× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 15a257385d041e82dbb6b52b627505109fcd1987f7732fbdbf1f1807a9e22aff
File name: qJQPSAg5K07.exe
Detection ratio: 48 / 70
Analysis date: 2018-12-07 16:06:02 UTC ( 2 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40813747 20181207
AegisLab Trojan.Win32.Emotet.4!c 20181207
AhnLab-V3 Malware/Win32.Generic.C2877840 20181207
ALYac Trojan.Agent.Emotet 20181207
Arcabit Trojan.Generic.D26EC4B3 20181207
Avast Win32:MalwareX-gen [Trj] 20181207
AVG Win32:MalwareX-gen [Trj] 20181207
Avira (no cloud) TR/AD.Emotet.ukezo 20181207
BitDefender Trojan.GenericKD.40813747 20181207
Comodo Malware@#1dojf90oisy20 20181207
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cylance Unsafe 20181207
Cyren W32/Emotet.KK.gen!Eldorado 20181207
DrWeb Trojan.EmotetENT.317 20181207
eGambit Unsafe.AI_Score_90% 20181207
Emsisoft Trojan.GenericKD.40813747 (B) 20181207
Endgame malicious (high confidence) 20181108
ESET-NOD32 Win32/Emotet.BN 20181207
F-Prot W32/Emotet.KK.gen!Eldorado 20181207
F-Secure Trojan.GenericKD.40813747 20181207
Fortinet W32/Emotet.BN!tr 20181207
GData Win32.Trojan-Spy.Emotet.UA 20181207
Ikarus Trojan.Win32.Crypt 20181207
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00540fae1 ) 20181207
K7GW Trojan ( 00540fae1 ) 20181207
Kaspersky Trojan-Banker.Win32.Emotet.btpf 20181207
Malwarebytes Trojan.Emotet 20181207
McAfee RDN/Generic.grp 20181207
McAfee-GW-Edition RDN/Generic.grp 20181207
Microsoft Trojan:Win32/Emotet 20181207
eScan Trojan.GenericKD.40813747 20181207
NANO-Antivirus Trojan.Win32.Emotet.fkwdqu 20181207
Palo Alto Networks (Known Signatures) generic.ml 20181207
Panda Trj/RnkBend.A 20181207
Qihoo-360 HEUR/QVM19.1.A493.Malware.Gen 20181207
Rising Trojan.Kryptik!8.8 (CLOUD) 20181207
Sophos AV Troj/Emotet-AOI 20181207
Symantec Trojan.Emotet 20181207
TACHYON Banker/W32.Emotet.389120 20181207
Trapmine malicious.high.ml.score 20181205
TrendMicro TROJ_FRS.VSN04L18 20181207
TrendMicro-HouseCall TROJ_FRS.VSN04L18 20181207
VBA32 BScope.TrojanBanker.Emotet 20181207
VIPRE Trojan.Win32.Generic!BT 20181206
ViRobot Trojan.Win32.S.Emotet.389120 20181207
Webroot W32.Trojan.Emotet 20181207
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.btpf 20181207
Alibaba 20180921
Antiy-AVL 20181207
Avast-Mobile 20181207
Babable 20180918
Baidu 20181207
Bkav 20181206
CAT-QuickHeal 20181207
ClamAV 20181207
CMC 20181206
Cybereason 20180225
Jiangmin 20181206
Kingsoft 20181207
MAX 20181207
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181205
Symantec Mobile Insight 20181204
Tencent 20181207
TheHacker 20181202
TotalDefense 20181207
Trustlook 20181207
Yandex 20181204
Zillya 20181206
Zoner 20181207
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights

Product Microsoft®
Original name mfAA
Internal name Med
File version 6.1.7600.16385 (win7_rtm.090713-1
Description Media Foundation AA
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-04 14:15:13
Entry Point 0x00002602
Number of sections 10
PE sections
PE imports
CertAddEncodedCertificateToStore
InvertRgn
ExtSelectClipRgn
GetKerningPairsA
GetNamedPipeClientProcessId
GetStringScripts
GetModuleHandleA
GetDateFormatW
WTSGetActiveConsoleSessionId
VirtualQueryEx
FreeConsole
LZSeek
LZInit
MprInfoCreate
ICGetDisplayFormat
NetLocalGroupDel
RasDialA
I_RpcFreeBuffer
SHGetMalloc
StrCmpNA
DdeFreeStringHandle
GetLastActivePopup
GetProcessDefaultLayout
GetFileVersionInfoSizeW
waveOutGetID
midiOutClose
Ord(30)
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
2.0

ImageVersion
1.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Media Foundation AA

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
382464

EntryPoint
0x2602

OriginalFileName
mfAA

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights

FileVersion
6.1.7600.16385 (win7_rtm.090713-1

TimeStamp
2018:12:04 15:15:13+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Med

ProductVersion
6.1.7600.163

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Co

CodeSize
12800

ProductName
Microsoft

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 b814f1f7e524d9f39abb1460d56694bf
SHA1 53179d6b5411106585d3085253a878fd54526f87
SHA256 15a257385d041e82dbb6b52b627505109fcd1987f7732fbdbf1f1807a9e22aff
ssdeep
3072:2At/kanx8EY02OoqKWy6i6V/fUd00v2LlxWbVWZtnlI7:2AVTY0MqKWymUd0rlxWbVyt

authentihash d52e848622e7f98ff7ac155320a5aa02127dfca75d6cbd7d41e364f392e6bfae
imphash 25a44292594bfc0e95c7d5b5a20612f3
File size 380.0 KB ( 389120 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-04 14:23:51 UTC ( 2 months, 2 weeks ago )
Last submission 2018-12-04 15:10:38 UTC ( 2 months, 2 weeks ago )
File names Med
qJQPSAg5K07.exe
YzsA3hyT2.exe
DbfgQhEvI.exe
ipspdhNBml3H.exe
23cBOLAd.exe
HcgGWnYKS.exe
QL8WhmgJ4.exe
504.exe
oP7V0Gy6muY8.exe
mfAA
oIU6jDOT1duP.exe
7sBrFJ4K.exe
cIw55wujmDV3.exe
stgroute.exe
1mk1814iwy.exe
5foRMJlVNRX1.exe
NEXbBoL1w.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!