l4d2login.exe

The application l4d2login.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. While running, it connects to the Internet address ip-50-63-202-16.ip.secureserver.net on port 80 using the HTTP protocol.
MD5:
1f49a413874336f0de3fe7161c03cef2

SHA-1:
6455b2392b751a40124fc2e5ddb102eba1e392fe

SHA-256:
eca986ee78b2ee4bdccf4cf9e70f761d712cbff7b32aa77a88342ad9c04228c5

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
12/15/2025 8:51:28 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.63886
250

Avira AntiVirus
TR/Rogue.1426944.2
8.3.2.4

Arcabit
Trojan.Strictor.DF98E
1.0.0.628

avast!
Win32:Malware-gen
2014.9-160530

Bitdefender
Gen:Variant.Strictor.63886
1.0.20.755

Clam AntiVirus
Win.Trojan.Agent-939902
0.98/21511

Comodo Security
UnclassifiedMalware
23690

Emsisoft Anti-Malware
Gen:Variant.Strictor.63886
8.16.05.30.03

ESET NOD32
Win32/FlyStudio potentially unwanted (variant)
10.12680

Fortinet FortiGate
Riskware/FlyStudio
5/30/2016

F-Prot
W32/OnlineGames.HI.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Strictor.63886
11.2016-30-05_2

G Data
Gen:Variant.Strictor.63886
16.5.25

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.9.5.0

McAfee
Artemis!1F49A4138743
5600.6384

MicroWorld eScan
Gen:Variant.Strictor.63886
17.0.0.453

NANO AntiVirus
Trojan.Win32.Strictor.dkpgiu
1.0.10.5081

Sophos
Generic PUA GE (PUA)
4.98

Total Defense
Win32/Oflwr.A!crypt
37.1.62.1

VIPRE Antivirus
Trojan.Win32.Generic
45666

File size:
1.4 MB (1,426,944 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
4/18/2014 1:08:28 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:24RdC7HAyFL2FBAylf39yz5luDIL5gbnzDEiUHNmAhQC:zdC712FjlftyuDILebn/ENHNNh

Entry address:
0x36D170

Entry point:
60, BE, 00, F0, 65, 00, 8D, BE, 00, 20, DA, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 34, BE, 36, 00, 57, 83, C3, 04, 53, 68, 65, E1, 10, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.3674

Code size:
1.1 MB (1,110,016 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip-50-63-202-16.ip.secureserver.net  (50.63.202.16:80)

TCP:
Connects to hn.kd.ny.adsl  (42.236.74.236:82)

Remove l4d2login.exe - Powered by Reason Core Security