× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a33ab63b768c65f75c9b21ae68a9c8490387901f7c8c00561f44a1228fff6b21
File name: RqzKxy.exe
Detection ratio: 48 / 72
Analysis date: 2019-01-05 03:02:52 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
Ad-Aware Trojan.GenericKD.40904519 20190105
AhnLab-V3 Trojan/Win32.Emotet.R250720 20190104
ALYac Trojan.GenericKD.40904519 20190105
Arcabit Trojan.Generic.D2702747 20190105
Avast Win32:MalwareX-gen [Trj] 20190105
AVG Win32:MalwareX-gen [Trj] 20190105
AVware LooksLike.Win32.Dridex.e (v) 20180925
BitDefender Trojan.Autoruns.GenericKDS.31483227 20190105
ClamAV Win.Malware.Emotet-6803404-0 20190105
Comodo Malware@#2a7uhf0xbbp20 20190105
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.456d37 20180225
Cylance Unsafe 20190105
Cyren W32/Trojan.FFZU-6686 20190105
eGambit Unsafe.AI_Score_99% 20190105
Emsisoft Trojan.GenericKD.40904519 (B) 20190104
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOGC 20190104
F-Secure Trojan.GenericKD.40904519 20190104
Fortinet W32/Kryptik.GOGC!tr 20190104
GData Trojan.GenericKD.40904519 20190104
Ikarus Trojan.Win32.Crypt 20190104
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00544d161 ) 20190104
K7GW Trojan ( 00544d161 ) 20190104
Kaspersky Trojan-Banker.Win32.Emotet.bxzo 20190104
Malwarebytes Trojan.Emotet 20190104
McAfee Emotet-FLM!B0CA02DBD01A 20190104
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20190104
Microsoft Trojan:Win32/Emotet.AC!bit 20190104
eScan Trojan.GenericKD.40904519 20190104
Palo Alto Networks (Known Signatures) generic.ml 20190105
Panda Trj/GdSda.A 20190104
Qihoo-360 HEUR/QVM20.1.4AA3.Malware.Gen 20190105
Rising Trojan.Kryptik!8.8 (CLOUD) 20190104
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOI 20190104
Symantec Trojan.Emotet 20190104
Tencent Win32.Trojan-banker.Emotet.Pezi 20190105
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_GEN.R020C0OA319 20190104
TrendMicro-HouseCall TROJ_GEN.R020C0OA319 20190104
VBA32 BScope.Trojan.Emotet 20190104
VIPRE LooksLike.Win32.Dridex.e (v) 20190104
ViRobot Trojan.Win32.Z.Emotet.159744.AJ 20190105
Webroot W32.Trojan.Emotet 20190105
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxzo 20190105
AegisLab 20190104
Alibaba 20180921
Antiy-AVL 20190105
Avast-Mobile 20190104
Avira (no cloud) 20190104
Babable 20180918
Baidu 20190104
Bkav 20190104
CAT-QuickHeal 20190104
CMC 20190104
DrWeb 20190105
F-Prot 20190104
Jiangmin 20190104
Kingsoft 20190105
MAX 20190105
NANO-Antivirus 20190104
SUPERAntiSpyware 20190102
TACHYON 20190104
TheHacker 20190104
TotalDefense 20190104
Trustlook 20190105
Yandex 20181229
Zillya 20190105
Zoner 20190105
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

Product Microsoft Money
Original name OCVT.DLL
Internal name api
File version 11.00.0716
Description ApiSet Stub DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-03 12:01:41
Entry Point 0x0000A3F0
Number of sections 8
PE sections
PE imports
GetSidSubAuthorityCount
GetFileSecurityW
EnumServicesStatusA
GetSecurityDescriptorGroup
DuplicateToken
IsTokenRestricted
EqualDomainSid
LookupPrivilegeDisplayNameA
DeregisterEventSource
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
GetFileSecurityA
GetServiceKeyNameA
LookupPrivilegeNameA
GetCurrentHwProfileW
EqualPrefixSid
IsWellKnownSid
GetClusterResourceNetworkName
GetSaveFileNameW
LineTo
GetCharWidthFloatA
FrameRgn
GetClipRgn
GetTextExtentPoint32A
GetBitmapDimensionEx
GetMetaFileA
GetOutlineTextMetricsW
GetRegionData
ExtCreateRegion
ModifyWorldTransform
GdiComment
GetObjectType
GetCharacterPlacementA
DeviceIoControl
GetVolumePathNameW
GetTempFileNameA
GetUserDefaultLangID
GetSystemInfo
EnumResourceNamesW
GetDefaultCommConfigW
GetProcessTimes
EnumUILanguagesW
VirtualProtect
LocalFlags
GetPrivateProfileStructW
FindFirstChangeNotificationW
VirtualFreeEx
GetCurrentProcess
GetPriorityClass
SwitchToThread
GetCurrentDirectoryW
GetLocaleInfoA
LocalAlloc
lstrcatA
ExpandEnvironmentStringsA
GetCurrentDirectoryA
GetCommProperties
GetLocalTime
VirtualLock
GetCurrentActCtx
GetCommandLineA
GetConsoleScreenBufferInfo
WriteProfileStringW
GetPrivateProfileStringW
GetProcessHeap
GetComputerNameExA
EnumResourceTypesA
GetCommModemStatus
FillConsoleOutputAttribute
GlobalAddAtomW
lstrcmpA
ExpandEnvironmentStringsW
VirtualUnlock
FindFirstFileExA
ReadFile
Module32Next
EnumSystemCodePagesA
lstrcmpW
FindFirstFileExW
GetStringTypeW
IsValidLanguageGroup
EscapeCommFunction
WriteProfileSectionA
GetThreadPriority
GetVersion
FindResourceW
GetConsoleWindow
GetLogicalDriveStringsW
FindClose
FindNextChangeNotification
GetCommandLineW
GetPrivateProfileSectionA
CancelSynchronousIo
lstrcpynW
ExtractAssociatedIconW
EnumerateSecurityPackagesW
DeleteSecurityContext
GetComputerObjectNameW
FreeContextBuffer
GetMessageA
GetMessagePos
GetClassInfoExW
GetCursorInfo
DrawTextExW
GetPropW
EqualRect
DefWindowProcW
SetPhysicalCursorPos
GetUserObjectInformationA
DestroyMenu
GetComboBoxInfo
DefWindowProcA
GetDoubleClickTime
GetPropA
GetClipboardData
GetWindowThreadProcessId
GetDesktopWindow
GetSystemMetrics
InsertMenuItemW
GetMenuState
IsGUIThread
ChildWindowFromPoint
GetQueueStatus
IsWindowEnabled
MessageBoxIndirectW
DestroyCaret
GetMenuItemID
InsertMenuItemA
GetCursorPos
GetClassInfoA
DestroyIcon
LoadStringA
GetKeyNameTextA
GetLastActivePopup
GetRawInputData
GetWindowPlacement
GetClassInfoW
GetProcessWindowStation
DeleteMenu
GetPriorityClipboardFormat
GetKeyboardLayoutNameW
DefDlgProcA
GetUpdateRgn
DeferWindowPos
ExcludeUpdateRgn
LoadIconW
GetWindowLongW
IsWindowVisible
DestroyWindow
GetFileVersionInfoA
GetFileVersionInfoSizeW
FindCloseUrlCache
GetUrlCacheEntryInfoExW
GetUrlCacheEntryInfoExA
DeletePortW
FindNextPrinterChangeNotification
DeletePrinterDriverW
DeletePrinterConnectionW
GetStandardColorSpaceProfileW
GetColorProfileHeader
strtol
vprintf
fputws
localeconv
fseek
fputwc
strcmp
vfprintf
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.0.0.716

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ApiSet Stub DLL

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
118784

EntryPoint
0xa3f0

OriginalFileName
OCVT.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

FileVersion
11.00.0716

TimeStamp
2019:01:03 04:01:41-08:00

FileType
Win32 EXE

PEType
PE32

InternalName
api

ProductVersion
11.00.0716

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
40960

ProductName
Microsoft Money

ProductVersionNumber
11.0.0.716

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 b0ca02dbd01ae81c8cc92c25b7482d25
SHA1 e18acfd456d3780a1658d94c54a6b4e2e45c1942
SHA256 a33ab63b768c65f75c9b21ae68a9c8490387901f7c8c00561f44a1228fff6b21
ssdeep
3072:ixCj0Fs7umlOf4dBi3sq+KKJvodgVr7kmE6gvq5y6JQx5UKEjPIrl1:WCwFsamMc7lQdUkmEofQx5juP

authentihash 3b098d0e7adeac1e4f13aada2f0ea074958ecb8ab59d3f87570e20a0f7c975fe
imphash 1b2fb3a87d6604b537e720b8a5a40ef8
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (43.3%)
Win32 Dynamic Link Library (generic) (21.7%)
Win32 Executable (generic) (14.9%)
OS/2 Executable (generic) (6.7%)
Generic Win/DOS Executable (6.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-03 04:06:23 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-03 04:06:23 UTC ( 1 month, 2 weeks ago )
File names api
RqzKxy.exe
OCVT.DLL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!