call of duty ghosts - cheat engine 3.1.2 setup.exe

Call of Duty Ghosts CHEATS

This is a setup and installation application. The file has been seen being downloaded from www70.zippyshare.com.
Publisher:
Call of Duty Ghosts CHEATS

Description:
Call of Duty Ghosts - Cheat Engine 3.1.2 Installation

Version:
3.1.2

MD5:
3c71c2448a0386353d751367d97210cc

SHA-1:
0020f640533217ad7725bb9b5b038f809f0ae129

SHA-256:
0dc0e814abf3c601fc29646b516584c3975f6390d11b8a406a4d8d53500ae537

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
4/26/2024 9:39:08 AM UTC  (today)

Scan engine
Detection
Engine version

Total Defense
Win32/Jorik.KJ
37.0.10831

File size:
5.6 MB (5,862,071 bytes)

Copyright:
Call of Duty Ghosts CHEATS

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\call of duty ghosts - cheat engine 3.1.2 setup.exe

File PE Metadata
Compilation timestamp:
6/20/1992 2:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:cXz+9PGIDnJ4G/9943y0+rlhVjGFKQpZBhG6NX09M8rmTVUDJqmhs1VCsbAsKSZy:kKZGIDJpV7rx6FKQpZO6z8qRKJq530sm

Entry address:
0x25468

Entry point:
55, 8B, EC, 83, C4, F0, B8, 88, 53, 42, 00, E8, 24, F2, FD, FF, B8, C8, 54, 42, 00, E8, 2A, 1C, FE, FF, 8B, 15, 40, 88, 42, 00, 89, 02, 8B, 15, 40, 88, 42, 00, 8B, 12, A1, 48, 88, 42, 00, E8, E4, D3, FF, FF, 8B, 15, 40, 88, 42, 00, 8B, 12, A1, DC, 87, 42, 00, E8, 7A, 64, FF, FF, A1, 40, 88, 42, 00, E8, AC, 4E, FE, FF, E8, DF, E0, FD, FF, 00, 00, 00, FF, FF, FF, FF, 01, 00, 00, 00, 2A, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9427

Developed / compiled with:
Microsoft Visual C++

Code size:
145.5 KB (148,992 bytes)

The file call of duty ghosts - cheat engine 3.1.2 setup.exe has been seen being distributed by the following URL.