× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f4145e05ec6be100ae4b8e1a32f50afcbb291b1be507b5461510ae75b26afecf
File name: NZs89f2n9iNcBoQ.exe
Detection ratio: 47 / 70
Analysis date: 2019-01-05 02:59:16 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
Ad-Aware Trojan.Autoruns.GenericKDS.31478527 20190105
AegisLab Trojan.Win32.Emotet.4!c 20190104
AhnLab-V3 Trojan/Win32.Emotet.R250709 20190104
ALYac Trojan.Autoruns.GenericKDS.31478527 20190105
Arcabit Trojan.Autoruns.GenericS.D1E052FF 20190105
Avast Win32:BankerX-gen [Trj] 20190105
AVG Win32:BankerX-gen [Trj] 20190105
BitDefender Trojan.Autoruns.GenericKDS.31478527 20190105
ClamAV Win.Malware.Emotet-6803404-0 20190105
Comodo Malware@#3f25p8z41fwwy 20190105
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.2a97bd 20180225
Cylance Unsafe 20190105
Cyren W32/Trojan.CQZJ-6982 20190105
eGambit Unsafe.AI_Score_90% 20190105
Emsisoft Trojan.Autoruns.GenericKDS.31478527 (B) 20190105
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GOGC 20190104
F-Secure Trojan.Autoruns.GenericKDS.31478527 20190104
Fortinet W32/Kryptik.GOGC!tr 20190105
GData Trojan.Autoruns.GenericKDS.31478527 20190104
Ikarus Trojan.Autoruns.GenericKDS 20190104
Sophos ML heuristic 20181128
K7AntiVirus Trojan ( 00544d161 ) 20190104
K7GW Trojan ( 00544d161 ) 20190104
Kaspersky Trojan-Banker.Win32.Emotet.bxyh 20190104
Malwarebytes Trojan.Emotet 20190104
MAX malware (ai score=100) 20190105
McAfee RDN/Generic.grp 20190104
McAfee-GW-Edition BehavesLike.Win32.Ramnit.cc 20190104
Microsoft Trojan:Win32/Emotet.AC!bit 20190104
eScan Trojan.Autoruns.GenericKDS.31478527 20190104
Panda Trj/GdSda.A 20190104
Qihoo-360 Win32/Trojan.5a7 20190105
Rising Trojan.Kryptik!8.8 (CLOUD) 20190104
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOI 20190104
Symantec Trojan.Emotet 20190104
TACHYON Banker/W32.Emotet.151552.AZ 20190104
Tencent Win32.Trojan-banker.Emotet.Lipx 20190105
Trapmine malicious.high.ml.score 20190103
TrendMicro TROJ_FRS.VSN03A19 20190104
TrendMicro-HouseCall TROJ_FRS.VSN03A19 20190104
VBA32 BScope.Trojan.Emotet 20190104
Webroot W32.Trojan.Emotet 20190105
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bxyh 20190105
Alibaba 20180921
Antiy-AVL 20190105
Avast-Mobile 20190104
Avira (no cloud) 20190104
Babable 20180918
Baidu 20190104
Bkav 20190104
CAT-QuickHeal 20190104
CMC 20190104
DrWeb 20190105
F-Prot 20190105
Jiangmin 20190104
Kingsoft 20190105
NANO-Antivirus 20190104
Palo Alto Networks (Known Signatures) 20190105
SUPERAntiSpyware 20190102
TheHacker 20190104
TotalDefense 20190104
Trustlook 20190105
ViRobot 20190105
Yandex 20181229
Zillya 20190105
Zoner 20190105
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

Product Microsoft Money
Original name OCVT.DLL
Internal name OCVT
File version 11.00.0716
Description Microsoft OFD file conversion
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-01-03 05:00:38
Entry Point 0x00007E30
Number of sections 8
PE sections
PE imports
GetSidSubAuthority
DuplicateToken
IsTokenRestricted
EqualDomainSid
FindFirstFreeAce
GetOldestEventLogRecord
GetSecurityDescriptorOwner
GetFileSecurityA
LookupPrivilegeNameA
GetCurrentHwProfileW
DecryptFileW
EqualPrefixSid
GetClusterResourceNetworkName
GetRgnBox
GetDIBColorTable
LineTo
GetOutlineTextMetricsA
FillPath
GetClipRgn
GetWorldTransform
GetTextCharacterExtra
GetTextColor
GetOutlineTextMetricsW
GetRegionData
ExtCreateRegion
GetROP2
GetMetaFileBitsEx
GetCharWidth32W
GetTextExtentPoint32W
GetCharacterPlacementA
GetObjectType
GetTextFaceA
GetUserDefaultUILanguage
GetVolumePathNameW
GlobalFindAtomW
GetConsoleOutputCP
GetComputerNameA
GetFileAttributesA
GetCommModemStatus
GetPrivateProfileIntA
GetTickCount
GetSystemDefaultLCID
GetCommandLineW
GetACP
GetLocalTime
CancelSynchronousIo
SwitchToThread
DefineDosDeviceA
GetVolumeInformationW
GetConsoleTitleW
IsValidLanguageGroup
GetCurrentDirectoryA
EnumSystemLocalesW
GetTapePosition
lstrcpynW
GetProfileStringW
GetSystemDefaultLangID
GetFileSizeEx
DeleteVolumeMountPointW
ExpandEnvironmentStringsW
VirtualUnlock
ReadFile
DeleteAtom
IsProcessorFeaturePresent
GetProcessWorkingSetSize
GetThreadTimes
ExitThread
GetDiskFreeSpaceA
ExpandEnvironmentStringsA
EscapeCommFunction
LocalFree
GetThreadPriority
GetVersion
GetDefaultCommConfigW
GlobalHandle
GetLogicalDriveStringsW
FindNextChangeNotification
GetStringTypeExA
GetSystemWindowsDirectoryW
GetDefaultCommConfigA
VirtualAlloc
LoadRegTypeLib
GetRecordInfoFromGuids
FindExecutableW
FindExecutableA
ExtractIconExA
FreeCredentialsHandle
IsRectEmpty
EnumWindowStationsA
GetMessagePos
GetClassInfoExW
GetScrollRange
DefWindowProcW
SetPhysicalCursorPos
GetClassInfoExA
DestroyMenu
GetShellWindow
IsWindowUnicode
DrawStateW
GetPropA
LoadBitmapA
GetParent
FreeDDElParam
GetSystemMetrics
GetMessageExtraInfo
GetDlgItemTextA
IsGUIThread
ChildWindowFromPoint
GetClassLongA
LookupIconIdFromDirectoryEx
DestroyCaret
InsertMenuItemA
GetCursorPos
GetWindowRgn
DestroyIcon
DrawFocusRect
GetKeyNameTextA
GetWindowModuleFileNameW
LoadMenuIndirectA
GetDlgItem
DrawTextW
DeleteMenu
GetMenuContextHelpId
GetPriorityClipboardFormat
LoadImageW
GetKeyboardLayoutNameW
FlashWindow
GetUpdateRgn
GetMenuState
LoadCursorW
GetSystemMenu
GetFocus
GetMenuItemCount
GetUpdateRect
DefDlgProcW
DestroyWindow
GetFileVersionInfoSizeA
GetUrlCacheEntryInfoExW
GetPrintProcessorDirectoryW
srand
system
fsetpos
ftell
vfwprintf
vfprintf
ungetc
ungetwc
MkParseDisplayName
FaultInIEFeature
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
11.0.0.716

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Microsoft OFD file conversion

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
118784

EntryPoint
0x7e30

OriginalFileName
OCVT.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) Microsoft Corp. 1990-2001. All rights reserved.

FileVersion
11.00.0716

TimeStamp
2019:01:03 06:00:38+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
OCVT

ProductVersion
11.00.0716

SubsystemVersion
6.0

OSVersion
6.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
32768

ProductName
Microsoft Money

ProductVersionNumber
11.0.0.716

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 a1252e68e53594f02c985a4c84b086de
SHA1 aa876c52a97bd27bd51e88b3ec5de217a66e93f5
SHA256 f4145e05ec6be100ae4b8e1a32f50afcbb291b1be507b5461510ae75b26afecf
ssdeep
3072:Vmt8rKijGxxt4oyrTICVHx244WMF9GNfyA:NVO4/XIIxb4vFQpV

authentihash 77e1316a58bd771edd5f70795c25975098ff74397809d763ed6ffb92442c8793
imphash c17fc9162132b28cad513d3e802fe7ff
File size 148.0 KB ( 151552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (33.7%)
Win64 Executable (generic) (29.8%)
Microsoft Visual C++ compiled executable (generic) (17.8%)
Win32 Dynamic Link Library (generic) (7.1%)
Win32 Executable (generic) (4.8%)
Tags
peexe

VirusTotal metadata
First submission 2019-01-02 21:05:29 UTC ( 1 month, 2 weeks ago )
Last submission 2019-01-02 21:05:29 UTC ( 1 month, 2 weeks ago )
File names OCVT
NZs89f2n9iNcBoQ.exe
OCVT.DLL
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!