× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5acbb022008eb351ffa539eed33e8f9a81a39510b4faee235cdd6d4671474608
File name: 5acbb022008eb351ffa539eed33e8f9a81a39510b4faee235cdd6d4671474608.bin
Detection ratio: 5 / 54
Analysis date: 2016-02-01 10:11:04 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Kaspersky UDS:DangerousObject.Multi.Generic 20160201
McAfee-GW-Edition BehavesLike.Win32.Downloader.dh 20160201
Qihoo-360 HEUR/QVM20.1.Malware.Gen 20160201
Rising PE:Malware.Generic(Thunder)!1.A1C4 [F] 20160129
Tencent Trojan.Win32.YY.Gen.7 20160201
Ad-Aware 20160130
AegisLab 20160130
Yandex 20160129
AhnLab-V3 20160129
Alibaba 20160129
ALYac 20160130
Antiy-AVL 20160130
Arcabit 20160130
Avast 20160130
AVG 20160130
Avira (no cloud) 20160130
Baidu-International 20160129
BitDefender 20160130
Bkav 20160129
ByteHero 20160201
CAT-QuickHeal 20160129
ClamAV 20160130
CMC 20160130
Comodo 20160130
Cyren 20160201
DrWeb 20160201
Emsisoft 20160201
ESET-NOD32 20160201
F-Prot 20160129
F-Secure 20160129
Fortinet 20160201
GData 20160201
Ikarus 20160201
Jiangmin 20160201
K7AntiVirus 20160201
K7GW 20160201
Malwarebytes 20160201
McAfee 20160201
Microsoft 20160201
eScan 20160201
NANO-Antivirus 20160201
nProtect 20160129
Panda 20160129
Sophos AV 20160130
SUPERAntiSpyware 20160130
Symantec 20160129
TheHacker 20160130
TrendMicro 20160130
TrendMicro-HouseCall 20160130
VBA32 20160128
VIPRE 20160130
ViRobot 20160129
Zillya 20160130
Zoner 20160130
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name RunLegacyCPLElevated.EXE
Internal name RunLegacyCPLElevated
File version 6.3.7603.16385 (win7_rtm.090713-1255)
Description Run a legacy CPL elevated
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-02-01 08:44:50
Entry Point 0x0000105A
Number of sections 12
PE sections
PE imports
FreeConsole
MessageBoxA
isdigit
sin
Number of PE resources by type
RT_ICON 13
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.3.7613.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
165888

EntryPoint
0x105a

OriginalFileName
RunLegacyCPLElevated.EXE

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.3.7603.16385 (win7_rtm.090713-1255)

TimeStamp
2016:02:01 09:44:50+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
RunLegacyCPLElevated

ProductVersion
6.3.7603.16385

FileDescription
Run a legacy CPL elevated

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
52224

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.3.7603.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 d8c5ae895f2503c80fb13911607f5593
SHA1 caac54a31544b682ac6e006e6b3be63cc3bd2a35
SHA256 5acbb022008eb351ffa539eed33e8f9a81a39510b4faee235cdd6d4671474608
ssdeep
3072:c5nN5QrzAGcfQYnPCMKs53xyPjm6kyN35eE0JVYYPwyB:cv587oPnP53x8m6kyneE2wy

authentihash 91a314ae24838a6eeba9b637fc2a29f9e57f71e51bf1aa2ba4ca424311be3ab4
imphash f11593b50670640c53ee2c1c59e9ff75
File size 208.5 KB ( 213504 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (43.5%)
Win32 Executable (generic) (29.8%)
Generic Win/DOS Executable (13.2%)
DOS Executable Generic (13.2%)
Tags
peexe

VirusTotal metadata
First submission 2016-02-01 08:36:05 UTC ( 3 years, 1 month ago )
Last submission 2016-12-16 10:37:42 UTC ( 2 years, 3 months ago )
File names RunLegacyCPLElevated.EXE
k76j5hg.exe
RunLegacyCPLElevated
5acbb022008eb351ffa539eed33e8f9a81a39510b4faee235cdd6d4671474608.exe.000
5acbb022008eb351ffa539eed33e8f9a81a39510b4faee235cdd6d4671474608.bin
perdoma.exe
k76j5hg.exe
k76j5hg.exe
d8c5ae895f2503c80fb13911607f5593.caac54a31544b682ac6e006e6b3be63cc3bd2a35 (1).primary_analysis_subject
perdoma.exe
k76j5hg.exe
k76j5hg.exe
k76j5hg[1].exe
perdoma.exe
d8c5ae895f2503c80fb13911607f5593.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Code injections in the following processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications