× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2638b2439843a08afc8d56b01786e01d9071c3b6991fcdf50c22291c2c8af40b
File name: w15FVoay.exe
Detection ratio: 45 / 72
Analysis date: 2019-01-07 06:21:27 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
Ad-Aware Trojan.Autoruns.GenericKDS.31477875 20190107
AhnLab-V3 Trojan/Win32.Emotet.R250709 20190106
ALYac Trojan.Autoruns.GenericKDS.31477875 20190107
Arcabit Trojan.Autoruns.GenericS.D1E05073 20190107
Avast Win32:BankerX-gen [Trj] 20190107
AVG Win32:BankerX-gen [Trj] 20190107
BitDefender Trojan.Autoruns.GenericKDS.31477875 20190107
ClamAV Win.Malware.Emotet-6803404-0 20190107
Comodo Malware@#2sxht1c234hqd 20190107
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.8ee812 20180225
Cylance Unsafe 20190107
Cyren W32/Trojan.RAEB-8998 20190107
eGambit Unsafe.AI_Score_90% 20190107
Emsisoft Trojan.Autoruns.GenericKDS.31477875 (B) 20190107
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOGC 20190107
F-Secure Trojan.Autoruns.GenericKDS.31477875 20190107
Fortinet W32/Kryptik.GOGC!tr 20190107
GData Trojan.Autoruns.GenericKDS.31477875 20190107
Ikarus Trojan.Win32.Crypt 20190106
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00544d161 ) 20190107
K7GW Trojan ( 00544d161 ) 20190106
Kaspersky Trojan-Banker.Win32.Emotet.bxxs 20190107
Malwarebytes Trojan.Emotet 20190107
MAX malware (ai score=99) 20190107
McAfee Emotet-FLM!0E365359B515 20190107
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190107
Microsoft Trojan:Win32/Emotet.AC!bit 20190107
eScan Trojan.Autoruns.GenericKDS.31477875 20190107
Palo Alto Networks (Known Signatures) generic.ml 20190107
Panda Trj/GdSda.A 20190106
Qihoo-360 Win32/Trojan.b31 20190107
Rising Malware.Heuristic.MLite(100%) (AI-LITE:WE3WhGgvakjIQZtO1NbQeg) 20190107
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOI 20190107
Symantec Trojan.Emotet 20190106
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_FRS.VSN03A19 20190107
TrendMicro-HouseCall TROJ_FRS.VSN03A19 20190107
VBA32 Trojan.Emotet 20190104
Webroot W32.Trojan.Emotet 20190107
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxxs 20190107
AegisLab 20190107
Alibaba 20180921
Antiy-AVL 20190106
Avast-Mobile 20190106
Avira (no cloud) 20190107
AVware 20180925
Babable 20180918
Baidu 20190104
Bkav 20190104
CAT-QuickHeal 20190106
CMC 20190106
DrWeb 20190107
F-Prot 20190107
Jiangmin 20190107
Kingsoft 20190107
NANO-Antivirus 20190107
SUPERAntiSpyware 20190102
TACHYON 20190107
Tencent 20190107
TheHacker 20190106
TotalDefense 20190106
Trustlook 20190107
VIPRE 20190105
ViRobot 20190107
Yandex 20181229
Zillya 20190105
Zoner 20190107
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

Product Microsoft Money
Original name OCVT.DLL
Internal name OCVT
File version 11.00.0716
Description Microsoft OFD file conversion
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-03 00:00:19
Entry Point 0x000090F0
Number of sections 8
PE sections
PE imports
GetSidSubAuthority
DuplicateToken
IsTokenRestricted
EqualDomainSid
FindFirstFreeAce
GetOldestEventLogRecord
GetSecurityDescriptorOwner
GetFileSecurityA
LookupPrivilegeNameA
GetCurrentHwProfileW
DecryptFileW
EqualPrefixSid
GetClusterResourceNetworkName
GetCharacterPlacementA
GetOutlineTextMetricsA
GetMetaFileBitsEx
FillPath
GetClipRgn
GetDIBColorTable
GetWorldTransform
GetRgnBox
GetTextColor
GetOutlineTextMetricsW
LineTo
GetRegionData
ExtCreateRegion
GetROP2
GetCharWidth32W
GetTextExtentPoint32W
GetTextCharacterExtra
GetObjectType
GetTextFaceA
GetUserDefaultUILanguage
GetVolumePathNameW
GlobalFindAtomW
EnumSystemLocalesW
GetProcessWorkingSetSize
GetFileAttributesA
GetProfileStringW
GetTickCount
GetStringTypeExA
GetSystemDefaultLCID
ExitThread
GetLocalTime
CancelSynchronousIo
SwitchToThread
GetConsoleOutputCP
GetPrivateProfileIntA
GetConsoleTitleW
GetCommandLineW
GetCurrentDirectoryA
GetVolumeInformationW
ExpandEnvironmentStringsA
GetTapePosition
lstrcpynW
GetCommModemStatus
GetSystemDefaultLangID
GetFileSizeEx
DeleteVolumeMountPointW
ExpandEnvironmentStringsW
VirtualUnlock
ReadFile
DeleteAtom
IsProcessorFeaturePresent
GetComputerNameA
GetThreadTimes
GetACP
GetDiskFreeSpaceA
IsValidLanguageGroup
EscapeCommFunction
LocalFree
GetThreadPriority
GetVersion
GetDefaultCommConfigW
GlobalHandle
GetLogicalDriveStringsW
FindNextChangeNotification
DefineDosDeviceA
GetSystemWindowsDirectoryW
GetDefaultCommConfigA
VirtualAlloc
LoadRegTypeLib
GetRecordInfoFromGuids
FindExecutableW
FindExecutableA
ExtractIconExA
FreeCredentialsHandle
IsRectEmpty
EnumWindowStationsA
IsWindowUnicode
GetMessagePos
GetClassInfoExW
GetScrollRange
DefWindowProcW
GetKeyboardLayoutNameW
GetClassInfoExA
DestroyMenu
GetShellWindow
FlashWindow
DrawStateW
DrawFocusRect
GetPropA
LoadBitmapA
GetParent
FreeDDElParam
GetSystemMetrics
IsGUIThread
GetDlgItemTextA
GetMessageExtraInfo
ChildWindowFromPoint
GetClassLongA
LookupIconIdFromDirectoryEx
DestroyCaret
InsertMenuItemA
GetCursorPos
GetWindowRgn
DestroyIcon
LoadMenuIndirectA
GetKeyNameTextA
GetWindowModuleFileNameW
GetDlgItem
DrawTextW
DeleteMenu
GetPriorityClipboardFormat
LoadImageW
SetPhysicalCursorPos
GetMenuContextHelpId
GetUpdateRgn
GetMenuState
LoadCursorW
GetSystemMenu
GetFocus
GetMenuItemCount
GetUpdateRect
DefDlgProcW
DestroyWindow
GetFileVersionInfoSizeA
GetUrlCacheEntryInfoExW
GetPrintProcessorDirectoryW
srand
system
fsetpos
ftell
vfwprintf
vfprintf
ungetc
ungetwc
MkParseDisplayName
FaultInIEFeature
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.0.0.716

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Microsoft OFD file conversion

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
118784

EntryPoint
0x90f0

OriginalFileName
OCVT.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

FileVersion
11.00.0716

TimeStamp
2019:01:02 16:00:19-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
OCVT

ProductVersion
11.00.0716

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
36864

ProductName
Microsoft Money

ProductVersionNumber
11.0.0.716

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 0e365359b51530d354a2f7ce7d1f4cbc
SHA1 087b5d38ee812c118ec585eeaaf317cb1737963a
SHA256 2638b2439843a08afc8d56b01786e01d9071c3b6991fcdf50c22291c2c8af40b
ssdeep
3072:2JuK6Kqt6rRlw9SN7GncJRENCSjeR3cfMH:2Et6rgoBAjeRMf

authentihash d6dfa7a2fad9c3c06c3d6fe6bd975f543d4f2959fc0a94f03946cb1f42cc0b27
imphash bf4ee34ff1925007cd7cb5c3f7f2cf8c
File size 152.0 KB ( 155648 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (33.7%)
Win64 Executable (generic) (29.8%)
Microsoft Visual C++ compiled executable (generic) (17.8%)
Win32 Dynamic Link Library (generic) (7.1%)
Win32 Executable (generic) (4.8%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-02 17:02:43 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-02 17:02:43 UTC ( 1 month, 2 weeks ago )
File names w15FVoay.exe
OCVT
OCVT.DLL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!