× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 24feb7f4b71f91fe67f97d9e4fb930857ed76dce8acdf36503fbf2a0b443d421
File name: iiqWjomA6N70n7nGB9.exe
Detection ratio: 40 / 71
Analysis date: 2018-12-27 02:33:56 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis malware 20181227
Ad-Aware Trojan.GenericKD.40870385 20181227
ALYac Trojan.GenericKD.40870385 20181227
Arcabit Trojan.Generic.D26FA1F1 20181227
Avast Win32:MalwareX-gen [Trj] 20181227
AVG Win32:MalwareX-gen [Trj] 20181227
BitDefender Trojan.GenericKD.40870385 20181227
Comodo Malware@#2y9h7vsua1aew 20181226
CrowdStrike Falcon (ML) malicious_confidence_90% (W) 20181022
Cylance Unsafe 20181227
Emsisoft Trojan.GenericKD.40870385 (B) 20181226
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOCV 20181227
F-Secure Trojan.GenericKD.40870385 20181226
Fortinet W32/Kryptik.GOCE!tr 20181226
GData Trojan.GenericKD.40870385 20181226
Ikarus Trojan.Win32.Crypt 20181226
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 005447481 ) 20181226
K7GW Trojan ( 005447481 ) 20181226
Kaspersky Trojan-Banker.Win32.Emotet.bwrr 20181226
Malwarebytes Trojan.Emotet 20181226
MAX malware (ai score=100) 20181227
McAfee RDN/Generic.grp 20181226
McAfee-GW-Edition RDN/Generic.grp 20181226
Microsoft Trojan:Win32/Emotet.AC!bit 20181226
eScan Trojan.GenericKD.40870385 20181226
NANO-Antivirus Trojan.Win32.Generic.flmmhr 20181226
Palo Alto Networks (Known Signatures) generic.ml 20181227
Panda Trj/GdSda.A 20181226
Qihoo-360 HEUR/QVM19.1.1747.Malware.Gen 20181227
Rising Trojan.Emotet!8.B95 (CLOUD) 20181227
Sophos AV Mal/Generic-S 20181227
Symantec Packed.Generic.517 20181226
Tencent Win32.Trojan-banker.Emotet.Lkxu 20181227
Trapmine malicious.moderate.ml.score 20181205
TrendMicro TROJ_FRS.VSN19L18 20181227
TrendMicro-HouseCall TROJ_FRS.VSN19L18 20181227
Webroot W32.Trojan.Emotet 20181227
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bwrr 20181227
AegisLab 20181227
AhnLab-V3 20181226
Alibaba 20180921
Antiy-AVL 20181227
Avast-Mobile 20181226
Avira (no cloud) 20181226
Babable 20180918
Baidu 20181207
Bkav 20181224
CAT-QuickHeal 20181226
ClamAV 20181227
CMC 20181226
Cybereason 20180225
Cyren 20181226
DrWeb 20181226
eGambit 20181227
F-Prot 20181226
Jiangmin 20181226
Kingsoft 20181227
SentinelOne (Static ML) 20181223
SUPERAntiSpyware 20181226
Symantec Mobile Insight 20181225
TACHYON 20181226
TheHacker 20181225
TotalDefense 20181227
Trustlook 20181227
VBA32 20181226
VIPRE 20181226
ViRobot 20181227
Yandex 20181226
Zillya 20181227
Zoner 20181227
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
©1983-1990, 199

Product HQ Type Manager
Original name QWe.exe
Internal name ATMLIB
File version 6.1.7600.16
Description VVVVV C
Comments GWr from PuTTY plink (http://www.chiark.gr3jrtber/~sgtatham/putty/)
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-12-25 01:00:26
Entry Point 0x0000404C
Number of sections 5
PE sections
PE imports
CloseServiceHandle
OpenSCManagerW
RegOpenKeyExW
OpenServiceW
QueryServiceConfigW
CreateProcessWithLogonW
IsTextUnicode
PrintDlgW
GetUserDefaultUILanguage
GetStringScripts
GetCommTimeouts
QueryIdleProcessorCycleTime
GetModuleHandleA
ConvertDefaultLocale
SetDefaultCommConfigA
FlsFree
LZInit
VarCyFromI4
VarCyFromStr
SetupDiGetINFClassW
PathIsFileSpecW
GetForegroundWindow
DrawTextExW
PostQuitMessage
DefWindowProcW
OpenWindowStationW
GetMessageW
SetWinEventHook
ShowWindow
MessageBeep
SetWindowsHookExW
RegisterClassExW
CharUpperW
LoadIconW
PostMessageW
SetActiveWindow
GetDC
ReleaseDC
CharNextExA
SetParent
GetWindowPlacement
IsIconic
GetKeyNameTextW
LoadImageW
GetKeyboardLayout
IsCharUpperW
IsDialogMessageW
GetCursor
DestroyWindow
OleNoteObjectVisible
Number of PE resources by type
RT_ICON 6
RT_GROUP_ICON 1
RT_DIALOG 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
GERMAN SWISS 8
ENGLISH UK 1
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.0

Comments
GWr from PuTTY plink (http://www.chiark.gr3jrtber/~sgtatham/putty/)

LinkerVersion
12.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.63.0.9999

LanguageCode
English (British)

FileFlagsMask
0x003f

FileDescription
VVVVV C

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
155648

EntryPoint
0x404c

OriginalFileName
QWe.exe

MIMEType
application/octet-stream

LegalCopyright
1983-1990, 199

FileVersion
6.1.7600.16

TimeStamp
2018:12:25 02:00:26+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
ATMLIB

ProductVersion
7.02.7600.

UninitializedDataSize
4294967295

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
HQ Systems

CodeSize
0

ProductName
HQ Type Manager

ProductVersionNumber
0.63.0.9999

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3b5a6de317252441d0bf0e11f7a8430d
SHA1 995f39a9406cbe9aa484d7620b3ea86dd1e45537
SHA256 24feb7f4b71f91fe67f97d9e4fb930857ed76dce8acdf36503fbf2a0b443d421
ssdeep
3072:nYt6ECR3WoO+ThexeDE7uvcfdrR3e56d773dqzOnV/asULh:nYt6pdhexe47v93d7TVV/a

authentihash d3ec6fb090436b03741f20fd49dc9e4f3164c5a235c99809b97be0e7bdcf8556
imphash d16f710ca24287b3d2ebc52e6614fcda
File size 480.0 KB ( 491520 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-25 01:04:47 UTC ( 1 month, 3 weeks ago )
Last submission 2018-12-25 01:04:47 UTC ( 1 month, 3 weeks ago )
File names QWe.exe
iiqWjomA6N70n7nGB9.exe
19392896.exe
19392896.exe
ATMLIB
20900224.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!