sb4wlmhook.exe

Axaware LLC

It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘SB4WLMHookRunner’.
Publisher:
Axaware  (signed by Axaware LLC)

Description:
Service for run global hooking for WLM

Version:
4.4.0.21

MD5:
a225cc8d11432cc48a4c3b24677847c1

SHA-1:
c15ee7cf2102edb980e26e342bb914829aede221

SHA-256:
7157f9c8bd094dd5a6a9ab67981174dd3a7d51409a45a2071cac8607d2e3f8fc

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
5/4/2024 5:22:53 AM UTC  (today)

File size:
2.1 MB (2,238,096 bytes)

Product version:
4.4.0.21

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/9/2012 7:00:00 PM

Valid to:
9/10/2013 6:59:59 PM

Subject:
CN=Axaware LLC, OU=Spam Bully, O=Axaware LLC, STREET="2153 Wealthy #150", L=Grand Rapids, S=MI, PostalCode=49506, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7442A0BC69E40CE61E578B72E74B842F

File PE Metadata
Compilation timestamp:
1/24/2013 7:41:31 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:W/1c1ZxNN78+rUWSm6qZwtpMW3jT9Th/HvShfU425wlTqQW31:W/1cN5suxpI31

Entry address:
0x1C22F0

Entry point:
55, 8B, EC, 83, C4, F0, B8, 00, A4, 5B, 00, E8, 48, BD, E4, FF, A1, 94, 8C, 5C, 00, 8B, 00, E8, 14, DC, FD, FF, A1, 94, 8C, 5C, 00, 8B, 00, C6, 40, 5F, 00, A1, 94, 8C, 5C, 00, 8B, 00, 33, D2, E8, 1B, F9, FD, FF, 8B, 0D, 80, 88, 5C, 00, A1, 94, 8C, 5C, 00, 8B, 00, 8B, 15, 4C, 9F, 5B, 00, E8, FB, DB, FD, FF, A1, 94, 8C, 5C, 00, 8B, 00, E8, 53, DD, FD, FF, E8, 16, 6B, E4, FF, 8B, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.6005

Developed / compiled with:
Microsoft Visual C++

Code size:
1.8 MB (1,839,104 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
SB4WLMHookRunner

Command:
C:\spambully 4 for windows live mail\sb4wlmhook.exe


Scan sb4wlmhook.exe - Powered by Reason Core Security