× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 361c9978405fc4fc83c74aa17dc9e3983e82416992e77c29fe36289d0632db6c
File name: rLGawLZX.exe
Detection ratio: 36 / 68
Analysis date: 2018-09-11 21:47:43 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40469940 20180911
ALYac Trojan.Agent.Emotet 20180911
Arcabit Trojan.Generic.D26985B4 20180911
Avast Win32:Trojan-gen 20180911
AVG Win32:Trojan-gen 20180911
BitDefender Trojan.GenericKD.40469940 20180911
CrowdStrike Falcon (ML) malicious_confidence_70% (D) 20180723
Cylance Unsafe 20180911
Cyren W32/Trojan.CIVQ-3643 20180911
DrWeb Trojan.Crypt.62 20180911
Emsisoft Trojan.Emotet (A) 20180911
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GKQC 20180911
F-Prot W32/Emotet.GD.gen!Eldorado 20180911
Fortinet W32/GenKryptik.CKQN!tr 20180911
GData Trojan.GenericKD.40469940 20180911
Ikarus Trojan-Banker.Emotet 20180911
Kaspersky Trojan-Banker.Win32.Emotet.bddi 20180911
Malwarebytes Trojan.Emotet 20180911
MAX malware (ai score=94) 20180911
McAfee Emotet-FHQ!5E9EEF098E04 20180911
McAfee-GW-Edition Emotet-FHQ!5E9EEF098E04 20180911
Microsoft Trojan:Win32/Emotet.AC!bit 20180911
eScan Trojan.GenericKD.40469940 20180911
Palo Alto Networks (Known Signatures) generic.ml 20180911
Panda Trj/Genetic.gen 20180911
Qihoo-360 HEUR/QVM20.1.C5CF.Malware.Gen 20180911
Rising Trojan.Emotet!8.B95 (CLOUD) 20180911
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/EncPk-ANY 20180911
Symantec Trojan.Gen.2 20180911
Tencent Win32.Trojan-banker.Emotet.Szmc 20180911
TrendMicro-HouseCall Suspicious_GEN.F47V0910 20180911
ViRobot Trojan.Win32.Z.Highconfidence.303104.A 20180911
Webroot W32.Trojan.Emotet 20180911
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bddi 20180911
AegisLab 20180911
AhnLab-V3 20180911
Alibaba 20180713
Antiy-AVL 20180911
Avast-Mobile 20180911
Avira (no cloud) 20180911
AVware 20180911
Babable 20180907
Baidu 20180910
Bkav 20180911
CAT-QuickHeal 20180909
ClamAV 20180911
CMC 20180911
Comodo 20180911
Cybereason 20180225
eGambit 20180911
F-Secure 20180910
Sophos ML 20180717
Jiangmin 20180911
K7AntiVirus 20180911
K7GW 20180911
Kingsoft 20180911
NANO-Antivirus 20180911
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180911
TACHYON 20180911
TheHacker 20180906
TotalDefense 20180911
TrendMicro 20180911
Trustlook 20180911
VBA32 20180911
VIPRE 20180911
Yandex 20180910
Zillya 20180911
Zoner 20180910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2001 Hewlett-Packard Company

Product Hewlett-Packard Master Monitor, WINNT version
Original name MSTRMON
Internal name MSTRMON
File version 10.00.14
Description Win32 Master Monitor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-10 09:20:46
Entry Point 0x0001C37C
Number of sections 5
PE sections
PE imports
TreeResetNamedSecurityInfoW
CreateRestrictedToken
LookupPrivilegeValueW
RegDisablePredefinedCacheEx
SetSecurityDescriptorSacl
CryptInstallDefaultContext
JetCommitTransaction
GetTextExtentExPointA
CreateMetaFileA
GetPaletteEntries
CreateSolidBrush
GetEnhMetaFilePaletteEntries
EnumFontsA
ImmSetCompositionWindow
ImmSimulateHotKey
CallNamedPipeW
FindCloseChangeNotification
CreateSemaphoreA
GetModuleHandleA
OpenSemaphoreA
GetNamedPipeHandleStateA
UnhandledExceptionFilter
CopyFileA
GetSystemWow64DirectoryA
GetDefaultCommConfigA
acmDriverEnum
ICCompressorFree
DsBindWithCredA
CreateTypeLib
SafeArrayLock
glMapGrid1f
RasSetCustomAuthDataW
I_RpcSessionStrictContextHandle
UuidToStringW
RpcBindingSetAuthInfoExA
SetupDiEnumDeviceInfo
SetupDiGetClassInstallParamsA
SetupDiBuildClassInfoListExW
SetupGetLineTextA
SetupQueueCopyIndirectW
StrToIntExW
SHCopyKeyW
QuerySecurityPackageInfoW
TranslateAcceleratorA
IsClipboardFormatAvailable
ModifyMenuA
MonitorFromPoint
TrackPopupMenuEx
FtpOpenFileA
PlaySoundW
EndDocPrinter
DocumentPropertiesW
GetPrinterW
WTHelperGetProvSignerFromChain
fprintf
CoGetObject
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

SubsystemVersion
5.0

LinkerVersion
12.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
10.0.0.14

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Win32 Master Monitor

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
86016

PrivateBuild
This is a Release version!

EntryPoint
0x1c37c

OriginalFileName
MSTRMON

MIMEType
application/octet-stream

LegalCopyright
Copyright 2001 Hewlett-Packard Company

FileVersion
10.00.14

TimeStamp
2018:09:10 02:20:46-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
MSTRMON

ProductVersion
10.00.14

UninitializedDataSize
1006425862

OSVersion
5.0

FileOS
Windows 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Hewlett-Packard

LegalTrademarks
All Rights Reserved.

ProductName
Hewlett-Packard Master Monitor, WINNT version

ProductVersionNumber
10.0.0.14

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 5e9eef098e04e1a24a0a081e194e9756
SHA1 fbd0ee2edeca14a3b5bda6834660d1c07cb123e0
SHA256 361c9978405fc4fc83c74aa17dc9e3983e82416992e77c29fe36289d0632db6c
ssdeep
3072:FQGLmgbNizDGKsxfV0krSiRtS54AvgLMD3g6mNXlcQaH/BlJPIXLoAuNC7DJAU45:FQGLVgsxfKkr7W5IM5elfaHTJQ7s3

authentihash 33e9416656c818de9da6805385d1ec4548cc6f200779249b2257889f8fa59441
imphash 25a2d7b6fe610a7889497edbada02b21
File size 296.0 KB ( 303104 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-10 09:25:15 UTC ( 5 months, 2 weeks ago )
Last submission 2018-09-10 09:25:15 UTC ( 5 months, 2 weeks ago )
File names MSTRMON
rLGawLZX.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes
Opened mutexes
Runtime DLLs