Gridinsoft Logo
File Icon

The Left 4 Dead 2 LAN.exe File Analysis

Technical Analysis

File Name Left 4 Dead 2 LAN.exe
File Type
Win32 EXE
Magic Bytes PE32 executable (console) Intel 80386, for MS Windows
SSDEEP Hash
6144:3tZRy8GU/aDLReXJeev7Mh6E/avArvaI4zFKjKfr0jIfw:3PX7ghRC+YzF8KsZ
Scanner Version 1.0.215.174
Database Version 2025-04-26 07:00:21 UTC

Suspicious File Detected

Detected by 7 security engines - requires caution

This file requires additional checking for potential threats. Based on suspicious indicators, we will soon add it to our virus database.
10%
Detection Rate
360,448
File Size (bytes)
7/73
Engines Detected
2025-04-26
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
d4479a7e38e97f439609959824e62793
SHA1
320a30447ef10a7edfc46a73d794530b031d3fa7
SHA256
e59706a074a63452fae22a07a01b430ff1ed58abcdbb179481e9ade19cdefcc4
SHA512
438f0c63cacf2d163f5983988298c392626ba75c406a5c86f2fb8eecc31b2a00f46666d294a65de4952e6fdffedb23d0f61fc5300d443e9bd2a37ea176077035
ImpHash
77abcad8d2a58839860bba9dc40f29e1

Security Engines with Detections (7 of 73)

Bkav
W32.AIDetectMalware Malicious
Cylance
Unsafe Malicious
SentinelOne
Static AI - Suspicious PE Malicious
Trapmine
malicious.moderate.ml.score Malicious
Webroot
W32.Malware.Gen Malicious
AhnLab-V3
Trojan/Win32.Sojatkot.C172199 Malicious
MaxSecure
Trojan.Malware.300983.susgen Malicious
66 engines reported no threats - Only engines with detections are shown above for clarity

PE Analysis

Basic Information

Icon
Hash: 1aec0af5d1d793689c7273de9523db59
Fuzzy: 5a71e1a724992062dce61d87239d1ae3
dHash: 9aca66d2d2c4cc91
Image Base 0x00400000
Entry Point 0x0040a13c
Compilation Time 2012-11-16 22:57:01
Checksum 0x00000000 (Actual: 0x0005969c)
OS Version 4.0
PEiD Signatures PE32 executable (console) Intel 80386, for MS Windows
Digital Signature No valid SignedData structure was found.
Imports 4 libraries
oleaut32, advapi32, user32, kernel32
Exports 0 functions
Resources 21 Resources
Sections 9 Sections

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 32,780 bytes 33,280 bytes 6.47 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ F04CC9670285269FC70DC290D515DD7D
.itext 0x0000a000 1,844 bytes 2,048 bytes 5.53 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ A9F8C72D3F410BAE147663A62C83E5F7
.data 0x0000b000 2,812 bytes 3,072 bytes 2.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE FECB263CF90A29C1297DCBBDCA96F280
.bss 0x0000c000 19,068 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.idata 0x00011000 2,286 bytes 2,560 bytes 4.56 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 9445A0F46ADA8F3F4E5DEC206A6365F1
.tls 0x00012000 8 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.rdata 0x00013000 24 bytes 512 bytes 0.21 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 48352434018C24060E3A26A6B77A946A
.reloc 0x00014000 3,232 bytes 3,584 bytes 6.29 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 6358B880162BF4C0D5D57CAC8DB3B0FD
.rsrc 0x00015000 314,180 bytes 314,368 bytes 6.22 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ C3EC20709B0D50CFDADE9BE360898B4E

Resource Analysis

Total Resources: 21 (313,016 bytes)
Resource Type Count Total Size Percentage
RT_ICON 13 310,248 bytes
99.1%
RT_STRING 5 2,468 bytes
0.8%
RT_RCDATA 2 112 bytes
0%
RT_GROUP_ICON 1 188 bytes
0.1%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

No valid SignedData structure was found.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
7 antivirus engines detected potential threats. This could be a false positive, especially for system tools or packed software. Verify the file source and check if it's digitally signed by a trusted publisher.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware