AndroidServer (1).exe file report

MD5 535cb526118f2f53dbce53254c6d9cf8
Latest seen 2021-06-11 20:34:58 (4 years ago)
First seen 2017-05-21 06:06:26 (8 years ago)
Size 223 KB
Publisher 腾讯公司

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for AndroidServer (1).exe. ThreatInfo does not have a final classification for this sample yet.

AndroidServer (1).exe is a Windows file recorded in the ThreatInfo database. It is associated with 应用宝统一连接服务. The reported company name is 腾讯公司. The current detection status is Undefined, based on the latest analysis from 2021-06-11 20:34:58 (4 years ago).

ThreatInfo does not have a final classification for this file yet. Use the technical details below to compare the hash, size, signature, and observed locations with the copy found on your device.

Product Name: 应用宝统一连接服务
Company Name: 腾讯公司
MD5: 535cb526118f2f53dbce53254c6d9cf8
Size: 223 KB
First Published: 2017-05-21 06:06:26 (8 years ago)
Latest Published: 2021-06-11 20:34:58 (4 years ago)
Status: Undefined (on last analysis)
Analysis Date: 2021-06-11 20:34:58 (4 years ago)

The signature on AndroidServer (1).exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%appdata%\tencent\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\ndyarifnwlztuddumcbcnpheohluihfj\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\ruyltefsntyxenuahnabkuddahqeinvb\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\kbtjsdkqayepvmsanirjspztlsbfvdce\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\rnqankqiyrhagyzmkrumtczgsmdflpzp\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\kvutawbnxcuqqseowenxafzfhzvlcmut\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\azarobodqjgqgqgxegwozusdyrmkqeir\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\akealobdapzwbzehzqxjiscimsetwztq\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\hpgcqxhvlzpbgmzlqcxlpncdwehgypfp\androidserver\1.0.0.492
%sysdrive%\adwcleaner\quarantine\files\vnqvvtneuyufkwbappvqjcdqxnuxjkck\androidserver\1.0.0.492

ThreatInfo has observed AndroidServer (1).exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

AndroidServer.exe
AndroidServer.exe.old
AndroidServer.exe.vir
AndroidServer (1).exe

This hash has been seen with multiple file names. Alternate names can appear when software is updated, copied between folders, packed by an installer, or deliberately renamed to avoid recognition. Compare the exact MD5 above before assuming two names refer to the same file.

33.3%
19.0%
10.4%
7.1%
4.4%
4.2%
2.6%
2.4%
1.7%
1.4%
1.0%
0.8%
0.7%
0.6%
0.6%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.5%
0.4%
0.4%
0.4%
0.3%
0.3%
0.2%
0.2%
0.2%
0.2%
0.2%
0.2%
0.2%
0.2%
0.2%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%
0.1%

The strongest geographic signal for this file is Taiwan with 33.3% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 50.5%
Windows 7 39.9%
Windows 8.1 6.5%
Windows 8 2.2%
Windows XP 0.8%
Windows Vista 0.1%

The most common operating system signal for AndroidServer (1).exe is Windows 10 with 50.5% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

AndroidServer (1).exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x00021f74

PE Sections:

Name Size of data MD5
.text 150016 982242bb2a8c194e09a47eb88c3ec1ae
.rdata 41984 b5135b8eae8c6ebaa9474d4d36cc5b63
.data 8192 d76d837355fb9ac808c29cb842c2b744
.rsrc 2048 53c8e7c636484c837d3ce38cc9f67ad5
.reloc 17920 6123dedb34b7f3093b3576efc49a6bcd

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: