tewwwwwwwwwww.exe

The file tewwwwwwwwwww.exe has been detected as malware by 32 anti-virus scanners.
Version:
0.0.0.0

MD5:
ab0e1c9ec0156dc094638b3aa4657988

SHA-1:
fc0551fba3f6bff208c44f6cf9fada0728f4eed8

SHA-256:
77b4731ddd46352dda3b55fe4c18799d9695088884177074f919dfc31f2f9225

Scanner detections:
32 / 68

Status:
Malware

Analysis date:
4/28/2024 2:46:53 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Razy.95797
-40

AegisLab AV Signature
Troj.W32.Llac!c
2.1.4+

AhnLab V3 Security
Trojan/Win32.Agent.R188396
3.8.1.16

Avira AntiVirus
TR/Dropper.Gen
8.3.3.4

Arcabit
Trojan.Razy.D17635
1.0.0.788

avast!
Win32:Malware-gen
2014.9-170316

AVG
MSIL10
2018.0.2438

Baidu Antivirus
Win32.Trojan.WisdomEyes.16070401.9500
4.0.3.17316

Bitdefender
Gen:Variant.Razy.95797
1.0.20.375

Bkav FE
W32.Clod6ad.Trojan
1.3.0.8455

Dr.Web
Trojan.PWS.Siggen1.58723
9.0.1.075

Emsisoft Anti-Malware
Gen:Variant.Razy.95797
8.17.03.16.12

ESET NOD32
MSIL/Injector.QLO (variant)
11.14472

Fortinet FortiGate
MSIL/Injector.OBU!tr
3/16/2017

F-Secure
Gen:Variant.Razy.95797
11.2017-16-03_5

G Data
Gen:Variant.Razy.95797
17.3.25

IKARUS anti.virus
Trojan.MSIL.Injector
t3scan.2.1.16.0

K7 AntiVirus
Trojan
13.245.21562

Kaspersky
Trojan.Win32.Llac
14.0.0.-1315

Malwarebytes
Spyware.PasswordStealer
v2017.03.16.12

McAfee
Generic.apy
5600.6094

Microsoft Security Essentials
Trojan:Win32/Dynamer!ac
1.1.13303.0

MicroWorld eScan
Gen:Variant.Razy.95797
18.0.0.225

NANO AntiVirus
Trojan.Win32.Injector.eiampc
1.0.70.13328

Panda Antivirus
Trj/GdSda.A
17.03.16.12

Qihoo 360 Security
Win32/Trojan.ade
1.0.0.1120

Rising Antivirus
Dropper.Generic!8.35E-7RnhgUjfD6N (cloud)
23.00.65.17314

Sophos
Mal/MSIL-JX
4.98

Trend Micro House Call
TROJ_GEN.R011C0RK316
7.2.75

Trend Micro
TROJ_GEN.R011C0RK316
10.465.16

VIPRE Antivirus
Trojan.Win32.Generic
53902

ViRobot
Trojan.Win32.Z.Razy.684544.H[h]
2014.3.20.0

File size:
668.5 KB (684,544 bytes)

Product version:
0.0.0.0

Original file name:
tewwwwwwwwwww.exe

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\trz67bd.tmp

File PE Metadata
Compilation timestamp:
10/30/2016 1:20:20 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

.NET CLR dependent:
Yes

Entry address:
0xA229E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
641 KB (656,384 bytes)

Remove tewwwwwwwwwww.exe - Powered by Reason Core Security