× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 25ce747c6618bf491a65555b20aa24f49f0042d22670ef3a103054c6bad1eb8b
File name: pqymqetqoduleqase64.exe.8.dr
Detection ratio: 14 / 67
Analysis date: 2018-09-06 17:08:03 UTC ( 8 months, 2 weeks ago ) View latest
Antivirus Result Update
Avast FileRepMetagen [Malware] 20180906
AVG FileRepMetagen [Malware] 20180906
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180723
Cybereason malicious.39947e 20180225
Cyren W32/Swizzor-based.2!Maximus 20180906
Endgame malicious (high confidence) 20180730
F-Prot W32/Swizzor-based.2!Maximus 20180906
Sophos ML heuristic 20180717
Microsoft Trojan:Win32/MereTam.A 20180906
Palo Alto Networks (Known Signatures) generic.ml 20180906
Rising Malware.Heuristic!ET#91% (RDM+:cmRtazo9BHw7bG0cH3ZjirFREXJw) 20180906
SentinelOne (Static ML) static engine - malicious 20180830
Symantec ML.Attribute.HighConfidence 20180906
Webroot W32.Trojan.Trickbot 20180906
Ad-Aware 20180906
AegisLab 20180906
AhnLab-V3 20180906
Alibaba 20180713
ALYac 20180906
Antiy-AVL 20180906
Arcabit 20180906
Avast-Mobile 20180906
Avira (no cloud) 20180906
AVware 20180906
Babable 20180902
Baidu 20180906
BitDefender 20180906
Bkav 20180906
CAT-QuickHeal 20180906
ClamAV 20180906
CMC 20180906
Comodo 20180905
DrWeb 20180906
eGambit 20180906
Emsisoft 20180906
ESET-NOD32 20180906
F-Secure 20180906
Fortinet 20180906
GData 20180906
Ikarus 20180906
Jiangmin 20180906
K7AntiVirus 20180906
K7GW 20180906
Kaspersky 20180906
Kingsoft 20180906
Malwarebytes 20180906
MAX 20180906
McAfee 20180906
McAfee-GW-Edition 20180906
eScan 20180906
NANO-Antivirus 20180906
Panda 20180906
Qihoo-360 20180906
Sophos AV 20180906
SUPERAntiSpyware 20180906
Symantec Mobile Insight 20180905
TACHYON 20180906
Tencent 20180906
TheHacker 20180904
TotalDefense 20180906
TrendMicro 20180906
TrendMicro-HouseCall 20180906
Trustlook 20180906
VBA32 20180906
VIPRE 20180906
ViRobot 20180906
Yandex 20180905
Zillya 20180906
ZoneAlarm by Check Point 20180906
Zoner 20180905
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD InstallShield 2000
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-08-07 12:36:27
Entry Point 0x00001070
Number of sections 4
PE sections
PE imports
CreateCompatibleDC
GetLastError
HeapFree
GetStdHandle
SetHandleCount
GetOEMCP
HeapDestroy
HeapAlloc
GetEnvironmentStringsW
GetModuleFileNameA
RtlUnwind
LoadLibraryA
FreeEnvironmentStringsA
GetStartupInfoA
GetEnvironmentStrings
WideCharToMultiByte
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
CreateFileMappingW
GetCPInfo
MapViewOfFile
GetModuleHandleA
WriteFile
GetCurrentProcess
GetACP
TerminateProcess
HeapCreate
CreateFileW
VirtualFree
GetFileType
GetTickCount
ExitProcess
GetVersion
VirtualAlloc
SysFreeString
SysAllocString
SetFocus
GetMessageA
UpdateWindow
LoadMenuA
PostQuitMessage
DefWindowProcA
ShowWindow
FindWindowA
GetSystemMetrics
DispatchMessageA
PostMessageW
DrawTextA
LoadStringA
SendMessageA
IsIconic
RegisterClassA
CreateWindowExA
LoadCursorA
LoadIconA
SetForegroundWindow
IsDialogMessageA
DestroyWindow
CoUninitialize
CoInitialize
CoCreateInstanceEx
Number of PE resources by type
RT_BITMAP 1
RT_DIALOG 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 4
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.1

LanguageCode
Unknown (30C0)

FileFlagsMask
0x0000

FileDescription
MonikiBay Ltd. Logo application

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unknown (11B0)

InitializedDataSize
259584

EntryPoint
0x1070

OriginalFileName
moniki

MIMEType
application/octet-stream

LegalCopyright
MonikiBay. All rights reserved. 2017

FileVersion
1.0.0.1

TimeStamp
2017:08:07 14:36:27+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
MonikiBay

ProductVersion
1.0.0.1

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
MonikiBay Ltd.

CodeSize
323584

ProductName
MonikiBay Inform

ProductVersionNumber
1.0.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
File identification
MD5 42a8c8b14e03ee74ecbaa2b5cf87ce56
SHA1 dec581539947e29b163a5ba8172c613ebecebdd5
SHA256 25ce747c6618bf491a65555b20aa24f49f0042d22670ef3a103054c6bad1eb8b
ssdeep
12288:1OPmmS8w/oL+9I40wKdUv/GEF2SBieZxP7FQNrx+MiEj/XHoutPKLiI9pCiArbWt:SCHp2molaDP

authentihash 0f6d19052541ca2ef797138b8a2ac50566057e794a0bc71fe381aae85b56ca9e
imphash 4c94f2b7ebc2c178439f9860b0411635
File size 567.5 KB ( 581120 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (25.2%)
Clipper DOS Executable (25.0%)
Generic Win/DOS Executable (24.8%)
DOS Executable Generic (24.8%)
Tags
peexe installshield

VirusTotal metadata
First submission 2018-09-06 15:48:53 UTC ( 8 months, 2 weeks ago )
Last submission 2018-10-03 16:06:13 UTC ( 7 months, 2 weeks ago )
File names som.sang.exe
output.114009842.txt
pqymqetqoduleqase64.exe.8.dr
som.sang
42a8c8b14e03ee74ecbaa2b5cf87ce56.vir
moniki.exe
wylnrv.exe
42a8c8b14e03ee74ecbaa2b5cf87ce56-pe
<SAMPLE.EXE>
pqymqetqoduleqase64.exe
pqymqetqoduleqase64.exe
wyxrai.exe
ttadjnu.exe
ttvtwmk.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Copied files
Searched windows
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections