× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c2a75e619d351ed7bdad08d44ac3861f0bb6bc6caf87eaeee0428327230c532d
File name: QHXSQDVQWHJ.EXE
Detection ratio: 45 / 66
Analysis date: 2018-11-16 19:01:27 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.Autoruns.GenericKDS.31326408 20181116
AhnLab-V3 Malware/Win32.Generic.C2803095 20181116
ALYac Trojan.Autoruns.GenericKDS.31326408 20181116
Arcabit Trojan.Autoruns.GenericS.D1DE00C8 20181116
Avast Win32:BankerX-gen [Trj] 20181116
AVG Win32:BankerX-gen [Trj] 20181116
BitDefender Trojan.Autoruns.GenericKDS.31326408 20181116
CAT-QuickHeal Trojan.Emotet.X4 20181116
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.605373 20180225
Cylance Unsafe 20181116
Cyren W32/Trojan.AXMT-2213 20181116
Emsisoft Trojan.Autoruns.GenericKDS.31326408 (B) 20181116
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GMFI 20181116
F-Prot W32/Emotet.IP.gen!Eldorado 20181116
F-Secure Trojan.Autoruns.GenericKDS.31326408 20181116
Fortinet W32/Kryptik.GMFI!tr 20181116
GData Trojan.Autoruns.GenericKDS.31326408 20181116
Ikarus Trojan.Win32.Crypt 20181116
Sophos ML heuristic 20181108
Jiangmin Trojan.Banker.Emotet.dsf 20181116
K7AntiVirus Trojan ( 005402e91 ) 20181116
K7GW Trojan ( 005402e91 ) 20181116
Kaspersky Trojan-Banker.Win32.Emotet.bmvl 20181116
Malwarebytes Trojan.Emotet 20181116
MAX malware (ai score=100) 20181116
McAfee RDN/Generic.grp 20181116
McAfee-GW-Edition RDN/Generic.grp 20181116
Microsoft Trojan:Win32/Emotet.AC!bit 20181116
eScan Trojan.Autoruns.GenericKDS.31326408 20181116
Palo Alto Networks (Known Signatures) generic.ml 20181116
Panda Trj/Genetic.gen 20181116
Qihoo-360 HEUR/QVM20.1.E54B.Malware.Gen 20181116
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20181116
Sophos AV Mal/EncPk-ANY 20181116
Symantec Trojan.Gen.MBT 20181116
TACHYON Banker/W32.Emotet.823296.E 20181116
TrendMicro TSPY_EMOTET.THAAAFAH 20181116
TrendMicro-HouseCall TSPY_EMOTET.THAAAFAH 20181116
VBA32 TrojanBanker.Emotet 20181116
ViRobot Trojan.Win32.Z.Genkryptik.823296.A 20181116
Webroot W32.Trojan.Gen 20181116
Zillya Trojan.Emotet.Win32.7041 20181116
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bmvl 20181116
AegisLab 20181116
Alibaba 20180921
Antiy-AVL 20181116
Avast-Mobile 20181116
Avira (no cloud) 20181116
Babable 20180918
Baidu 20181116
Bkav 20181116
ClamAV 20181116
CMC 20181116
DrWeb 20181116
Kingsoft 20181116
NANO-Antivirus 20181116
SentinelOne (Static ML) 20181011
SUPERAntiSpyware 20181114
Symantec Mobile Insight 20181108
Tencent 20181116
TheHacker 20181113
TotalDefense 20181116
Trustlook 20181116
Yandex 20181115
Zoner 20181116
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. Al

Internal name wmspdmod.dll
File version 6.1.7601.19091
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-03-01 09:39:18
Entry Point 0x0000B624
Number of sections 6
PE sections
PE imports
ReadEncryptedFileRaw
GetModuleHandleA
InitAtomTable
MprConfigTransportGetHandle
GetMouseMovePointsEx
UpdateWindow
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
NEUTRAL 1
PE resources
Debug information
ExifTool file metadata
CodeSize
49152

UninitializedDataSize
0

LinkerVersion
18.0

ImageVersion
0.0

FileVersionNumber
1.4.20030.62408

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
778240

EntryPoint
0xb624

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. Al

FileVersion
6.1.7601.19091

TimeStamp
2018:03:01 01:39:18-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
wmspdmod.dll

ProductVersion
6.1.7601.19091

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft

LegalTrademarks
A, Netscape

FileSubtype
0

ProductVersionNumber
1.4.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 9c1f3f660537303dfe9fa60e1e9ab34b
SHA1 aef0a9d344e7f1fb29dd4c9312d8385b1d66248d
SHA256 c2a75e619d351ed7bdad08d44ac3861f0bb6bc6caf87eaeee0428327230c532d
ssdeep
3072:6mCVUfgjZE0nXCcKLCrPDxFVkNjnDTc3dHzfE3LonrDN312j0B6hg:RCVU41RCrqPF/Kjn83dTfE3MFzug

authentihash 938073f9018a0d27b51422eb87282c9c249bae6dbcf0ace3c0c1a0d905058e1b
imphash 069520ff8da6156ca4b342ea3bdae8af
File size 804.0 KB ( 823296 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-10-31 14:37:47 UTC ( 3 months, 2 weeks ago )
Last submission 2018-11-16 19:01:27 UTC ( 3 months ago )
File names C$~Windows~SysWOW64~dynamicfail.exe
0vmyvsj.exe
Zh6Lwd6ZR8rwHL3HJnu.exe
wmspdmod.dll
HF8OTWAPV.EXE
JI1ZAMD3K32.EXE
QHXSQDVQWHJ.EXE
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.