Information
How To Use
Undetected
32Byte = Work
64Byte = Need Testing (but i think it works)
Result Scan Antivirus
1.Open "F.E.A.R. Combat.lnk"
2.Enter a Server
3.Open "Trainer"
4.Press Numpad 1 to activate and again to desactivate when you are in game
5. Enjoy
2.Enter a Server
3.Open "Trainer"
4.Press Numpad 1 to activate and again to desactivate when you are in game
5. Enjoy
Undetected
32Byte = Work
64Byte = Need Testing (but i think it works)
Result Scan Antivirus
Antivirus Version Last Update Result
AhnLab-V3 2010.12.15.00 2010.12.14 -
AntiVir 7.11.0.36 2010.12.14 -
Antiy-AVL 2.0.3.7 2010.12.15 -
Avast 4.8.1351.0 2010.12.15 -
Avast5 5.0.677.0 2010.12.15 -
AVG 9.0.0.851 2010.12.14 Dropper.Agent.ABYJ
BitDefender 7.2 2010.12.15 -
CAT-QuickHeal 11.00 2010.12.15 -
ClamAV 0.96.4.0 2010.12.14 Trojan.Dropper-26973
Command 5.2.11.5 2010.12.15 -
Comodo 7068 2010.12.15 -
DrWeb 5.0.2.03300 2010.12.15 -
Emsisoft 5.1.0.1 2010.12.15 Trojan-Dropper.Agent!IK
eSafe 7.0.17.0 2010.12.14 -
eTrust-Vet 36.1.8041 2010.12.14 -
F-Prot 4.6.2.117 2010.12.14 -
F-Secure 9.0.16160.0 2010.12.15 -
Fortinet 4.2.254.0 2010.12.13 -
GData 21 2010.12.15 -
Ikarus T3.1.1.90.0 2010.12.15 Trojan-Dropper.Agent
Jiangmin 13.0.900 2010.12.15 -
K7AntiVirus 9.72.3246 2010.12.14 Riskware
Kaspersky 7.0.0.125 2010.12.15 -
McAfee 5.400.0.1158 2010.12.15 -
McAfee-GW-Edition 2010.1C 2010.12.15 Heuristic.BehavesLike.Win32.Suspicious.H
Microsoft 1.6402 2010.12.15 -
NOD32 5703 2010.12.14 a variant of Win32/HackTool.CheatEngine.AB
Norman 6.06.12 2010.12.14 W32/Obfuscated.I
nProtect 2010-12-15.01 2010.12.15 -
Panda 10.0.2.7 2010.12.14 -
PCTools 7.0.3.5 2010.12.15 -
Prevx 3.0 2010.12.15 Medium Risk Malware
Rising 22.78.01.04 2010.12.15 -
Sophos 4.60.0 2010.12.15 -
SUPERAntiSpyware 4.40.0.1006 2010.12.15 -
Symantec 20101.3.0.103 2010.12.15 -
TheHacker 6.7.0.1.101 2010.12.15 -
TrendMicro 9.120.0.1004 2010.12.15 -
TrendMicro-HouseCall 9.120.0.1004 2010.12.15 -
VBA32 3.12.14.2 2010.12.14 -
VIPRE 7658 2010.12.15 Trojan.Win32.Delf.abt (fs)
ViRobot 2010.12.15.4201 2010.12.15 -
VirusBuster 13.6.94.0 2010.12.14 HackTool.CheatEngine!/Rvf5d7ZQPYtrojan
Additional informationShow all
MD5 : 96c520fb3a15479ce3a702ca558462c6
SHA1 : 23509472759636084a14af6758d74a9b2b70abbc
SHA256: bde170930d6afd10d4c1a8d23c51ccdb18ae29f0825acc52f0 f7344e09785da9
ssdeep: 12288:9EDCJJDXb8qWvvMyesvleMkWzChpBTfgYvVtcgwSuLnK tTCz:9mQGbvNvjkJPKuMlXT
File size : 710626 bytes
First seen: 2010-12-15 07:47:01
Last seen : 2010-12-15 07:47:01
TrID:
Win32 Executable Delphi generic (39.8%)
Win32 Executable Generic (23.1%)
Win32 Dynamic Link Library (generic) (20.5%)
Win16/32 Executable Delphi generic (5.6%)
Generic Win/DOS Executable (5.4%)
sigcheck:
publisher....:
copyright....:
product......:
description..:
original name:
internal name: Cheat Engine Trainer
file version.: 1.8.0.0
comments.....:
signers......: -
signing date.: -
verified.....: Unsigned
PEiD: BobSoft Mini Delphi -> BoB / BobSoft
PEInfo: PE structure information
[[ basic data ]]
entrypointaddress: 0x93BBC
timedatestamp....: 0x2A425E19 (Fri Jun 19 22:22:17 1992)
machinetype......: 0x14c (I386)
[[ 8 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
CODE, 0x1000, 0x92C0C, 0x92E00, 6.54, e616d3c6f30bd2731dca7490c48bb58f
DATA, 0x94000, 0x5F90, 0x6000, 4.52, cc781214b11c750130b26aec236c28f5
BSS, 0x9A000, 0x10B9, 0x0, 0.00, d41d8cd98f00b204e9800998ecf8427e
.idata, 0x9C000, 0x2526, 0x2600, 4.99, c997daf0406fb1a448f2d1364ce070bb
.tls, 0x9F000, 0x10, 0x0, 0.00, d41d8cd98f00b204e9800998ecf8427e
.rdata, 0xA0000, 0x18, 0x200, 0.19, 984e671233c9eac12e173042a959e996
.reloc, 0xA1000, 0x949C, 0x9600, 6.66, 1db9bef998561ec44b4fb0cf35ad4fa5
.rsrc, 0xAB000, 0x787C, 0x7A00, 5.04, 4607f8b3a1e47f0f108298ad339af027
[[ 16 import(s) ]]
kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, ReadFile, RaiseException, GetStdHandle
user32.dll: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA
advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey
oleaut32.dll: SysFreeString, SysReAllocStringLen, SysAllocStringLen
kernel32.dll: TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges
kernel32.dll: lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualFreeEx, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetTempPathA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcessAffinityMask, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetExitCodeThread, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
version.dll: VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
gdi32.dll: UnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
user32.dll: CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
kernel32.dll: Sleep
oleaut32.dll: SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
comctl32.dll: ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
shell32.dll: ShellExecuteA
comdlg32.dll: GetOpenFileNameA
IMAGEHLP.DLL: SymSetSearchPath, SymSetOptions, SymLoadModule, SymInitialize, SymGetSymFromName, SymGetOptions, SymCleanup
Prevx Info:
ExifTool:
file metadata
CharacterSet: Windows, Latin1
CheatEngineHomepage:
CodeSize: 601600
Comments:
CompanyName:
EntryPoint: 0x93bbc
FileDescription:
FileFlagsMask: 0x003f
FileOS: Win32
FileSize: 694 kB
FileSubtype: 0
FileType: Win32 EXE
FileVersion: 1.8.0.0
FileVersionNumber: 1.8.0.0
ImageVersion: 0.0
InitializedDataSize: 104448
InternalName: Cheat Engine Trainer
LanguageCode: Dutch
LegalCopyright:
LegalTrademarks:
LinkerVersion: 2.25
MIMEType: application/octet-stream
MachineType: Intel 386 or later, and compatibles
OSVersion: 4.0
ObjectFileType: Executable application
OriginalFilename:
PEType: PE32
ProductName:
ProductVersion: 1.2
ProductVersionNumber: 1.8.0.0
Subsystem: Windows GUI
SubsystemVersion: 4.0
TimeStamp: 1992:06:20 00:22:17+02:00
UninitializedDataSize: 0
Symantec reputation:Suspicious.Insight
IS NOT A VIRUS
AhnLab-V3 2010.12.15.00 2010.12.14 -
AntiVir 7.11.0.36 2010.12.14 -
Antiy-AVL 2.0.3.7 2010.12.15 -
Avast 4.8.1351.0 2010.12.15 -
Avast5 5.0.677.0 2010.12.15 -
AVG 9.0.0.851 2010.12.14 Dropper.Agent.ABYJ
BitDefender 7.2 2010.12.15 -
CAT-QuickHeal 11.00 2010.12.15 -
ClamAV 0.96.4.0 2010.12.14 Trojan.Dropper-26973
Command 5.2.11.5 2010.12.15 -
Comodo 7068 2010.12.15 -
DrWeb 5.0.2.03300 2010.12.15 -
Emsisoft 5.1.0.1 2010.12.15 Trojan-Dropper.Agent!IK
eSafe 7.0.17.0 2010.12.14 -
eTrust-Vet 36.1.8041 2010.12.14 -
F-Prot 4.6.2.117 2010.12.14 -
F-Secure 9.0.16160.0 2010.12.15 -
Fortinet 4.2.254.0 2010.12.13 -
GData 21 2010.12.15 -
Ikarus T3.1.1.90.0 2010.12.15 Trojan-Dropper.Agent
Jiangmin 13.0.900 2010.12.15 -
K7AntiVirus 9.72.3246 2010.12.14 Riskware
Kaspersky 7.0.0.125 2010.12.15 -
McAfee 5.400.0.1158 2010.12.15 -
McAfee-GW-Edition 2010.1C 2010.12.15 Heuristic.BehavesLike.Win32.Suspicious.H
Microsoft 1.6402 2010.12.15 -
NOD32 5703 2010.12.14 a variant of Win32/HackTool.CheatEngine.AB
Norman 6.06.12 2010.12.14 W32/Obfuscated.I
nProtect 2010-12-15.01 2010.12.15 -
Panda 10.0.2.7 2010.12.14 -
PCTools 7.0.3.5 2010.12.15 -
Prevx 3.0 2010.12.15 Medium Risk Malware
Rising 22.78.01.04 2010.12.15 -
Sophos 4.60.0 2010.12.15 -
SUPERAntiSpyware 4.40.0.1006 2010.12.15 -
Symantec 20101.3.0.103 2010.12.15 -
TheHacker 6.7.0.1.101 2010.12.15 -
TrendMicro 9.120.0.1004 2010.12.15 -
TrendMicro-HouseCall 9.120.0.1004 2010.12.15 -
VBA32 3.12.14.2 2010.12.14 -
VIPRE 7658 2010.12.15 Trojan.Win32.Delf.abt (fs)
ViRobot 2010.12.15.4201 2010.12.15 -
VirusBuster 13.6.94.0 2010.12.14 HackTool.CheatEngine!/Rvf5d7ZQPYtrojan
Additional informationShow all
MD5 : 96c520fb3a15479ce3a702ca558462c6
SHA1 : 23509472759636084a14af6758d74a9b2b70abbc
SHA256: bde170930d6afd10d4c1a8d23c51ccdb18ae29f0825acc52f0 f7344e09785da9
ssdeep: 12288:9EDCJJDXb8qWvvMyesvleMkWzChpBTfgYvVtcgwSuLnK tTCz:9mQGbvNvjkJPKuMlXT
File size : 710626 bytes
First seen: 2010-12-15 07:47:01
Last seen : 2010-12-15 07:47:01
TrID:
Win32 Executable Delphi generic (39.8%)
Win32 Executable Generic (23.1%)
Win32 Dynamic Link Library (generic) (20.5%)
Win16/32 Executable Delphi generic (5.6%)
Generic Win/DOS Executable (5.4%)
sigcheck:
publisher....:
copyright....:
product......:
description..:
original name:
internal name: Cheat Engine Trainer
file version.: 1.8.0.0
comments.....:
signers......: -
signing date.: -
verified.....: Unsigned
PEiD: BobSoft Mini Delphi -> BoB / BobSoft
PEInfo: PE structure information
[[ basic data ]]
entrypointaddress: 0x93BBC
timedatestamp....: 0x2A425E19 (Fri Jun 19 22:22:17 1992)
machinetype......: 0x14c (I386)
[[ 8 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
CODE, 0x1000, 0x92C0C, 0x92E00, 6.54, e616d3c6f30bd2731dca7490c48bb58f
DATA, 0x94000, 0x5F90, 0x6000, 4.52, cc781214b11c750130b26aec236c28f5
BSS, 0x9A000, 0x10B9, 0x0, 0.00, d41d8cd98f00b204e9800998ecf8427e
.idata, 0x9C000, 0x2526, 0x2600, 4.99, c997daf0406fb1a448f2d1364ce070bb
.tls, 0x9F000, 0x10, 0x0, 0.00, d41d8cd98f00b204e9800998ecf8427e
.rdata, 0xA0000, 0x18, 0x200, 0.19, 984e671233c9eac12e173042a959e996
.reloc, 0xA1000, 0x949C, 0x9600, 6.66, 1db9bef998561ec44b4fb0cf35ad4fa5
.rsrc, 0xAB000, 0x787C, 0x7A00, 5.04, 4607f8b3a1e47f0f108298ad339af027
[[ 16 import(s) ]]
kernel32.dll: DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, ReadFile, RaiseException, GetStdHandle
user32.dll: GetKeyboardType, LoadStringA, MessageBoxA, CharNextA
advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey
oleaut32.dll: SysFreeString, SysReAllocStringLen, SysAllocStringLen
kernel32.dll: TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
advapi32.dll: RegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges
kernel32.dll: lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualFreeEx, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetTempPathA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcessAffinityMask, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetExitCodeThread, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
version.dll: VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
gdi32.dll: UnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
user32.dll: CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetAsyncKeyState, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
kernel32.dll: Sleep
oleaut32.dll: SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
comctl32.dll: ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
shell32.dll: ShellExecuteA
comdlg32.dll: GetOpenFileNameA
IMAGEHLP.DLL: SymSetSearchPath, SymSetOptions, SymLoadModule, SymInitialize, SymGetSymFromName, SymGetOptions, SymCleanup
Prevx Info:
ExifTool:
file metadata
CharacterSet: Windows, Latin1
CheatEngineHomepage:
CodeSize: 601600
Comments:
CompanyName:
EntryPoint: 0x93bbc
FileDescription:
FileFlagsMask: 0x003f
FileOS: Win32
FileSize: 694 kB
FileSubtype: 0
FileType: Win32 EXE
FileVersion: 1.8.0.0
FileVersionNumber: 1.8.0.0
ImageVersion: 0.0
InitializedDataSize: 104448
InternalName: Cheat Engine Trainer
LanguageCode: Dutch
LegalCopyright:
LegalTrademarks:
LinkerVersion: 2.25
MIMEType: application/octet-stream
MachineType: Intel 386 or later, and compatibles
OSVersion: 4.0
ObjectFileType: Executable application
OriginalFilename:
PEType: PE32
ProductName:
ProductVersion: 1.2
ProductVersionNumber: 1.8.0.0
Subsystem: Windows GUI
SubsystemVersion: 4.0
TimeStamp: 1992:06:20 00:22:17+02:00
UninitializedDataSize: 0
Symantec reputation:Suspicious.Insight
IS NOT A VIRUS
IF U DONT TRUST ON MY TRAINER
Download the "FEARMP-NORELOAD CT.rar" and USE to Open It