir 20130816
Antiy-AVL 20130816
Avast 20130816
AVG 20130816
BitDefender 20130816
ByteHero 20130814
CAT-QuickHeal 20130816
ClamAV 20130816
Commtouch 20130816
Comodo 20130816
DrWeb 20130816
Emsisoft 20130816
ESET-NOD32 20130816
F-Prot 20130816
F-Secure 20130816
Fortinet 20130816
GData 20130816
Ikarus 20130816
Jiangmin 20130816
Kaspersky 20130816
Kingsoft 20130723
Malwarebytes 20130816
McAfee 20130816
McAfee-GW-Edition 20130816
Microsoft 20130816
eScan 20130816
NANO-Antivirus 20130816
Norman 20130816
nProtect 20130816
Panda 20130816
PCTools 20130816
Rising 20130816
Sophos AV 20130816
SUPERAntiSpyware 20130816
Symantec 20130816
TheHacker 20130816
TotalDefense 20130816
TrendMicro 20130816
TrendMicro-HouseCall 20130816
VBA32 20130816
VIPRE 20130816
ViRobot 20130816
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-12-17 16:14:10
Entry Point 0x0000B2EC
Number of sections 5
PE sections
PE imports
RegCreateKeyExW
RegCloseKey
OpenProcessToken
RegSetValueExW
RegOpenKeyExW
SetFileSecurityW
AdjustTokenPrivileges
LookupPrivilegeValueW
SetFileSecurityA
RegQueryValueExW
Ord(17)
InitCommonControlsEx
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetDeviceCaps
DeleteDC
SelectObject
StretchBlt
GetObjectW
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
SetFilePointer
GetSystemTime
GetLastError
HeapFree
GetStdHandle
DosDateTimeToFileTime
ReadFile
FileTimeToSystemTime
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
FindNextFileA
CompareStringW
HeapAlloc
SystemTimeToFileTime
IsDBCSLeadByte
GetCommandLineW
GetFileAttributesW
GetCurrentProcess
FileTimeToLocalFileTime
MoveFileW
OpenFileMappingW
SetFileAttributesA
GetDateFormatW
CreateDirectoryA
DeleteFileA
GetCPInfo
ExitProcess
MultiByteToWideChar
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
CreateFileMappingW
GetTimeFormatW
WriteFile
SetFileAttributesW
CloseHandle
WideCharToMultiByte
MapViewOfFile
MoveFileExW
ExpandEnvironmentStringsW
FindNextFileW
SetEndOfFile
GetFileAttributesA
GetTempPathW
FindFirstFileA
FindFirstFileW
HeapReAlloc
GetModuleHandleW
GetFullPathNameA
GetCurrentDirectoryW
LoadLibraryW
SetCurrentDirectoryW
UnmapViewOfFile
FindResourceW
CreateFileW
GlobalAlloc
LocalFileTimeToFileTime
FindClose
Sleep
GetFileType
GetFullPathNameW
SetFileTime
CreateFileA
GetTickCount
GetLocaleInfoW
GetNumberFormatW
SetLastError
CompareStringA
SHBrowseForFolderW
SHChangeNotify
SHFileOperationW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetFileInfoW
SHGetMalloc
SHAutoComplete
SetFocus
MapWindowPoints
GetParent
UpdateWindow
EndDialog
LoadBitmapW
DefWindowProcW
CopyRect
GetWindowTextW
GetMessageW
ShowWindow
GetSystemMetrics
SetWindowPos
wvsprintfW
CharToOemBuffA
SetWindowLongW
IsWindow
SendMessageW
GetWindowRect
RegisterClassExW
CharUpperW
DialogBoxParamW
CharToOemBuffW
wvsprintfA
SendDlgItemMessageW
GetDlgItemTextW
PostMessageW
GetSysColor
SetDlgItemTextW
GetDC
ReleaseDC
DestroyIcon
TranslateMessage
IsWindowVisible
LoadStringW
SetWindowTextW
GetDlgItem
GetWindow
MessageBoxW
DispatchMessageW
GetClassNameW
PeekMessageW
CharUpperA
OemToCharA
EnableWindow
GetClientRect
WaitForInputIdle
OemToCharBuffA
LoadCursorW
LoadIconW
FindWindowExW
CreateWindowExW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CharToOemA
CreateStreamOnHGlobal
OleUninitialize
CoCreateInstance
OleInitialize
CLSIDFromString
Number of PE resources by type
RT_ICON 8
RT_DIALOG 6
RT_STRING 5
RT_MANIFEST 1
RT_BITMAP 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 13
NEUTRAL DEFAULT 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2010:12:17 17:14:10+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
71680

LinkerVersion
9.0

EntryPoint
0xb2ec

InitializedDataSize
245248

SubsystemVersion
5.0

ImageVersion
0.0

OSVersion
5.0

UninitializedDataSize
0

File identification
MD5 6cd533a5584f244ad1db81aae3bfc6a3
SHA1 a4c343852dc6bafe95b1db6ceaaee97ac9e171ee
SHA256 fa2200ec64f4905cb889fe8581f0fe85993753096c5ffd551ba0a3fe0156709d
ssdeep
786432:JrpgOgx7l0fQ6ca961+hdwkk9DTKH9uPC+EIae9MiHJGjshdUjpz3:Jrpg/l0f7ca9tzwkkUdu6+55Gpz3

File size 41.1 MB ( 43129535 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-07-21 22:34:56 UTC ( 4 anos atrás )
Last submission 2013-08-16 22:37:15 UTC ( 4 anos atrás )
Nomes do arquivo Crack Anno 2070.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Sem comentários. Ainda nenhum membro da Comunidade VirusTotal comentou este item, seja o primeiro!

Deixe o seu comentário...

?
Postar comentário

Você ainda não entrou. Apenas usuários registrados podem comentar, entre e expresse-se!

Sem votos. Ainda nenhum usuário votou neste item, seja o primeiro!