× Çerezler devre dışı bırakılmış! Bu sitenin düzgün bir şekilde çalışabilmesi için çerezlerin açık olması gerekir.
SHA256: 9ed0dd765427ed113acaa3134c9c4331f2fb1d22a7bf88be0bd0b8e5e2e79d2e
Dosya adı: Call of Duty Modern Warfare 2_TR_Yama_v1.00.exe
Tespit edilme orani 6 / 55
Analiz tarihi: 2014-12-05 21:39:15 UTC ( 3 yıl önce) En sonuncusunu görüntüle
Antivirus Sonuç Güncelle
Comodo UnclassifiedMalware 20141204
McAfee Artemis!887BA2D4753F 20141205
McAfee-GW-Edition BehavesLike.Win32.BadFile.tc 20141205
Norman Suspicious_Gen5.ACMCV 20141205
Symantec Trojan.Gen.2 20141205
TrendMicro-HouseCall TROJ_GEN.R0C1H05JI14 20141205
Ad-Aware 20141205
AegisLab 20141205
Yandex 20141205
AhnLab-V3 20141205
ALYac 20141205
Antiy-AVL 20141205
Avast 20141205
AVG 20141205
Avira (no cloud) 20141205
AVware 20141205
Baidu-International 20141205
BitDefender 20141205
Bkav 20141205
ByteHero 20141205
CAT-QuickHeal 20141205
ClamAV 20141205
CMC 20141204
Cyren 20141205
DrWeb 20141205
ESET-NOD32 20141205
F-Prot 20141205
F-Secure 20141205
Fortinet 20141205
GData 20141205
Ikarus 20141205
Jiangmin 20141205
K7AntiVirus 20141205
K7GW 20141205
Kaspersky 20141205
Kingsoft 20141205
Malwarebytes 20141205
Microsoft 20141205
eScan 20141205
NANO-Antivirus 20141205
nProtect 20141205
Panda 20141205
Qihoo-360 20141205
Rising 20141205
Sophos AV 20141205
SUPERAntiSpyware 20141205
Tencent 20141205
TheHacker 20141205
TotalDefense 20141205
TrendMicro 20141205
VBA32 20141205
VIPRE 20141205
ViRobot 20141205
Zillya 20141204
Zoner 20141204
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
2013 - OyunCeviri.com

Product Call of Duty Modern Warfare 2 Türkçe Yama
File version 1.00
Description Call of Duty Modern Warfare 2 TR v1.00
Comments Oyunlar artýk Türkçe :)
Packers identified
F-PROT NSIS, docwrite, UPX, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-12-05 22:50:46
Entry Point 0x0003C400
Number of sections 3
PE sections
Overlays
MD5 f669d83db739e0b554a6a8c16447f589
File type data
Offset 24576
Size 1377500
Entropy 8.00
PE imports
RegEnumKeyA
SetBkMode
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
ShellExecuteA
VerQueryValueA
CoTaskMemFree
Number of PE resources by type
RT_DIALOG 4
RT_ICON 1
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 7
NEUTRAL 1
PE resources
ExifTool file metadata
CodeSize
20480

SubsystemVersion
4.0

Comments
Oyunlar art k T rk e :)

InitializedDataSize
8192

ImageVersion
6.0

CompanyWebsite
http://www.oyunceviri.com

ProductName
Call of Duty Modern Warfare 2 T rk e Yama

FileVersionNumber
1.0.0.0

UninitializedDataSize
225280

LanguageCode
Neutral

FileFlagsMask
0x0000

CharacterSet
Windows, Latin1

LinkerVersion
6.0

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
1.0

TimeStamp
2009:12:05 23:50:46+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.0

FileDescription
Call of Duty Modern Warfare 2 TR v1.00

OSVersion
4.0

FileOS
Win32

LegalCopyright
2013 - OyunCeviri.com

MachineType
Intel 386 or later, and compatibles

CompanyName
OyunCeviri.com

LegalTrademarks
Call of Duty Modern Warfare 2 Activision

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x3c400

ObjectFileType
Executable application

File identification
MD5 887ba2d4753fd4b3620abf33b2abbd68
SHA1 9ef1cdb2d51e08b23f3750a402de600767166829
SHA256 9ed0dd765427ed113acaa3134c9c4331f2fb1d22a7bf88be0bd0b8e5e2e79d2e
ssdeep
24576:pHFmWCU5Qm/ywJxWK4Ky9IjyDG2jlrQc6qdDF2Em3K00JeLg4ij6WsdeD:qG5QPf97D/BUclJyng4ywY

authentihash 3e52ba66c6f582068de147e46d48cb983af36e6221fa083d5d2f50d62dba1d6e
imphash 2134f794bcda54794e74b7208adb2204
Dosya boyutu 1.3 MB ( 1402076 bytes )
Dosya türü Win32 EXE
Magic lafzı
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (39.3%)
Win32 EXE Yoda's Crypter (38.6%)
Win32 Dynamic Link Library (generic) (9.5%)
Win32 Executable (generic) (6.5%)
Generic Win/DOS Executable (2.9%)
Tags
nsis peexe upx overlay

VirusTotal metadata
First submission 2013-04-03 20:48:33 UTC ( 4 yıl, 8 ay önce)
Last submission 2017-10-09 13:19:18 UTC ( 2 ay, 1 hafta önce)
Dosya isimleri Call of Duty Modern Warfare 2_TR_Yama_v1.00.exe
Call of Duty Modern Warfare 2 T³rk_e Yama v1.00.exe
call of duty modern warfare 2 türkçe yama v1.00.exe
Call-of-Duty-Modern-Warfare-2-Turkce-Yama-v1.00-tamindir.exe
Call_of_Duty_Modern_Warfare_2_T%C3%BCrkce_Yama%20v1.00.exe
file-6475550_exe
Call of Duty Modern Warfare 2 Trke Yama v1.00.exe
call of duty modern warfare 2_tr_yama_v1.00.exe
call of duty modern warfare 2 türkçe yama v1.00.exe
Call_of_Duty_6_Modern_Warfare_2_Turkce_Yama.exe
call_of_duty_6_modern_warfare_2_turkce_yama.exe
source
51501459
887BA2D4753FD4B3620ABF33B2ABBD68
Call of Duty Modern Warfare 2 Türkçe Yama v1.00.exe
Call_of_Duty_Modern_Warfare_2_T%C3%BCrkce_Yama v1.00.exe
Call of Duty 6 - Modern Warfare 2 Trke Yama v1.00.exe
call-of-duty-modern-warfare-2-turkce-yama.exe
Call of Duty 6 - Modern Warfare 2 Türkçe Yama v1.00.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: TROJ_GEN.R047H05DE16.

Symantec reputation Suspicious.Insight
Yorum yok.. Henüz hiçbir VirusTotal Topluluğu üyesi bu öğeye yorum yapmadı.Bunu yapan ilk sen ol!

Yorum ekleyin...

?
Yorumu gönder.

Üye girişi yapmadınız..Sadece kayıtlı kullanıcılar yorum yapabilir.Sesinizi duyurmak için giriş yapın.

Oy yok.. Bu öğeyi daha önce hiç kimse oylamadı.Bunu yapan ilk sen ol!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Set keys
Code injections in the following processes
Created mutexes
Searched windows
Opened service managers
Opened services
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications