× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dd396dc451bb71cb3fbbefdeb48f01b62a44bc29ab35b394963aa581d53b3642
File name: 3hZ8t.exe
Detection ratio: 27 / 69
Analysis date: 2019-01-05 02:55:00 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
AegisLab Trojan.Win32.Emotet.4!c 20181231
Avast FileRepMalware 20181231
AVG FileRepMalware 20181231
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.902bff 20180225
Cylance Unsafe 20190105
eGambit Unsafe.AI_Score_99% 20190105
Endgame malicious (high confidence) 20181108
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20181231
MAX malware (ai score=100) 20190105
McAfee Artemis!1B057C636A49 20181231
McAfee-GW-Edition BehavesLike.Win32.Generic.cc 20181231
Microsoft Trojan:Win32/Emotet.AC!bit 20181230
Palo Alto Networks (Known Signatures) generic.ml 20190105
Panda Trj/RnkBend.A 20181230
Qihoo-360 HEUR/QVM20.1.4AA3.Malware.Gen 20190105
Rising Trojan.Kryptik!8.8 (CLOUD) 20181231
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/Generic-S 20181231
Symantec ML.Attribute.HighConfidence 20181230
Tencent Win32.Trojan-banker.Emotet.Dxdd 20190105
Trapmine malicious.high.ml.score 20181205
VIPRE LooksLike.Win32.Dridex.e (v) 20181231
Webroot W32.Trojan.Emotet 20190105
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20181231
Ad-Aware 20181231
Alibaba 20180921
ALYac 20181231
Antiy-AVL 20181231
Arcabit 20181231
Avast-Mobile 20181230
Avira (no cloud) 20181230
Babable 20180918
Baidu 20181207
BitDefender 20181231
Bkav 20181227
CAT-QuickHeal 20181230
ClamAV 20181231
CMC 20181230
Comodo 20181231
Cyren 20181231
DrWeb 20181231
Emsisoft 20181231
ESET-NOD32 20181231
F-Prot 20181231
F-Secure 20181231
Fortinet 20181231
GData 20181231
Ikarus 20181230
Jiangmin 20181231
K7AntiVirus 20181231
K7GW 20181230
Kingsoft 20190105
eScan 20181231
NANO-Antivirus 20181231
SUPERAntiSpyware 20181226
TACHYON 20181231
TheHacker 20181230
TotalDefense 20181230
TrendMicro 20181231
TrendMicro-HouseCall 20181231
Trustlook 20190105
VBA32 20181229
ViRobot 20181231
Yandex 20181229
Zillya 20181228
Zoner 20181231
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

Product Microsoft Money
Original name OCVT.DLL
Internal name api
File version 11.00.0716
Description ApiSet Stub DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-03 12:00:17
Entry Point 0x0000A510
Number of sections 8
PE sections
PE imports
GetSidSubAuthorityCount
GetFileSecurityW
EnumServicesStatusA
DeregisterEventSource
DuplicateToken
IsTokenRestricted
EqualDomainSid
LookupPrivilegeDisplayNameA
GetSecurityDescriptorGroup
GetSecurityDescriptorLength
GetSecurityDescriptorOwner
GetFileSecurityA
GetServiceKeyNameA
LookupPrivilegeNameA
GetCurrentHwProfileW
EqualPrefixSid
IsWellKnownSid
GetClusterResourceNetworkName
GetSaveFileNameW
LineTo
GetCharWidthFloatA
FrameRgn
GetClipRgn
GetTextExtentPoint32A
GetBitmapDimensionEx
GetMetaFileA
GetOutlineTextMetricsW
GetRegionData
ExtCreateRegion
ModifyWorldTransform
GdiComment
GetObjectType
GetCharacterPlacementA
DeviceIoControl
GetVolumePathNameW
GetTempFileNameA
GetUserDefaultLangID
GetSystemInfo
GetCommModemStatus
GetDefaultCommConfigW
GetProcessTimes
EnumUILanguagesW
VirtualProtect
GetCommandLineW
VirtualUnlock
GetPrivateProfileStructW
FindFirstChangeNotificationW
CancelSynchronousIo
GetCurrentProcess
GetPriorityClass
SwitchToThread
GetCurrentDirectoryW
GetLocaleInfoA
LocalAlloc
lstrcatA
IsValidLanguageGroup
GetCurrentDirectoryA
GetCommProperties
GetPrivateProfileSectionA
GetLocalTime
VirtualLock
GetCurrentActCtx
GetCommandLineA
GetConsoleScreenBufferInfo
FillConsoleOutputAttribute
GetPrivateProfileStringW
GetProcessHeap
GetComputerNameExA
EnumResourceTypesA
EnumResourceNamesW
GlobalAddAtomW
LocalFlags
ExpandEnvironmentStringsW
lstrcmpA
FindFirstFileExA
ReadFile
Module32Next
EnumSystemCodePagesA
lstrcmpW
FindFirstFileExW
GetStringTypeW
ExpandEnvironmentStringsA
EscapeCommFunction
WriteProfileStringW
WriteProfileSectionA
GetThreadPriority
FindResourceW
GetConsoleWindow
GetLogicalDriveStringsW
FindClose
FindNextChangeNotification
VirtualFreeEx
GetVersion
lstrcpynW
ExtractAssociatedIconW
EnumerateSecurityPackagesW
GetComputerObjectNameW
FreeContextBuffer
DeleteSecurityContext
GetMessageA
GetMessagePos
GetClassInfoExW
GetCursorInfo
DrawTextExW
GetPropW
EqualRect
DefWindowProcW
SetPhysicalCursorPos
GetUserObjectInformationA
DestroyMenu
GetComboBoxInfo
DefWindowProcA
GetClassInfoA
GetPropA
GetClipboardData
GetWindowThreadProcessId
GetMenuState
GetSystemMetrics
InsertMenuItemW
IsGUIThread
ChildWindowFromPoint
GetKeyNameTextA
IsWindowEnabled
GetProcessWindowStation
DestroyCaret
DeferWindowPos
GetMenuItemID
InsertMenuItemA
GetCursorPos
GetDoubleClickTime
DestroyIcon
LoadStringA
GetQueueStatus
GetLastActivePopup
GetRawInputData
GetWindowPlacement
GetClassInfoW
MessageBoxIndirectW
DeleteMenu
GetPriorityClipboardFormat
GetKeyboardLayoutNameW
DefDlgProcA
GetUpdateRgn
GetDesktopWindow
ExcludeUpdateRgn
LoadIconW
GetWindowLongW
IsWindowVisible
DestroyWindow
GetFileVersionInfoA
GetFileVersionInfoSizeW
FindCloseUrlCache
GetUrlCacheEntryInfoExW
GetUrlCacheEntryInfoExA
DeletePortW
FindNextPrinterChangeNotification
DeletePrinterDriverW
DeletePrinterConnectionW
GetStandardColorSpaceProfileW
GetColorProfileHeader
strtol
vprintf
fputws
localeconv
fseek
fputwc
strcmp
vfprintf
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.0.0.716

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
ApiSet Stub DLL

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
118784

EntryPoint
0xa510

OriginalFileName
OCVT.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

FileVersion
11.00.0716

TimeStamp
2019:01:03 13:00:17+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
api

ProductVersion
11.00.0716

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
40960

ProductName
Microsoft Money

ProductVersionNumber
11.0.0.716

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 1b057c636a4902aadbea47447b426025
SHA1 68ba34d902bff077780b01bba518c6ab8b3de76e
SHA256 dd396dc451bb71cb3fbbefdeb48f01b62a44bc29ab35b394963aa581d53b3642
ssdeep
3072:zULy+L6dCSOUl0S/OeGPVtJLJLbfi/a5f4Mo2:z+LSzEfFDGatK

authentihash 56e55c1660e4366c0b5cde5b2d94acf794da51a9cec003d5b2a04e9f5df5f3b8
imphash b24217176543006cffb885fa95fa3585
File size 156.0 KB ( 159744 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (43.3%)
Win32 Dynamic Link Library (generic) (21.7%)
Win32 Executable (generic) (14.9%)
OS/2 Executable (generic) (6.7%)
Generic Win/DOS Executable (6.6%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-03 04:03:58 UTC ( 1 month, 2 weeks ago )
Last submission 2019-02-14 09:57:39 UTC ( 5 days, 3 hours ago )
File names 33482424.EXE
3hZ8t.exe
api
OCVT.DLL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!