× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: e8742e077573d96f2dcd2128981f254dc3924171c3aa4d6732e76ee5c414e80d
Nombre: ALSetup.exe
Detecciones: 0 / 63
Fecha de análisis: 2017-07-18 12:24:37 UTC ( hace 3 meses ) Ver el más reciente
Antivirus Resultado Actualización
Ad-Aware 20170718
AegisLab 20170718
AhnLab-V3 20170718
Alibaba 20170718
ALYac 20170718
Antiy-AVL 20170718
Arcabit 20170718
Avast 20170718
AVG 20170718
Avira (no cloud) 20170718
AVware 20170718
Baidu 20170718
BitDefender 20170718
Bkav 20170718
CAT-QuickHeal 20170718
ClamAV 20170718
CMC 20170718
Comodo 20170718
CrowdStrike Falcon (ML) 20170710
Cylance 20170718
Cyren 20170718
DrWeb 20170718
Emsisoft 20170718
Endgame 20170713
ESET-NOD32 20170718
F-Prot 20170718
F-Secure 20170718
Fortinet 20170718
GData 20170718
Ikarus 20170718
Sophos ML 20170607
Jiangmin 20170718
K7AntiVirus 20170718
K7GW 20170718
Kaspersky 20170718
Kingsoft 20170718
Malwarebytes 20170718
MAX 20170718
McAfee 20170718
McAfee-GW-Edition 20170718
Microsoft 20170718
eScan 20170718
NANO-Antivirus 20170718
nProtect 20170718
Palo Alto Networks (Known Signatures) 20170718
Panda 20170718
Qihoo-360 20170718
Rising 20170718
SentinelOne (Static ML) 20170718
Sophos AV 20170718
SUPERAntiSpyware 20170718
Symantec 20170718
Symantec Mobile Insight 20170718
Tencent 20170718
TheHacker 20170717
TrendMicro 20170718
TrendMicro-HouseCall 20170718
Trustlook 20170718
VBA32 20170718
VIPRE 20170718
ViRobot 20170718
Webroot 20170718
WhiteArmor 20170713
Yandex 20170717
Zillya 20170717
ZoneAlarm by Check Point 20170718
Zoner 20170718
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
OK SOFT LLC

Product Another Level
File version 2.2.0.563
Description Another Level Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signers
[+] OK SOFT LLC
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 4/7/2016
Valid to 12:59 AM 4/8/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 7CB75177CCF62C3014846BE7DBAF823C1CD9F5CF
Serial number 06 23 03 F1 46 8F 75 C6 B3 6A 36 C9 77 A8 60 14
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE?
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-04-06 14:39:04
Entry Point 0x000117DC
Number of sections 8
PE sections
Overlays
MD5 3ae1accf19ce44285265651667e3b38a
File type data
Offset 178688
Size 3271840
Entropy 8.00
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetSystemDirectoryW
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 8
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
2.2.0.563

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
111104

EntryPoint
0x117dc

MIMEType
application/octet-stream

LegalCopyright
OK SOFT LLC

FileVersion
2.2.0.563

TimeStamp
2016:04:06 15:39:04+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

ProductVersion
2.1

FileDescription
Another Level Setup

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
OK SOFT LLC

CodeSize
66560

ProductName
Another Level

ProductVersionNumber
2.2.0.563

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 28d6404f84b7bcbecbbec21db1a52483
SHA1 f1b675a6b4c144839da25d949ec65158fab0fbbc
SHA256 e8742e077573d96f2dcd2128981f254dc3924171c3aa4d6732e76ee5c414e80d
ssdeep
49152:ZCKDYiV3c1Umvlh88TeasXpw8p1oPTAW02Nq6EiBaxg0yf9jsb9F:aihr2h8yU7ot0SEzMf9I5F

authentihash 8881a3e1b5fa79a3097115ef0b6c7107d6d5949adca24f16709bf856b529ce1f
imphash 20dd26497880c05caed9305b3c8b9109
Tamaño del fichero 3.3 MB ( 3450528 bytes )
Tipo Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (57.2%)
Win32 Executable (generic) (18.2%)
Win16/32 Executable Delphi generic (8.3%)
Generic Win/DOS Executable (8.0%)
DOS Executable Generic (8.0%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-07-18 12:15:24 UTC ( hace 3 meses )
Last submission 2017-07-18 12:24:37 UTC ( hace 3 meses )
Nombres ALSetup.exe
28d6404f84b7bcbecbbec21db1a52483
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.