× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 387ecfbfc8de712a39da800e2dd55d7ea05af562851cd0e0cd6c69baee80b99c
File name: 387ecfbfc8de712a39da800e2dd55d7ea05af562851cd0e0cd6c69baee80b99c
Detection ratio: 41 / 67
Analysis date: 2018-08-31 00:00:35 UTC ( 5 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware Trojan.GenericKD.40427665 20180830
AhnLab-V3 Trojan/Win32.Emotet.R235716 20180830
ALYac Trojan.GenericKD.40427665 20180831
Antiy-AVL Trojan/Win32.Azden 20180831
Arcabit Trojan.Generic.D268E091 20180831
Avast Win32:Malware-gen 20180831
AVG Win32:Malware-gen 20180831
Baidu Win32.Trojan.WisdomEyes.16070401.9500.9999 20180830
BitDefender Trojan.GenericKD.40427665 20180830
CrowdStrike Falcon (ML) malicious_confidence_90% (D) 20180723
Cylance Unsafe 20180831
Cyren W32/Kryptik.FN.gen!Eldorado 20180830
Emsisoft Trojan.Emotet (A) 20180830
Endgame malicious (high confidence) 20180730
ESET-NOD32 a variant of Win32/Kryptik.GKFU 20180830
F-Prot W32/Kryptik.FN.gen!Eldorado 20180830
F-Secure Trojan.GenericKD.40427665 20180830
Fortinet W32/PossibleThreat 20180830
Ikarus Trojan.Win32.Krypt 20180830
Sophos ML heuristic 20180717
K7AntiVirus Riskware ( 0040eff71 ) 20180829
K7GW Riskware ( 0040eff71 ) 20180830
Kaspersky Trojan-Banker.Win32.Emotet.bboe 20180830
Malwarebytes Trojan.Emotet 20180830
McAfee RDN/Generic.grp 20180830
McAfee-GW-Edition RDN/Generic.grp 20180830
Microsoft Trojan:Win32/Emotet.AC!bit 20180830
eScan Trojan.GenericKD.40427665 20180830
Palo Alto Networks (Known Signatures) generic.ml 20180831
Panda Trj/GdSda.A 20180830
Qihoo-360 HEUR/QVM20.1.6E2D.Malware.Gen 20180831
Rising Trojan.Fuerboos!8.EFC8 (CLOUD) 20180830
SentinelOne (Static ML) static engine - malicious 20180830
Sophos AV Mal/EncPk-ANX 20180831
Symantec Trojan.Emotet 20180830
Tencent Win32.Trojan-banker.Emotet.Swuw 20180831
TrendMicro TSPY_EMOTET.THHBHAH 20180830
TrendMicro-HouseCall TSPY_EMOTET.THHBHAH 20180830
ViRobot Trojan.Win32.Z.Emotet.459776.C 20180830
Webroot W32.Trojan.Emotet 20180831
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.bboe 20180830
AegisLab 20180830
Alibaba 20180713
Avast-Mobile 20180830
Avira (no cloud) 20180831
AVware 20180823
Babable 20180822
Bkav 20180830
CAT-QuickHeal 20180830
ClamAV 20180830
CMC 20180830
Comodo 20180830
Cybereason 20180225
DrWeb 20180830
eGambit 20180831
Jiangmin 20180830
Kingsoft 20180831
MAX 20180831
NANO-Antivirus 20180830
SUPERAntiSpyware 20180830
Symantec Mobile Insight 20180829
TACHYON 20180830
TheHacker 20180829
TotalDefense 20180830
Trustlook 20180831
VBA32 20180830
VIPRE 20180830
Yandex 20180830
Zillya 20180830
Zoner 20180830
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name kbd106n.dll
Internal name kbd106n
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description JP Japanese Keyboard Layout for 106
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-08-26 00:48:38
Entry Point 0x0001FDCD
Number of sections 4
PE sections
PE imports
CryptSetProvParam
LockServiceDatabase
CertCreateCertificateChainEngine
CryptSIPRemoveProvider
GetTextFaceA
CreateIpForwardEntry
SetFileAttributesA
SuspendThread
OpenFile
GetModuleHandleA
GetTimeZoneInformation
FreeEnvironmentStringsW
ReOpenFile
ZombifyActCtx
IsBadWritePtr
DeleteTimerQueueTimer
GlobalMemoryStatusEx
lstrcatW
acmStreamPrepareHeader
GetActiveObject
VarBoolFromStr
glEvalMesh2
glGetString
RpcNetworkIsProtseqValidA
RpcStringFreeA
SetupDiGetDeviceRegistryPropertyA
SetupDefaultQueueCallbackW
ShellExecuteW
GetWindowThreadProcessId
SendMessageA
GetInputState
GetDesktopWindow
SubtractRect
CreateWindowExW
LookupIconIdFromDirectoryEx
UnloadKeyboardLayout
DlgDirListComboBoxA
RealGetWindowClassA
InternetSetOptionA
waveOutSetPitch
Number of PE resources by type
RT_VERSION 1
Number of PE resources by language
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
JP Japanese Keyboard Layout for 106

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
330240

EntryPoint
0x1fdcd

OriginalFileName
kbd106n.dll

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2018:08:26 02:48:38+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
kbd106n

ProductVersion
6.1.7600.16385

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
133632

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 5976a3c21a549410e1bcf58c0d49373d
SHA1 fedf89c6e41b363bce07e03dd83bb6f9120b78cc
SHA256 387ecfbfc8de712a39da800e2dd55d7ea05af562851cd0e0cd6c69baee80b99c
ssdeep
6144:DgEYnVDUNDXE95RGLWY7qScJsaaHzKWRKql7ejP4:DgEYnVD6DXE95Q4JnaH

authentihash 32d8c726b8c917580374858fcd78e7c088792ce37ed1f2c2df9894560c4d7335
imphash f8266ff1d7764332d5ba7a3b43741e18
File size 449.0 KB ( 459776 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Dynamic Link Library (generic) (38.4%)
Win32 Executable (generic) (26.3%)
OS/2 Executable (generic) (11.8%)
Generic Win/DOS Executable (11.6%)
DOS Executable Generic (11.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-08-26 00:52:19 UTC ( 6 months ago )
Last submission 2018-08-26 00:52:19 UTC ( 6 months ago )
File names kbd106n
kbd106n.dll
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!