× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f27b77272432fb0936fae8626502bad668e3a5d566e18e45f00d0d396df144ce
File name: 0HgmthDxKxiaO.exe
Detection ratio: 10 / 69
Analysis date: 2018-09-10 07:51:24 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180910
AVG FileRepMalware 20180910
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9965 20180910
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cylance Unsafe 20180910
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/GenKryptik.CKQN 20180910
Microsoft Trojan:Win32/Fuerboos.A!cl 20180910
Rising Trojan.Emotet!8.B95 (TFE:dGZlOgLI6c89weAUuQ) 20180910
SentinelOne (Static ML) static engine - malicious 20180830
Ad-Aware 20180910
AegisLab 20180910
AhnLab-V3 20180910
Alibaba 20180713
ALYac 20180910
Antiy-AVL 20180906
Arcabit 20180910
Avast-Mobile 20180910
Avira (no cloud) 20180910
AVware 20180910
Babable 20180907
BitDefender 20180910
Bkav 20180906
CAT-QuickHeal 20180909
ClamAV 20180910
CMC 20180910
Comodo 20180910
Cybereason 20180225
Cyren 20180910
DrWeb 20180910
eGambit 20180910
Emsisoft 20180910
F-Prot 20180910
F-Secure 20180910
Fortinet 20180910
GData 20180910
Ikarus 20180909
Sophos ML 20180717
Jiangmin 20180910
K7AntiVirus 20180910
K7GW 20180910
Kaspersky 20180910
Kingsoft 20180910
Malwarebytes 20180910
MAX 20180910
McAfee 20180910
McAfee-GW-Edition 20180910
eScan 20180910
NANO-Antivirus 20180910
Palo Alto Networks (Known Signatures) 20180910
Panda 20180909
Qihoo-360 20180910
Sophos AV 20180910
SUPERAntiSpyware 20180907
Symantec 20180910
Symantec Mobile Insight 20180905
TACHYON 20180910
Tencent 20180910
TheHacker 20180907
TotalDefense 20180910
TrendMicro 20180910
TrendMicro-HouseCall 20180910
Trustlook 20180910
VBA32 20180907
VIPRE 20180910
ViRobot 20180910
Webroot 20180910
Yandex 20180908
Zillya 20180908
ZoneAlarm by Check Point 20180910
Zoner 20180910
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © 2001 Hewlett-Packard Company

Product Hewlett-Packard Master Monitor, WINNT version
Original name MSTRMON
Internal name MSTRMON
File version 10.00.14
Description Win32 Master Monitor
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-10 07:46:41
Entry Point 0x0001C054
Number of sections 5
PE sections
PE imports
RegDisablePredefinedCacheEx
CreateRestrictedToken
LookupPrivilegeValueW
TreeResetNamedSecurityInfoW
SetSecurityDescriptorSacl
CryptInstallDefaultContext
JetCommitTransaction
GetTextExtentExPointA
CreateMetaFileA
GetPaletteEntries
CreateSolidBrush
GetEnhMetaFilePaletteEntries
EnumFontsA
ImmSimulateHotKey
ImmSetCompositionWindow
CallNamedPipeW
FindCloseChangeNotification
CreateSemaphoreA
GetModuleHandleA
GetNamedPipeHandleStateA
OpenSemaphoreA
UnhandledExceptionFilter
CopyFileA
GetSystemWow64DirectoryA
GetDefaultCommConfigA
acmDriverEnum
ICCompressorFree
DsBindWithCredA
CreateTypeLib
SafeArrayLock
glMapGrid1f
RasSetCustomAuthDataW
I_RpcSessionStrictContextHandle
UuidToStringW
RpcBindingSetAuthInfoExA
SetupDiEnumDeviceInfo
SetupDiGetClassInstallParamsA
SetupDiBuildClassInfoListExW
SetupGetLineTextA
SetupQueueCopyIndirectW
StrToIntExW
SHCopyKeyW
QuerySecurityPackageInfoW
TranslateAcceleratorA
IsClipboardFormatAvailable
ModifyMenuA
MonitorFromPoint
TrackPopupMenuEx
FtpOpenFileA
PlaySoundW
EndDocPrinter
DocumentPropertiesW
GetPrinterW
WTHelperGetProvSignerFromChain
fprintf
CoGetObject
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
CodeSize
0

SubsystemVersion
5.0

LinkerVersion
12.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
10.0.0.14

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Win32 Master Monitor

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
86016

PrivateBuild
This is a Release version!

EntryPoint
0x1c054

OriginalFileName
MSTRMON

MIMEType
application/octet-stream

LegalCopyright
Copyright 2001 Hewlett-Packard Company

FileVersion
10.00.14

TimeStamp
2018:09:10 08:46:41+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
MSTRMON

ProductVersion
10.00.14

UninitializedDataSize
1006425862

OSVersion
5.0

FileOS
Windows 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Hewlett-Packard

LegalTrademarks
All Rights Reserved.

ProductName
Hewlett-Packard Master Monitor, WINNT version

ProductVersionNumber
10.0.0.14

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 eb089a75070fab284ed0bffc51a80770
SHA1 de0c4853a60ce1f247030d7ce060ddba105df137
SHA256 f27b77272432fb0936fae8626502bad668e3a5d566e18e45f00d0d396df144ce
ssdeep
3072:atYHQNCDeYweddzK5oTHaK3FLgkfsRP4wCqj9IvcPlxGGETqDu3a/BZMzVGcAU45:yCKYzdu5maB1CqjIzGEsBZZr

authentihash 092ae3087279efd17f0a790d872357e74f5124634c63091737562e4a761868a1
imphash a4cce862c2b0545c113061be9b399030
File size 296.0 KB ( 303104 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-10 07:51:18 UTC ( 5 months, 1 week ago )
Last submission 2018-09-12 10:14:08 UTC ( 5 months, 1 week ago )
File names 0HgmthDxKxiaO.exe
038643.exe
MSTRMON
44516965.exe
loadercloud.exe
eb089a75070fab284ed0bffc51a80770_exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Opened mutexes
Runtime DLLs