QCLA.EXE

CLAnalysis

QNP

The file QCLA.EXE has been detected as malware by 25 anti-virus scanners.
Publisher:
QNP

Product:
CLAnalysis

Description:
Cluster analysis

Version:
1.3.1.1

MD5:
f795ed5dfcbadacdd91235b4ea2791bf

SHA-1:
68b474078ea4d86eb550606303c50645a3bd3c7d

SHA-256:
4dcbb0132778cf0c980086fdb092a519eeecf08d78ed85e008e6c0221df0475a

Scanner detections:
25 / 68

Status:
Malware

Analysis date:
5/7/2024 10:13:51 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Trojan/Win32.FakeAlert
2011.05.18

Avira AntiVirus
TR/FraudPack.cssj
7.11.8.56

avast!
Win32:Malware-gen
2014.9-150707

AVG
SHeur3
2016.0.3055

Bitdefender
Trojan.Generic.KD.212485
1.0.20.940

Comodo Security
TrojWare.Win32.Trojan.Agent.Gen
8744

Dr.Web
Trojan.Fakealert.20729
9.0.1.0188

Emsisoft Anti-Malware
Trojan.Crypt!IK
8.15.07.07.03

ESET NOD32
Win32/TrojanDownloader.Prodatect.BK
9.6130

Fortinet FortiGate
W32/FakeAlert.EA!tr
7/7/2015

F-Secure
Trojan.Generic.KD.212485
11.2015-07-07_3

G Data
Trojan.Generic.KD.212485
15.7.22

IKARUS anti.virus
Trojan.Win32.FakeSysdef
t3scan.1.1.104.0

Kaspersky
Trojan.Win32.FraudPack
14.0.0.1772

McAfee
FakeAlert-CN.gen.ab
5600.6711

Microsoft Security Essentials
Trojan:Win32/FakeSysdef
1.163.1557.0

nProtect
Trojan.Generic.KD.212485
11.05.18.01

Panda Antivirus
Generic Trojan
15.07.07.03

Prevx
Medium Risk Malware
3.0

Quick Heal
Trojan.FraudPack.cssj
7.15.11.00

Sophos
Mal/FakeAV-EA
4.65

SUPERAntiSpyware
Trojan.Agent/Gen-FakeAlert
9768

Trend Micro House Call
TROJ_FAKEAV.SM29
7.2.188

Trend Micro
TROJ_FAKEAV.SM29
10.465.07

VIPRE Antivirus
Trojan.Win32.FakeAv.awrp
9312

File size:
499 KB (510,976 bytes)

Product version:
1.3.1.1

Copyright:
37 CFR 1.53(c)

Original file name:
QCLA.EXE

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\jar_cache28666.tmp

File PE Metadata
Compilation timestamp:
3/5/2009 9:11:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

CTPH (ssdeep):
12288:gUrllsqr0bCXHgAHMyahDj0dMZDizMMnMMMMMWPDEs+D:gUHj0bCQ/tTozMMnMMMMMWbk

Entry address:
0x111B

Entry point:
55, 89, E5, 83, CA, FF, 83, EA, FF, 81, C2, A0, FD, FF, FF, 56, 57, 53, 51, 52, B9, FF, FF, 00, 00, 89, CF, 6A, 00, FF, 15, 8C, 46, 73, 00, 6A, 00, FF, 15, 8C, 46, 73, 00, 6A, 00, FF, 15, 8C, 46, 73, 00, 6A, 00, FF, 15, 8C, 46, 73, 00, 6A, 00, FF, 15, 8C, 46, 73, 00, 89, F9, 49, 75, D1, 83, 65, 8C, 00, 8D, 45, 8C, 50, 50, FF, 15, 04, 44, 73, 00, 5A, 31, C2, 83, EA, FF, 59, 5B, 5F, 5E, 29, D4, 89, F2, 89, FE, 87, F2, 51, 56, 29, C9, 89, 4D, F4, 89, D9, 51, 55, 83, E1, 00, 81, C9, FF, FF, 00, 00, 31, C2, 83...
 
[+]

Entropy:
7.7587  (probably packed)

Code size:
1.5 KB (1,536 bytes)

Remove QCLA.EXE - Powered by Reason Core Security