× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6e9bc5581e6c0608a8b3df978a7d919fff441dbc90dabd1ee0a25e646272b049
File name: fil0F4CD3729AF07C1C460E292E0F081D0A
Detection ratio: 0 / 67
Analysis date: 2018-07-17 09:09:34 UTC ( 6 months, 1 week ago )
Antivirus Result Update
Ad-Aware 20180717
AegisLab 20180717
AhnLab-V3 20180716
Alibaba 20180713
ALYac 20180717
Antiy-AVL 20180717
Arcabit 20180717
Avast 20180716
Avast-Mobile 20180716
AVG 20180716
Avira (no cloud) 20180717
AVware 20180717
Babable 20180406
Baidu 20180717
BitDefender 20180717
Bkav 20180716
CAT-QuickHeal 20180716
ClamAV 20180717
CMC 20180716
Comodo 20180717
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180717
Cyren 20180717
DrWeb 20180717
eGambit 20180717
Emsisoft 20180717
Endgame 20180711
ESET-NOD32 20180717
F-Prot 20180717
F-Secure 20180717
Fortinet 20180717
GData 20180717
Ikarus 20180717
Sophos ML 20180601
Jiangmin 20180717
K7AntiVirus 20180717
K7GW 20180717
Kaspersky 20180717
Kingsoft 20180717
Malwarebytes 20180717
MAX 20180717
McAfee 20180717
McAfee-GW-Edition 20180717
Microsoft 20180717
eScan 20180717
NANO-Antivirus 20180717
Palo Alto Networks (Known Signatures) 20180717
Panda 20180716
Qihoo-360 20180717
Rising 20180717
SentinelOne (Static ML) 20180701
Sophos AV 20180717
SUPERAntiSpyware 20180717
Symantec 20180717
TACHYON 20180717
Tencent 20180717
TheHacker 20180716
TotalDefense 20180717
TrendMicro 20180717
TrendMicro-HouseCall 20180717
Trustlook 20180717
VBA32 20180716
VIPRE 20180717
ViRobot 20180717
Webroot 20180717
Yandex 20180716
Zillya 20180716
ZoneAlarm by Check Point 20180717
Zoner 20180716
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Windows GUI subsystem that targets 64bit architectures.
PE header basic information
Target machine x64
Compilation timestamp 2018-06-15 05:09:13
Entry Point 0x00001694
Number of sections 6
PE sections
PE imports
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
RtlVirtualUnwind
SetUnhandledExceptionFilter
RtlLookupFunctionEntry
IsDebuggerPresent
RtlCaptureContext
DisableThreadLibraryCalls
GetSystemTimeAsFileTime
GetCurrentThreadId
InitializeSListHead
memset
__C_specific_handler
__std_type_info_destroy_list
_cexit
_configure_narrow_argv
_seh_filter_dll
_execute_onexit_table
_initialize_onexit_table
_initialize_narrow_environment
_initterm
_initterm_e
?GetCurrentSurface@egl@@YAPEAXH@Z
?MakeCurrent@egl@@YAIPEAX000@Z
?ReleaseThread@egl@@YAIXZ
?QueryContext@egl@@YAIPEAX0HPEAH@Z
?WaitNative@egl@@YAIH@Z
?SwapInterval@egl@@YAIPEAXH@Z
?DestroySync@egl@@YAIPEAX0@Z
?QueryDeviceAttribEXT@egl@@YAIPEAXHPEA_J@Z
?QuerySurface@egl@@YAIPEAX0HPEAH@Z
?CreatePixmapSurface@egl@@YAPEAXPEAX0PEAUHBITMAP__@@PEBH@Z
?QueryString@egl@@YAPEBDPEAXH@Z
?QueryDeviceStringEXT@egl@@YAPEBDPEAXH@Z
?ClientWaitSync@egl@@YAHPEAX0H_K@Z
?CreateImageKHR@egl@@YAPEAXPEAX0I0PEBH@Z
?CreatePlatformWindowSurface@egl@@YAPEAXPEAX00PEB_J@Z
?ReleaseTexImage@egl@@YAIPEAX0H@Z
?GetPlatformDisplayEXT@egl@@YAPEAXIPEAXPEBH@Z
?CreatePbufferSurface@egl@@YAPEAXPEAX0PEBH@Z
?GetCurrentDisplay@egl@@YAPEAXXZ
?GetConfigs@egl@@YAIPEAXPEAPEAXHPEAH@Z
?GetSyncAttrib@egl@@YAIPEAX0HPEA_J@Z
?ChooseConfig@egl@@YAIPEAXPEBHPEAPEAXHPEAH@Z
?GetCurrentContext@egl@@YAPEAXXZ
?PostSubBufferNV@egl@@YAIPEAX0HHHH@Z
?WaitClient@egl@@YAIXZ
?CopyBuffers@egl@@YAIPEAX0PEAUHBITMAP__@@@Z
?DestroyImage@egl@@YAIPEAX0@Z
?CreateImage@egl@@YAPEAXPEAX0I0PEB_J@Z
?WaitGL@egl@@YAIXZ
?SurfaceAttrib@egl@@YAIPEAX0HH@Z
?CreateContext@egl@@YAPEAXPEAX00PEBH@Z
?DestroyImageKHR@egl@@YAIPEAX0@Z
?Initialize@egl@@YAIPEAXPEAH1@Z
?BindAPI@egl@@YAII@Z
?ReleaseDeviceANGLE@egl@@YAIPEAX@Z
?CreatePbufferFromClientBuffer@egl@@YAPEAXPEAXI00PEBH@Z
?SwapBuffers@egl@@YAIPEAX0@Z
?GetPlatformDisplay@egl@@YAPEAXIPEAXPEB_J@Z
?QueryDisplayAttribEXT@egl@@YAIPEAXHPEA_J@Z
?CreateWindowSurface@egl@@YAPEAXPEAX0PEAUHWND__@@PEBH@Z
?GetDisplay@egl@@YAPEAXPEAUHDC__@@@Z
?DestroyContext@egl@@YAIPEAX0@Z
?QueryAPI@egl@@YAIXZ
?Terminate@egl@@YAIPEAX@Z
?BindTexImage@egl@@YAIPEAX0H@Z
?CreateSync@egl@@YAPEAXPEAXIPEB_J@Z
?QuerySurfacePointerANGLE@egl@@YAIPEAX0HPEAPEAX@Z
?GetError@egl@@YAHXZ
?GetProcAddress@egl@@YAP6AXXZPEBD@Z
?GetConfigAttrib@egl@@YAIPEAX0HPEAH@Z
?CreatePlatformPixmapSurface@egl@@YAPEAXPEAX00PEB_J@Z
?CreateDeviceANGLE@egl@@YAPEAXHPEAXPEB_J@Z
?WaitSync@egl@@YAIPEAX0H@Z
?DestroySurface@egl@@YAIPEAX0@Z
PE exports
Number of PE resources by type
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
AMD AMD64

TimeStamp
2018:06:15 06:09:13+01:00

FileType
Win64 DLL

PEType
PE32+

CodeSize
4608

LinkerVersion
14.11

FileTypeExtension
dll

InitializedDataSize
9728

SubsystemVersion
6.0

EntryPoint
0x1694

OSVersion
6.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 54450dcce3d433db92604a94571728f4
SHA1 545352714e2339e34ab2a8710930c9cc36f0ac82
SHA256 6e9bc5581e6c0608a8b3df978a7d919fff441dbc90dabd1ee0a25e646272b049
ssdeep
192:fBLHe1CiAMlb0pqcMof+7xydgESTSM+bxdDBsYnXpK8P3s:JL+1OLMXV6STSFAosH

authentihash 27597721d2c78b50925f873e40b73c518e06fe4c9a4ce5ec55a54a6df82a4e7c
imphash eefd1d9d20554fc22f93ad4d54afb85a
File size 15.0 KB ( 15360 bytes )
File type Win32 DLL
Magic literal
PE32+ executable for MS Windows (DLL) (GUI) Mono/.Net assembly

TrID Win64 Executable (generic) (82.0%)
OS/2 Executable (generic) (6.0%)
Generic Win/DOS Executable (5.9%)
DOS Executable Generic (5.9%)
Tags
64bits assembly pedll

VirusTotal metadata
First submission 2018-07-02 07:28:22 UTC ( 6 months, 3 weeks ago )
Last submission 2018-07-02 07:28:22 UTC ( 6 months, 3 weeks ago )
File names libEGL.dll
libEGL.dll
libEGL.dll
fil0F4CD3729AF07C1C460E292E0F081D0A
libEGL.dll
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!