AtomicEmailHunter.exe threat report

MD5 e073a48cf9528e73ad55ff3dff4bb584
Latest seen 2024-02-21 23:19:47 (2 years ago)
First seen 2020-04-07 14:43:41 (6 years ago)
Size 13 MB

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as General Threat. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
General Threat
Recommended action
Scan and remove
Last analysis
2024-02-21 23:19:47 (2 years ago)
File hash
e073a48cf9528e73ad55ff3dff4bb584
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as General Threat.

Timeline

First seen 2020-04-07 14:43:41 (6 years ago); latest analysis 2024-02-21 23:19:47 (2 years ago).

Publisher context

Company metadata: AtomPark Software Inc.. Product metadata: Atomic Email Hunter.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

AtomicEmailHunter.exe is a Windows file recorded in the ThreatInfo database. It is associated with Atomic Email Hunter. The reported company name is AtomPark Software Inc.. The current detection status is General Threat, based on the latest analysis from 2024-02-21 23:19:47 (2 years ago).

If AtomicEmailHunter.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as General Threat.

Product Name: Atomic Email Hunter
Company Name: AtomPark Software Inc.
MD5: e073a48cf9528e73ad55ff3dff4bb584
Size: 13 MB
First Published: 2020-04-07 14:43:41 (6 years ago)
Latest Published: 2024-02-21 23:19:47 (2 years ago)
Status: General Threat (on last analysis)
Analysis Date: 2024-02-21 23:19:47 (2 years ago)
AtomicEmailHunter.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

%mydoc%\new folder
%desktop%\r.h.m.marketing
%sysdrive%\$recycle.bin\s-1-5-21-843098802-1463634541-3901899483-1000\$rcemiti.rar\atomic.email.hunter.14.4.0.371
%temp%\rar$exa5992.12560\atomic.email.hunter.14.4.0.371
%sysdrive%\$recycle.bin\s-1-5-21-843098802-1463634541-3901899483-1000\$rcemiti.rar\atomic.email.hunter.14.4.0.371
%temp%\rar$exa5992.12560\atomic.email.hunter.14.4.0.371
%sysdrive%\$recycle.bin\s-1-5-21-843098802-1463634541-3901899483-1000\$rcemiti.rar\atomic.email.hunter.14.4.0.371
%temp%\rar$exa5992.12560\atomic.email.hunter.14.4.0.371
%temp%\rar$exa5992.12560\atomic.email.hunter.14.4.0.371
%sysdrive%\$recycle.bin\s-1-5-21-843098802-1463634541-3901899483-1000\$rcemiti.rar\atomic.email.hunter.14.4.0.371

ThreatInfo has observed AtomicEmailHunter.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

43.5%
21.7%
8.7%
8.7%
8.7%
4.3%
4.3%

The strongest geographic signal for this file is Turkey with 43.5% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 7 56.5%
Windows 10 43.5%

The most common operating system signal for AtomicEmailHunter.exe is Windows 7 with 56.5% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

AtomicEmailHunter.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x009c5340

PE Sections:

Name Size of data MD5
10223616 683deaccfb53ca3cdb308883c3ae1890
20480 e42ea47d7c9928f23e75ec8384810f4d
356352 7cde0aa59c2a53dc23c07cfe925c8c22
559800 6501c81da9a7988f9aa5b4ce18d25b5e
24576 3d7f8e270aae5872d2cf972e8f53f897
8192 0e1e596b515f3185cbcda9a5413fe2fd
4096 64dda599981256dac6e73a9fd6ed0fec
88 f2331152449c622545360f18dfdf0e2d
4096 9a60d071309175286a32b7040a476cc4
843776 9b9fcb65a7d9ab932ce4d0945ca1bb55
.rsrc 1814528 0bf2416b0d25f4d5766d13b38fc0802d
.aehd 528384 e7bb71b4d48d3dba2d30cbf69f22ec35
.adata 4096 620f0b67a91f7f74151bc5be745b7110
aspr 86016 9ae840d066ae4bc9f8ea5ba60ce7db8e
.mackt 24576 9ce724d325e101f0ccb5ca66647e03b8

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: