ASHost.exe

V2 ASHost

V2 Technology, Inc.

Publisher:
V2  (signed by V2 Technology, Inc.)

Product:
V2 ASHost

Description:
ASHost

Version:
1, 0, 0, 1

MD5:
817847c054a8c15b2e7a41437d3f0950

SHA-1:
31b8ddf293bf9b223fdfbe0280c3645dc2d7fe95

SHA-256:
3d159372035dd197cfeb6e87a0aeac4a30d40af8590b598f639ade7d452d67ab

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
10/25/2025 7:01:54 PM UTC  (today)

File size:
526.3 KB (538,920 bytes)

Product version:
ASHostVer-6.2.0.3(S-60352)

Copyright:
Copyright ? 2008

Original file name:
ASHost.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\conference\client\ashost.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/23/2013 8:00:00 AM

Valid to:
12/24/2014 7:59:59 AM

Subject:
CN="V2 Technology, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="V2 Technology, Inc.", L=北京, S=北京, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
69A1189DEDDEA6C2A17049638C488377

File PE Metadata
Compilation timestamp:
11/5/2014 10:40:19 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:zGomXHVBHR3jo8N5qXXV9hfz4bHwnnfm3T32iV3a8Q2UfRTbUvawt1R19TBTnvok:zc3R3E8N5qXXV9h3M3vQ2Uf5stx9Tlok

Entry address:
0x3B78A

Entry point:
E8, 2C, 10, 01, 00, E9, 17, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 55, 8B, EC, 57, 56, 8B, 75, 0C, 8B, 4D, 10, 8B, 7D, 08, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, A4, 01, 00, 00, 81, F9, 00, 01, 00, 00, 72, 1F, 83, 3D, 9C, 38, 48, 00, 00, 74, 16, 57, 56, 83, E7, 0F, 83, E6, 0F, 3B, FE, 5E, 5F, 75, 08, 5E, 5F, 5D, E9, EF, 10, 01, 00, F7, C7, 03, 00, 00, 00, 75, 15, C1, E9, 02, 83, E2, 03, 83, F9, 08, 72, 2A, F3, A5, FF, 24, 95, 14, B9, 43, 00, 90, 8B, C7, BA, 03, 00, 00...
 
[+]

Entropy:
6.6092

Code size:
420 KB (430,080 bytes)

Scan ASHost.exe - Powered by Reason Core Security