× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fc62d76945faed86fc11454c8ae1ecc3e8cbb449b8466c7f5aaa9bf45af9730c
File name: pdhemit.exe
Detection ratio: 49 / 70
Analysis date: 2018-12-22 01:07:44 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis malware 20180726
Ad-Aware Trojan.GenericKD.31419852 20181221
AhnLab-V3 Trojan/Win32.Emotet.R249151 20181221
ALYac Trojan.Agent.Emotet 20181221
Avast Win32:Malware-gen 20181221
AVG Win32:Malware-gen 20181221
BitDefender Trojan.GenericKD.31419852 20181221
Bkav HW32.Packed. 20181221
Comodo Malware@#1h3be7oebpd4c 20181221
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.7aae2d 20180225
Cylance Unsafe 20181222
Cyren W32/Arrakis.WQMJ-4050 20181221
DrWeb Trojan.EmotetENT.329 20181221
eGambit Unsafe.AI_Score_55% 20181222
Emsisoft Trojan.GenericKD.31419852 (B) 20181221
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNYD 20181222
F-Prot W32/Emotet.LE.gen!Eldorado 20181221
F-Secure Trojan.GenericKD.31419852 20181221
Fortinet W32/Agent.7D6E!tr 20181221
GData Trojan.GenericKD.31419852 20181221
Ikarus Trojan-Banker.Emotet 20181221
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.erv 20181221
K7AntiVirus Trojan ( 00543e101 ) 20181221
K7GW Trojan ( 00543e101 ) 20181221
Kaspersky Trojan-Banker.Win32.Emotet.bvmy 20181221
Malwarebytes Trojan.Emotet 20181221
McAfee RDN/PWS-Banker 20181221
McAfee-GW-Edition BehavesLike.Win32.Emotet.ch 20181221
Microsoft Trojan:Win32/Emotet 20181221
eScan Trojan.GenericKD.31419852 20181221
NANO-Antivirus Trojan.Win32.Emotet.fliqvf 20181222
Palo Alto Networks (Known Signatures) generic.ml 20181222
Panda Generic Malware 20181221
Qihoo-360 HEUR/QVM20.1.ED95.Malware.Gen 20181222
Rising Trojan.GenKryptik!8.AA55 (CLOUD) 20181222
SentinelOne (Static ML) static engine - malicious 20181011
Sophos AV Troj/Emotet-ARU 20181222
Symantec Trojan.Emotet 20181222
TACHYON Banker/W32.Emotet.131072.AU 20181221
Tencent Win32.Trojan-banker.Emotet.Eaec 20181222
Trapmine malicious.high.ml.score 20181205
TrendMicro TrojanSpy.Win32.EMOTET.THABAHAH 20181222
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABAHAH 20181222
VBA32 BScope.Trojan.Refinka 20181221
Webroot W32.Trojan.Emotet 20181222
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bvmy 20181221
AegisLab 20181221
Alibaba 20180921
Antiy-AVL 20181221
Arcabit 20181221
Avast-Mobile 20181221
Avira (no cloud) 20181221
Babable 20180918
Baidu 20181207
CAT-QuickHeal 20181221
ClamAV 20181221
CMC 20181221
Kingsoft 20181222
MAX 20181222
SUPERAntiSpyware 20181220
Symantec Mobile Insight 20181215
TheHacker 20181220
TotalDefense 20181222
Trustlook 20181222
ViRobot 20181221
Yandex 20181221
Zillya 20181219
Zoner 20181221
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright © Micros

Product Microsoft® Win
Original name MSVSBP20.DLL
Internal name Expression Builder
Description Microsoft Video Studio Mono Builder DLL
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2002-07-18 02:23:20
Entry Point 0x00003170
Number of sections 9
PE sections
PE imports
GetSecurityDescriptorGroup
SetWorldTransform
GetStockObject
SetGraphicsMode
GetSystemTimeAdjustment
GetTickCount
GetNamedPipeClientSessionId
GetCurrentProcessorNumber
FreeContextBuffer
GetKeyboardLayout
MonitorFromWindow
ChangeMenuA
TrackPopupMenu
GetWindowRect
SCardListCardsA
OleFlushClipboard
Number of PE resources by type
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
2.0

ImageVersion
5.1

FileSubtype
0

FileVersionNumber
9.0.0.2719

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Microsoft Video Studio Mono Builder DLL

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
0

EntryPoint
0x3170

OriginalFileName
MSVSBP20.DLL

MIMEType
application/octet-stream

LegalCopyright
Copyright Micros

TimeStamp
2002:07:17 19:23:20-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
Expression Builder

ProductVersion
6.1.760

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporatio

CodeSize
135168

ProductName
Microsoft Win

ProductVersionNumber
9.0.0.2719

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 1f4ab214b36d80c07898cf1a9efe7d6e
SHA1 7b491f67aae2d89c8db8147d18db65f5c2317a8b
SHA256 fc62d76945faed86fc11454c8ae1ecc3e8cbb449b8466c7f5aaa9bf45af9730c
ssdeep
1536:oDTNzdgBT3r9Gpz+QU0EwBVnEqSZiThSZ3IIEVyG4Eqi0SmiZrNceofWI:oDTNHjt/Eq8i0FIdkmBS

authentihash 47221b22392cc1580d2b72233ef2c773907dd727c6704a15df3d9d9171de1e55
imphash a87b7b6b37c4f03e36624034a7bcea99
File size 128.0 KB ( 131072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-17 14:57:58 UTC ( 2 months ago )
Last submission 2018-12-17 17:01:41 UTC ( 2 months ago )
File names 337.exe
Expression Builder
MSVSBP20.DLL
571200.exe
047128.exe
8940.exe
79.exe
pdhemit.exe
6.exe
9.exe
4.exe
728.exe
96926.exe
554.exe
YOivRArpW.exe
2731108.exe
7902.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!