× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a739e1c23cd19d8843478136ddeb142459c2bf09bef9be7023834ad24c67ffea
File name: mscqjknm.exe
Detection ratio: 45 / 50
Analysis date: 2014-03-06 08:43:45 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
AVG Zbot.EMS 20140305
Ad-Aware Trojan.GenericKD.1460106 20140306
Agnitum Backdoor.Androm!k9jFYLYCvqc 20140305
AhnLab-V3 Worm/Win32.Gamarue 20140305
AntiVir TR/Crypt.ZPACK.39298 20140306
Antiy-AVL Trojan[Backdoor]/Win32.Androm 20140306
Avast Win32:Malware-gen 20140306
Baidu-International Backdoor.Win32.Androm.AsP 20140306
BitDefender Trojan.GenericKD.1460106 20140306
Bkav W32.RogueNeurevtF.Trojan 20140305
CAT-QuickHeal Worm.Gamarue.I5 20140306
Commtouch W32/Trojan.TNVT-8983 20140306
Comodo TrojWare.Win32.Genome.xhtk 20140306
DrWeb Trojan.Inject2.23 20140306
ESET-NOD32 Win32/TrojanDownloader.Wauchos.X 20140306
Emsisoft Trojan.GenericKD.1460106 (B) 20140306
F-Prot W32/Trojan2.OBIL 20140306
F-Secure Trojan.GenericKD.1460106 20140306
Fortinet W32/Androm.BJKN!tr.bdr 20140306
GData Trojan.GenericKD.1460106 20140306
Ikarus Backdoor.Win32.Androm 20140306
Jiangmin Backdoor/Androm.dwd 20140306
K7AntiVirus Riskware ( 0040eff71 ) 20140305
K7GW Riskware ( 0040eff71 ) 20140305
Kaspersky Backdoor.Win32.Androm.bjkn 20140306
Kingsoft Win32.Hack.Androm.bj.(kcloud) 20140306
Malwarebytes Backdoor.Andromeda.AMZ 20140306
McAfee Generic.rm 20140306
McAfee-GW-Edition Generic.rm 20140306
MicroWorld-eScan Trojan.GenericKD.1460106 20140306
Microsoft Worm:Win32/Gamarue.I 20140306
NANO-Antivirus Trojan.Win32.Inject2.crhhyd 20140306
Norman Suspicious_Gen4.FMTUJ 20140306
Panda Trj/WLT.A 20140305
Qihoo-360 Win32/Trojan.Multi.daf 20140306
Sophos Mal/Generic-L 20140306
Symantec Backdoor.Trojan 20140306
TheHacker Trojan/Downloader.Wauchos.x 20140305
TotalDefense Win32/Gamarue.GYQQBDC 20140306
TrendMicro WORM_GAMARUE.JQ 20140306
TrendMicro-HouseCall WORM_GAMARUE.JQ 20140306
VBA32 Backdoor.Androm 20140305
VIPRE Worm.Win32.Gamarue.ic (v) 20140306
ViRobot Worm.Win32.S.Gamarue.94208 20140306
nProtect Backdoor/W32.Androm.94208.B 20140305
ByteHero 20140306
CMC 20140228
ClamAV 20140305
Rising 20140305
SUPERAntiSpyware 20140306
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-12-17 02:56:11
Link date 3:56 AM 12/17/2013
Entry Point 0x00004891
Number of sections 4
PE sections
PE imports
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
LCMapStringW
SetHandleCount
GetModuleFileNameW
TryEnterCriticalSection
GetVersionExW
FreeLibrary
QueryPerformanceCounter
IsDebuggerPresent
ExitProcess
TlsAlloc
GetEnvironmentStringsW
GetVersionExA
GetModuleFileNameA
WaitForSingleObjectEx
RtlUnwind
LoadLibraryA
GetStdHandle
DeleteCriticalSection
GetCurrentProcess
GetStartupInfoW
GetFileType
SetConsoleCtrlHandler
GetCurrentProcessId
IsValidCodePage
GetCPInfo
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
SetFilePointerEx
FreeEnvironmentStringsW
GetCommandLineA
CloseHandle
InterlockedCompareExchange
EncodePointer
GetLocaleInfoW
CreateMutexA
SetFilePointer
RaiseException
WideCharToMultiByte
LoadLibraryW
TlsFree
GetModuleHandleA
HeapSetInformation
ReadFile
InterlockedExchange
SetUnhandledExceptionFilter
WriteFile
TlsSetValue
DecodePointer
WaitForSingleObject
IsProcessorFeaturePresent
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
GetOEMCP
LocalFree
TerminateProcess
FreeLibraryAndExitThread
InitializeCriticalSection
HeapCreate
GetProcAddress
FatalAppExitA
FindClose
InterlockedDecrement
Sleep
GetCurrentThread
GetTickCount
HeapDestroy
CreateFileA
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
SetLastError
LeaveCriticalSection
NetGetJoinInformation
OleUninitialize
CoCreateInstance
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
ReleaseStgMedium
GetRunningObjectTable
RegisterDragDrop
CoLockObjectExternal
CoRevokeClassObject
CoInitializeSecurity
CLSIDFromProgID
CoQueryProxyBlanket
RevokeDragDrop
CoDisconnectObject
CoCreateGuid
CoTaskMemFree
OleRun
CoGetClassObject
Number of PE resources by type
RT_ICON 2
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 4
ExifTool file metadata
SubsystemVersion
4.0

Comments
Oracle Software

InitializedDataSize
49152

ImageVersion
0.0

FileVersionNumber
1.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
7.1

FileOS
Unknown (0x5)

MIMEType
application/octet-stream

FileVersion
1.0

TimeStamp
2013:12:17 03:56:11+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:03:06 09:44:00+01:00

ProductVersion
1.0

FileDescription
Oracle Software

OSVersion
4.0

FileCreateDate
2014:03:06 09:44:00+01:00

OriginalFilename
olaunch.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Oracle Software, Inc.

CodeSize
40960

FileSubtype
0

ProductVersionNumber
1.0.0.0

EntryPoint
0x4891

ObjectFileType
Executable application

File identification
MD5 52d832c893645a86ab7c8e1708b4ae37
SHA1 71196c523b5f995834789e2d4036f59129874414
SHA256 a739e1c23cd19d8843478136ddeb142459c2bf09bef9be7023834ad24c67ffea
ssdeep
1536:gta3EBc0EUaD4KAwjNJxiLZRKRZ1Y2+ZNpB5t:gta0yn4Bwj/x8Z4RM20F

imphash 7fec5d52cfc514b40575fd86b41018f9
File size 92.0 KB ( 94208 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-12-16 17:51:49 UTC ( 4 months, 1 week ago )
Last submission 2014-02-07 19:14:38 UTC ( 2 months, 2 weeks ago )
File names MSIOFOSOH.EXE
msckahxh.exe
file-6425586_exe
1000317245.transact_store.exe
transact_store344578.exe
msaccoxp.exe
msaodgeh.exe
msoepba.exe
mspwib.exe
a739e1c23cd19d8843478136ddeb142459c2bf09bef9be7023834ad24c67ffea
10001723.transact_store.exe
vti-rescan
msuuxaw.exe
mskicfqo.exe
1000317245.transact_store.exe
msbisbhga.exe
msiiligov.exe
transact_store1875.exe
mscqjknm.exe
52d832c893645a86ab7c8e1708b4ae37
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Behaviour characterization
Zemana
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Copied files
Set keys
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.