File: a17f824a7701515d46a441186d0deac8ba17c0481b9a66e9feb7d898cddb897c

Metadata
File name:host.exe
File type:PE32 executable (GUI) Intel 80386 system file, for MS Windows
File size:274432 bytes
Analysis date:2016-03-09 12:41:41
MD5:751998344e7d02603b2ca90fd10182be
SHA1:1fb2a7a75609f1b946b889732e16bd2838ecd6b3
SHA256:a17f824a7701515d46a441186d0deac8ba17c0481b9a66e9feb7d898cddb897c
SHA512:722af744cb3ae0b761d103c6a0b83bb65e0f026298c8d6cf1637c3800e0195d520909bcdefbbb26e63a82d57bc308afccec52774e06b770d71b3dbee57b2ee3f
SSDEEP:6144:rMQ6y07guORQAqx/EgRI7GwduSluZ0FWOIlRuywDijRy7d:P076+I6wduQuZStIlRsGjR+d
IMPHASH:05568c2f2db592922f122e78786e3033
Authentihash:ddffb731e25691f09ce503b33f7642ed5320693f9481b4397a029591712f7ecc
Related resources
PE TypePE32
Internal NameEfface At&
Legal TrademarksKingosoft Copyright 2013. All rights reserved.
CommentsInfluences Intercity Winding
File Size268 kB
Machine TypeIntel 386 or later, and compatibles
File OSWindows NT 32-bit
Code Size47104
OS Version5.0
Entry Point0xbf9f
File Flags Mask0x003f
Linker Version9.0
File SubtypeN/A
Uninitialized Data SizeN/A
File Version2.3.4.8
Initialized Data Size226304
File DescriptionInfluences Intercity Winding
Product Version Number2.3.4.8
Product NameEfface At&
Company NameKingosoft
MIME Typeapplication/octet-stream
Character SetUnicode
Private Build2.3.4.8
Language CodeEnglish (U.S.)
File Version Number2.3.4.8
File TypeWin32 EXE
Original FilenameEfface At&
Legal CopyrightKingosoft Copyright 2013. All rights reserved.
SubsystemWindows GUI
LanguagesEnglish
Object File TypeExecutable application
Image Version0.0
File Flags(none)
Subsystem Version5.0
Product Version2.3.4.8
Source:
APTNotes
Cyber threat intelligence reports associated with a17f824a7701515d46a441186d0deac8ba17c0481b9a66e9feb7d898cddb897c.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
"\Sessions\1\BaseNamedObjects\DBWinMutex"
Registry keys
Registry keys created by the malware sample.
Comments
User comments about a17f824a7701515d46a441186d0deac8ba17c0481b9a66e9feb7d898cddb897c.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.