cubby.exe

Cubby

LogMeIn, Inc.

Publisher:
LogMeIn, Inc.  (signed and verified)

Product:
Cubby

Version:
1.0.0.12237

MD5:
5932b729ec59eacd63d4f2749e574cb3

SHA-1:
9dc79e0c7e46ff2bcb2fa3dd20a35b47e929d7ac

SHA-256:
f92c27174e14bb3a2db62b2511cc0f9187790656188c8c6f8a994b3ce54ead4d

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/5/2024 11:18:25 PM UTC  (a few moments ago)

File size:
4.7 MB (4,895,888 bytes)

Product version:
1.0.0.12237

Copyright:
© LogMeIn, Inc. 2013. All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\cubby.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/24/2012 8:00:00 PM

Valid to:
10/10/2015 7:59:59 PM

Subject:
CN="LogMeIn, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="LogMeIn, Inc.", S=Massachusetts, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3D7B7E4F14BB04BF34C26686A61ABDA0

File PE Metadata
Compilation timestamp:
5/7/2013 9:43:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:IlgX5gWC2p09uttV6CqYTCu26joJojyt6sKZ8dOA5STJ4QYMs2neriKFl1cSYTlR:ICZC2+9ut5lNkhwsKZaOAksBz1gYh0

Entry address:
0x23A093

Entry point:
E8, 41, FA, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 10, FF, 75, 0C, 8D, 4D, F0, E8, 0F, E9, FF, FF, 8B, 45, F0, 83, B8, AC, 00, 00, 00, 01, 7E, 13, 8D, 45, F0, 50, 6A, 01, FF, 75, 08, E8, AA, FA, 00, 00, 83, C4, 0C, EB, 10, 8B, 80, C8, 00, 00, 00, 8B, 4D, 08, 0F, B7, 04, 48, 83, E0, 01, 80, 7D, FC, 00, 74, 07, 8B, 4D, F8, 83, 61, 70, FD, C9, C3, 8B, FF, 55, 8B, EC, 83, 3D, 4C, BF, 72, 00, 00, 75, 12, 8B, 45, 08, 8B, 0D, 68, DE, 71, 00, 0F, B7, 04, 41, 83, E0, 01, 5D, C3, 6A, 00, FF, 75, 08...
 
[+]

Entropy:
7.0754

Code size:
2.6 MB (2,674,176 bytes)

The file cubby.exe has been seen being distributed by the following URL.