× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 08e70028a3909ee8fd01103af7e59cecef1e07e8ae4481b7a67e270a2222aa6b
File name: 08e70028a3909ee8fd01103af7e59cecef1e07e8ae4481b7a67e270a2222aa6b
Detection ratio: 51 / 71
Analysis date: 2019-01-06 18:39:32 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20181227
Ad-Aware Trojan.GenericKD.40844398 20190106
AhnLab-V3 Trojan/Win32.Emotet.R249242 20190106
ALYac Trojan.GenericKD.40844398 20190106
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190106
Arcabit Trojan.Generic.D26F3C6E 20190106
Avast Win32:BankerX-gen [Trj] 20190106
AVG Win32:BankerX-gen [Trj] 20190106
BitDefender Trojan.GenericKD.40844398 20190106
Bkav HW32.Packed. 20190104
CAT-QuickHeal Trojan.Emotet.R6 20190106
Comodo Malware@#r02v6pnjqio3 20190106
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20181022
Cybereason malicious.2f6ec5 20180225
Cylance Unsafe 20190106
Cyren W32/Emotet.LE.gen!Eldorado 20190106
DrWeb Trojan.EmotetENT.329 20190106
Emsisoft Trojan.Emotet (A) 20190106
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/Kryptik.GNYD 20190106
F-Prot W32/Emotet.LE.gen!Eldorado 20190106
F-Secure Trojan.GenericKD.40844398 20190106
Fortinet W32/GenKryptik.CUML!tr 20190106
GData Trojan.GenericKD.40844398 20190106
Ikarus Trojan-Banker.Emotet 20190106
Sophos ML heuristic 20181128
Jiangmin Trojan.Banker.Emotet.etu 20190106
K7AntiVirus Trojan ( 00543f7b1 ) 20190106
K7GW Trojan ( 00543f7b1 ) 20190106
Kaspersky Trojan-Banker.Win32.Emotet.bvur 20190106
Malwarebytes Trojan.Emotet 20190106
McAfee Emotet-FJX!76F22DD694FB 20190106
McAfee-GW-Edition BehavesLike.Win32.Emotet.cc 20190106
Microsoft Trojan:Win32/Emotet.CJ 20190106
eScan Trojan.GenericKD.40844398 20190106
NANO-Antivirus Trojan.Win32.EmotetENT.fljysj 20190106
Palo Alto Networks (Known Signatures) generic.ml 20190106
Panda Trj/Genetic.gen 20190106
Qihoo-360 HEUR/QVM20.1.F62D.Malware.Gen 20190106
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20190106
SentinelOne (Static ML) static engine - malicious 20181223
Sophos AV Mal/EncPk-AOG 20190106
Symantec Trojan.Gen.2 20190105
Tencent Win32.Trojan-banker.Emotet.Akpe 20190106
Trapmine malicious.high.ml.score 20190103
TrendMicro TrojanSpy.Win32.EMOTET.THABAIAH 20190106
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THABAIAH 20190106
VBA32 BScope.TrojanBanker.Emotet 20190104
Webroot W32.Trojan.Emotet 20190106
Zillya Trojan.Emotet.Win32.9529 20190105
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bvur 20190106
AegisLab 20190106
Alibaba 20180921
Avast-Mobile 20190106
Avira (no cloud) 20190106
AVware 20180925
Baidu 20190104
ClamAV 20190106
CMC 20190105
eGambit 20190106
Kingsoft 20190106
MAX 20190106
SUPERAntiSpyware 20190102
TACHYON 20190106
TheHacker 20190104
TotalDefense 20190106
Trustlook 20190106
VIPRE 20190106
ViRobot 20190106
Yandex 20181229
Zoner 20190106
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Cor

Product Microsoft®
Original name kbdth3.dll
Internal name kbdth3 (3.13)
Description Stoh Levadihote (non-ShiftLock) Keyboa
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2002-07-18 02:23:20
Entry Point 0x000029F0
Number of sections 9
PE sections
PE imports
GetSecurityDescriptorRMControl
GetTickCount64
GetNamedPipeClientProcessId
GetCurrentProcess
GetProcessHandleCount
GetDiskFreeSpaceExW
WaitForMultipleObjectsEx
QueryActCtxW
GetProcessId
GetDynamicTimeZoneInformation
GetMenuItemCount
GetMessageExtraInfo
TrackPopupMenu
AddClipboardFormatListener
g_rgSCardRawPci
OleFlushClipboard
Number of PE resources by type
RT_BITMAP 1
RT_VERSION 1
Number of PE resources by language
JAPANESE DEFAULT 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
2.0

ImageVersion
5.1

FileSubtype
0

FileVersionNumber
9.0.0.2719

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Stoh Levadihote (non-ShiftLock) Keyboa

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Windows, Latin1

InitializedDataSize
0

EntryPoint
0x29f0

OriginalFileName
kbdth3.dll

MIMEType
application/octet-stream

LegalCopyright
Microsoft Cor

TimeStamp
2002:07:18 04:23:20+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
kbdth3 (3.13)

ProductVersion
6.1.76

SubsystemVersion
5.0

OSVersion
6.0

FileOS
Windows 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporat

CodeSize
135168

ProductName
Microsoft

ProductVersionNumber
9.0.0.2719

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Execution parents
File identification
MD5 76f22dd694fb6dabb83761a13289bf5b
SHA1 35ccc542f6ec5d4db4a0691c26a712d7820a8744
SHA256 08e70028a3909ee8fd01103af7e59cecef1e07e8ae4481b7a67e270a2222aa6b
ssdeep
3072:rMqs1k2L6trR0Qnkzd+EOaf2vNVoyGIG:oqs1KV0QnKd+V82Vay

authentihash f8ce17048995da68a404518a281e6a63f8d86f2eed614d78d38f60f6a11c1926
imphash 02ed0ce5fae92ceb8b8b65af2b521ca4
File size 124.0 KB ( 126976 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-12-19 03:33:03 UTC ( 2 months ago )
Last submission 2018-12-19 03:34:00 UTC ( 2 months ago )
File names 134.exe
Y5qG_mWUtgc.exe
3_lz4.exe
kbdth3 (3.13)
kbdth3.dll
hE_1Cebzm.exe
rlC_a9R2b2Qom.exe
mv9_mTEY.exe
zeWZwVL_Ix.exe
knwTOriFo.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!