File: af4172caa1d41bce0b3e683ef26a56aa093a4be0077c3c24a4110a651027dd1c

Metadata
File name:post_cUjZEl.js
File type:ASCII text, with very long lines, with CRLF line terminators
File size:3945 bytes
Analysis date:2016-03-13 14:29:05
MD5:1a177faf482fc924d2439f4111428d9f
SHA1:6dd3341a413699bda921431d25ce8ba8e2d04143
SHA256:af4172caa1d41bce0b3e683ef26a56aa093a4be0077c3c24a4110a651027dd1c
SHA512:2a56413da46ce0bef4c831b17882aafb2dd91e1aa3433817e11fdb2dcb039e0f4ad7707b44299a4e8f6f5993dbde0c6402c811bb9517f83186b63b451e561773
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
APTNotes
Cyber threat intelligence reports associated with af4172caa1d41bce0b3e683ef26a56aa093a4be0077c3c24a4110a651027dd1c.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
HostURLUser-Agent
54.212.162.6 (ohelloguyzzqq.com)/85.exe?1Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
"\Sessions\1\BaseNamedObjects\Local\_!MSFTHISTORY!_"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!local!microsoft!windows!temporary internet files!content.ie5!"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!roaming!microsoft!windows!cookies!"
"\Sessions\1\BaseNamedObjects\Local\c:!users!pspubws!appdata!local!microsoft!windows!history!history.ie5!"
"\Sessions\1\BaseNamedObjects\Local\WininetStartupMutex"
"\Sessions\1\BaseNamedObjects\Local\WininetConnectionMutex"
"\Sessions\1\BaseNamedObjects\Local\WininetProxyRegistryMutex"
"\Sessions\1\BaseNamedObjects\Local\!IETld!Mutex"
"\Sessions\1\BaseNamedObjects\RasPbFile"
"\Sessions\1\BaseNamedObjects\Local\ZonesCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZoneAttributeCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\Local\ZonesLockedCacheCounterMutex"
"\Sessions\1\BaseNamedObjects\IESQMMUTEX_0_208"
Registry keys
Registry keys created by the malware sample.
Comments
User comments about af4172caa1d41bce0b3e683ef26a56aa093a4be0077c3c24a4110a651027dd1c.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.