Threat Database Ransomware Stop.AAWT.HHOO.IOTR.IOQA.QOTR.TYCX Ransomware

Stop.AAWT.HHOO.IOTR.IOQA.QOTR.TYCX Ransomware

By CagedTech in Ransomware

Threat Scorecard

Popularity Rank: 18,546
Threat Level: 100 % (High)
Infected Computers: 15,506
First Seen: September 3, 2022
Last Seen: March 4, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Stop.AAWT/HHOO/IOTR/IOQA/QOTR/TYCX Ransomware
Signature status: No Signature

Known Samples

MD5: 0cf52ab5ec6a96c856f27a8069a67711
SHA1: 561edcbce92456d2037ab4bd41a96e17c73e361b
SHA256: 45E28232FE7DD982261D22CF3E91A7DE00316EE6350B2AE513C16CF3977B390A
File Size: 304.64 KB, 304640 bytes
MD5: 698748d81423eb48f487b367c407f231
SHA1: 4add2d5755cbd114fadfab16787e9af87421a82a
SHA256: 3CFDD82C34CCE16A2BC3A9C42C672A40D961D541EA3CF4500B5D9661AE711D16
File Size: 325.63 KB, 325632 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version 1.0.0.1
Files Version 19.62.99
Internal Name
  • GodGuest
  • incredibletools
Legal Copyright
  • Copyright (C) 2023, shmaer
  • Copyright (C) 2023, somoklos
Product Name
  • engRobustProduct
  • Imba
Product Version 51.36.87.91

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 446
Potentially Malicious Blocks: 5
Whitelisted Blocks: 436
Unknown Blocks: 5

Visual Map

0 0 0 0 0 x x ? x x 0 x ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 1 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 2 0 0 0 0 0 2 0 0 0 1 0 1 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 2 1 1 3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 0 0 0 0 1 1 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 2 2 1 1 1 0 1 0 0 0 1 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 2 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...