Sample: 53fa74ae081c67ab76ea27abcc5b0f3b

Note: if you are new to ThreatMiner, check out the how-to page to find out how you can get the most out of this portal.

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:567144
Analysis date:N/A
MD5:53fa74ae081c67ab76ea27abcc5b0f3b
SHA1:420340f78a89fe1537048ae2354fd33afc71bac7
SHA256:f404eab7de39bcfedf96362002b53743e071564f5e67fa9e7cde07d35bcd25bc
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
IncrN/A
Internal NameBDEADMIN
CommentsYTo1OntzOjc6InNpdGVfaWQiO2k6MTU7czo4OiJmaWxlX3VybCI7czo4NjoiaHR0cDovL21lZGlhZGlzay5uZXQvITA3OGQ3YzBkMTYxOGI0Njk0ZTA5OTI3NWI4NmRhY2FlNTMxNWE3YzY3Njg1NDVlYTc4MGEyYmVhYzZkYjViOTIiO3M6OToiZmlsZV9uYW1lIjtzOjEwOiIxXzAwLmV4ZV9fIjtzOjk6ImZpbGVfdHlwZSI7czo1OiJzZXR1cCI7czo5OiJmaWxlX3NpemUiO3M6NToiODI0MzIiO30,
File Size554 kB
Machine TypeIntel 386 or later, and compatibles
File OSWin32
Code Size478720
OS Version4.0
Entry Point0x18f0
File Flags Mask0x0000
Linker Version2.25
File SubtypeN/A
Uninitialized Data SizeN/A
File Version5.2.0.2
Initialized Data Size57344
File DescriptionBorland Database Engine
Product Version Number0.0.0.0
Company NameBorland Software Corporation
MIME Typeapplication/octet-stream
Character SetWindows, Latin1
Language CodeEnglish (U.S.)
File Version Number5.2.0.2
File TypeWin32 EXE
Legal CopyrightCopyright Borland Software Corp. 1991-2001
SubsystemWindows GUI
Object File TypeDynamic link library
Image Version0.0
File Flags(none)
Subsystem Version4.0
Source:
APTNotes
Cyber threat intelligence reports associated with 53fa74ae081c67ab76ea27abcc5b0f3b.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 53fa74ae081c67ab76ea27abcc5b0f3b.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.