× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c0e9286f7b03b17e461102c8e05a6af46ecf89ddbba6920093c9f54d173e10b0
File name: eb366cbc54fd9464c5dd93abdfcbf2d7
Detection ratio: 3 / 54
Analysis date: 2016-07-05 15:45:27 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Avast MSIL:GenMalicious-FBL [Trj] 20160705
ESET-NOD32 a variant of MSIL/Kryptik.GOD 20160705
K7GW Hacktool ( 655367771 ) 20160705
Ad-Aware 20160705
AegisLab 20160705
AhnLab-V3 20160705
Alibaba 20160705
ALYac 20160705
Antiy-AVL 20160705
Arcabit 20160705
AVG 20160705
Avira (no cloud) 20160705
AVware 20160705
Baidu 20160705
BitDefender 20160705
Bkav 20160705
CAT-QuickHeal 20160705
ClamAV 20160705
CMC 20160704
Comodo 20160705
Cyren 20160705
DrWeb 20160705
Emsisoft 20160704
F-Prot 20160705
F-Secure 20160705
Fortinet 20160705
GData 20160705
Ikarus 20160705
Jiangmin 20160705
K7AntiVirus 20160705
Kaspersky 20160705
Kingsoft 20160705
Malwarebytes 20160705
McAfee 20160705
McAfee-GW-Edition 20160705
Microsoft 20160705
eScan 20160705
NANO-Antivirus 20160705
nProtect 20160705
Panda 20160705
Qihoo-360 20160705
Sophos AV 20160705
SUPERAntiSpyware 20160705
Symantec 20160705
Tencent 20160705
TheHacker 20160705
TotalDefense 20160705
TrendMicro 20160705
TrendMicro-HouseCall 20160705
VBA32 20160705
VIPRE 20160705
ViRobot 20160705
Zillya 20160705
Zoner 20160705
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 1:54 PM 8/22/2018
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-07-02 13:15:02
Entry Point 0x0007E73E
Number of sections 3
.NET details
Module Version ID e542ad1f-9ff0-450a-a539-68bc5ecea826
TypeLib ID ef9890fa-6137-4a85-9634-938f796578e8
PE sections
Overlays
MD5 3a865ca5ed049e1546e8bfb9a7b0bee1
File type data
Offset 757760
Size 5640
Entropy 7.13
PE imports
_CorExeMain
Number of PE resources by type
RT_ICON 9
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 10
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

TimeStamp
2016:07:02 14:15:02+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
512000

LinkerVersion
8.0

ImageFileCharacteristics
Executable, 32-bit

FileTypeExtension
exe

InitializedDataSize
241664

SubsystemVersion
4.0

EntryPoint
0x7e73e

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

Compressed bundles
File identification
MD5 eb366cbc54fd9464c5dd93abdfcbf2d7
SHA1 b0cc5efc2d6e3abad668d6204d3d73f2f24ac7f1
SHA256 c0e9286f7b03b17e461102c8e05a6af46ecf89ddbba6920093c9f54d173e10b0
ssdeep
12288:ttkbkz3x7I+Nk8nPX3QmzScR+Qk9x9ndrxFcJCy0ABu1DQAZcj:ttkC3xlNfwmOcRcdVytuR5Za

authentihash ee6b9d3aa49495169596979b933156082e25b1c04da61981ad10ab3c49f4d684
imphash f34d5f2d4577ed6d9ceec516c1f5a744
File size 745.5 KB ( 763400 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit Mono/.Net assembly

TrID Win32 Executable MS Visual C++ (generic) (39.9%)
Win64 Executable (generic) (35.4%)
Win32 Dynamic Link Library (generic) (8.4%)
Win32 Executable (generic) (5.7%)
Win16/32 Executable Delphi generic (2.6%)
Tags
peexe assembly overlay

VirusTotal metadata
First submission 2016-07-05 15:45:27 UTC ( 2 years, 10 months ago )
Last submission 2017-08-05 01:54:32 UTC ( 1 year, 9 months ago )
File names eb366cbc54fd9464c5dd93abdfcbf2d7
LL.exe
eb366cbc54fd9464c5dd93abdfcbf2d7.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
HTTP requests
DNS requests
TCP connections
UDP communications