blood bowl legendar edition pc espanol full iso dvd5.exe

The Flowing

Dispute Ignitable

The executable blood bowl legendar edition pc espanol full iso dvd5.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from sharesuper.info.
Publisher:
Dispute Ignitable

Product:
The Flowing

Description:
Language Modern

Version:
7.8.8.1

MD5:
433a0f082271ac83969ff92829a890ff

SHA-1:
6d3ce8eeac01e36e18d58eb7a7a3e100dbeb4192

SHA-256:
083b6b59eb0dcc8d7dea44b32609b6159a45eb959440a8760a47dddff7b8f091

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/23/2024 3:16:52 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.8.2.8

File size:
812 KB (831,488 bytes)

Product version:
8.5.9.9

Copyright:
All rights reserved for Dispute Ignitable LTD.

Original file name:
Blood Bowl Legendar Edition PC Espanol F.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\blood bowl legendar edition pc espanol full iso dvd5.exe

File PE Metadata
Compilation timestamp:
6/14/2012 6:45:02 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:kCWYYlXrSmjsVxgz1bvGrhRKmjTIr8E7C4e:kCDYpr1sXgZ6lrTQe

Entry address:
0x18420

Entry point:
E8, 84, 48, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 00, C4, 43, 00, E8, 6A, 0D, 00, 00, E8, 51, 4A, 00, 00, 0F, B7, F0, 6A, 02, E8, 17, 48, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, D5, 06, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
129.5 KB (132,608 bytes)

The file blood bowl legendar edition pc espanol full iso dvd5.exe has been seen being distributed by the following URL.