× Cookie が無効になっています。 このサイトを正しく動作させるには、Cookie を有効にする必要があります
SHA256: aa941f7696f26dd2793727e7aad40f9855b3026c7cc810e47a4dde0e452ba114
ファイル名: AssaultLite.118.exe
検出率: 2 / 45
分析日時: 2013-03-10 20:40:56 UTC (6 年, 2 ヶ月前)
ウイルス対策ソフト 結果 更新日
Ikarus Backdoor.Win32.Beastdoor 20130310
PCTools HeurEngine.ZeroDayThreat 20130310
Yandex 20130309
AhnLab-V3 20130310
AntiVir 20130310
Antiy-AVL 20130310
Avast 20130310
AVG 20130310
BitDefender 20130310
ByteHero 20130304
CAT-QuickHeal 20130309
ClamAV 20130310
Commtouch 20130310
Comodo 20130310
DrWeb 20130310
Emsisoft 20130310
eSafe 20130307
ESET-NOD32 20130310
F-Prot 20130310
F-Secure 20130310
Fortinet 20130310
GData 20130310
Jiangmin 20130310
K7AntiVirus 20130308
Kaspersky 20130310
Kingsoft 20130304
Malwarebytes 20130310
McAfee 20130310
McAfee-GW-Edition 20130310
Microsoft 20130310
eScan 20130310
NANO-Antivirus 20130310
Norman 20130310
nProtect 20130310
Panda 20130310
Sophos AV 20130310
SUPERAntiSpyware 20130310
Symantec 20130310
TheHacker 20130310
TotalDefense 20130310
TrendMicro 20130310
TrendMicro-HouseCall 20130310
VBA32 20130308
VIPRE 20130310
ViRobot 20130310
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001ED38
Number of sections 8
PE sections
PE imports
DirectSoundCreate
GetDeviceCaps
SwapBuffers
CreateFontA
DeleteDC
SelectObject
GetTextExtentPoint32A
SetPixelFormat
TextOutA
ChoosePixelFormat
SetBkMode
CreateDIBSection
CreateCompatibleDC
DeleteObject
SetTextColor
gluPerspective
gluBuild2DMipmaps
gluLookAt
GetSystemTime
GetLastError
HeapFree
FileTimeToDosDateTime
ReleaseMutex
GetFileAttributesA
GlobalFree
WaitForSingleObject
FreeLibrary
QueryPerformanceCounter
EnterCriticalSection
HeapAlloc
GetVersionExA
GlobalUnlock
GetModuleFileNameA
GlobalAlloc
RtlUnwind
RemoveDirectoryA
GetLocalTime
QueryPerformanceFrequency
DeleteCriticalSection
GetTickCount
GetDateFormatA
FileTimeToLocalFileTime
WritePrivateProfileStringA
LocalAlloc
GetPrivateProfileIntA
CreateDirectoryA
DeleteFileA
GlobalReAlloc
UnhandledExceptionFilter
GetPrivateProfileSectionA
GetCommandLineA
GlobalLock
GetProcessHeap
CreateMutexA
SetFilePointer
RaiseException
CompareStringA
CloseHandle
CreateThread
GetModuleHandleA
FlushFileBuffers
ReadFile
WriteFile
FindFirstFileA
MulDiv
GetTimeFormatA
FindNextFileA
GlobalMemoryStatusEx
ExitThread
HeapReAlloc
GetFullPathNameA
SetEvent
LocalFree
SetThreadPriority
ResumeThread
GetExitCodeThread
InitializeCriticalSection
GlobalHandle
CreateEventA
FindClose
TlsGetValue
Sleep
FormatMessageA
SetEndOfFile
TlsSetValue
CreateFileA
ExitProcess
GetCurrentThreadId
SetCurrentDirectoryA
LeaveCriticalSection
SysReAllocStringLen
SysFreeString
glNormalPointer
glVertex2f
glPopMatrix
glTexCoord2f
glTexImage2D
glDisable
wglCreateContext
glMaterialfv
glClearColor
glPointSize
glBindTexture
glLineStipple
glMaterialf
glGetIntegerv
glHint
glVertexPointer
glVertex2fv
glColor4ub
glGetString
glEnable
glLightfv
glClear
glScalef
glGetTexLevelParameteriv
glLineWidth
glPopAttrib
glRotatef
glLoadIdentity
glReadPixels
wglGetProcAddress
glPushAttrib
glEnableClientState
glBlendFunc
glDeleteTextures
glTranslatef
glShadeModel
glColor3f
wglMakeCurrent
glViewport
glDisableClientState
glTexEnvi
glDrawElements
glNewList
glMultMatrixf
glGetTexImage
glAlphaFunc
wglDeleteContext
glCallLists
glGenLists
glTexParameterf
glGenTextures
glTexParameteri
glPushMatrix
glMatrixMode
glEnd
glOrtho
glListBase
glBegin
glPixelStorei
glEndList
glTexCoordPointer
glDeleteLists
MapVirtualKeyA
GetForegroundWindow
PostMessageA
ChangeDisplaySettingsA
PostQuitMessage
DefWindowProcA
ShowWindow
SetWindowPos
GetSystemMetrics
DispatchMessageA
ScreenToClient
SetCapture
ReleaseCapture
MessageBoxA
PeekMessageA
SetWindowLongA
wvsprintfA
TranslateMessage
GetDC
GetCursorPos
ReleaseDC
GetClassInfoA
UnregisterClassA
GetKeyNameTextA
SendMessageA
SetCursorPos
RegisterClassA
EnumDisplaySettingsA
GetWindowTextLengthA
CreateWindowExA
LoadCursorA
LoadIconA
GetKeyboardState
ShowCursor
CharNextA
MsgWaitForMultipleObjects
GetWindowTextA
DestroyWindow
timeKillEvent
timeSetEvent
Number of PE resources by type
RT_RCDATA 2
Number of PE resources by language
NEUTRAL 2
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
122880

LinkerVersion
2.25

EntryPoint
0x1ed38

InitializedDataSize
43008

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 cfd6205bf67a183e0baf0ec16b4d9534
SHA1 3300d985219f05cd58364033defa1377661fb226
SHA256 aa941f7696f26dd2793727e7aad40f9855b3026c7cc810e47a4dde0e452ba114
ssdeep
3072:cwjVpXu1F3Oo8ArL3Rs8OrAMXdYDF0Y4I0yAdhp9f:jjvXuf3V8Aps82MARdT

File size 163.0 KB ( 166912 bytes )
File type Win32 EXE
Magic literal
MS-DOS executable PE for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable Delphi generic (39.8%)
Win32 Executable Generic (23.1%)
Win32 Dynamic Link Library (generic) (20.5%)
Win16/32 Executable Delphi generic (5.6%)
Generic Win/DOS Executable (5.4%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-10 20:40:56 UTC (6 年, 2 ヶ月前)
Last submission 2013-03-10 20:40:56 UTC (6 年, 2 ヶ月前)
ファイル名 AssaultLite.118.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
コメントはありません. この項目について、VirusTotal コミュニティのメンバーはまだ誰もコメントしていません。是非、コメントしてください。

コメントを投稿してください...

?
コメントを投稿

サインインしていません。登録ユーザーのみがコメントを投稿できます。サインインして意見をお聞かせください。

投票はありません. この項目に対してまだ誰も投票していません。是非、投票してください。
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Written files