× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 822ab83028bf7d05aad1354ed09c9f829a2c6d9385231b21dd667b45410b3357
File name: 3x2aVEdNm.exe
Detection ratio: 15 / 66
Analysis date: 2018-09-19 05:08:52 UTC ( 5 months ago ) View latest
Antivirus Result Update
Avast FileRepMalware 20180919
AVG FileRepMalware 20180919
CAT-QuickHeal Trojan.Emotet.X4 20180918
CrowdStrike Falcon (ML) malicious_confidence_80% (D) 20180723
Endgame malicious (high confidence) 20180730
Sophos ML heuristic 20180717
Kaspersky UDS:DangerousObject.Multi.Generic 20180919
McAfee GenericRXGM-EB!5769C77A6928 20180919
Microsoft Trojan:Win32/Emotet.AC!bit 20180918
Palo Alto Networks (Known Signatures) generic.ml 20180919
Qihoo-360 HEUR/QVM20.1.F6A7.Malware.Gen 20180919
Rising Trojan.Emotet!8.B95 (TFE:dGZlOgPzU/m1BsHLfQ) 20180919
Symantec ML.Attribute.HighConfidence 20180918
Webroot W32.Trojan.Emotet 20180919
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180919
Ad-Aware 20180917
AegisLab 20180919
AhnLab-V3 20180918
Alibaba 20180713
ALYac 20180919
Antiy-AVL 20180919
Arcabit 20180919
Avast-Mobile 20180918
Avira (no cloud) 20180919
AVware 20180919
Babable 20180918
Baidu 20180914
BitDefender 20180919
Bkav 20180919
ClamAV 20180919
CMC 20180918
Comodo 20180919
Cybereason 20180225
Cyren 20180919
DrWeb 20180919
eGambit 20180919
Emsisoft 20180919
ESET-NOD32 20180919
F-Prot 20180919
F-Secure 20180919
Fortinet 20180919
GData 20180919
Ikarus 20180918
Jiangmin 20180919
K7AntiVirus 20180918
K7GW 20180919
Kingsoft 20180919
Malwarebytes 20180919
MAX 20180919
McAfee-GW-Edition 20180919
eScan 20180919
NANO-Antivirus 20180919
Panda 20180918
SentinelOne (Static ML) 20180830
Sophos AV 20180919
SUPERAntiSpyware 20180907
Symantec Mobile Insight 20180918
TACHYON 20180919
Tencent 20180919
TheHacker 20180918
TrendMicro 20180919
TrendMicro-HouseCall 20180919
Trustlook 20180919
VBA32 20180918
VIPRE 20180919
ViRobot 20180918
Yandex 20180917
Zillya 20180918
Zoner 20180918
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 1998 - 2003 GTek Technologies Ltd.

Product GTCoach
Internal name keyboard
File version 1, 0, 0, 14
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-09-19 11:31:08
Entry Point 0x00021C57
Number of sections 8
PE sections
PE imports
InitiateSystemShutdownA
MakeSelfRelativeSD
EnumServicesStatusA
GetUserNameW
IsValidSid
GetSidLengthRequired
InitiateSystemShutdownExW
DeregisterEventSource
LogonUserA
GetWindowsAccountDomainSid
DeleteAce
IsValidSecurityDescriptor
AVIStreamStart
CM_Get_DevNode_Custom_PropertyW
ImageList_SetBkColor
FindTextA
GetFileTitleW
CryptMsgSignCTL
CryptStringToBinaryA
GetTextMetricsW
GetPixelFormat
DeleteEnhMetaFile
GetWindowOrgEx
GetBkMode
FloodFill
GetTextMetricsA
GetClipBox
GetRgnBox
GetWindowExtEx
GetViewportOrgEx
GetPixel
GetLayout
GetObjectA
PaintRgn
GetCharacterPlacementW
GetTextExtentExPointI
GetTextColor
GetSystemPaletteEntries
GetBitmapDimensionEx
GetTextExtentPointW
ExtTextOutW
DescribePixelFormat
FrameRgn
EqualRgn
GetPath
GetStockObject
GetOutlineTextMetricsW
GetDIBits
GdiFlush
GetCharWidth32W
GetSystemPaletteUse
GetStretchBltMode
Escape
DeleteMetaFile
GetVolumePathNameW
GetLargestConsoleWindowSize
GetExitCodeProcess
GetThreadTimes
GlobalFindAtomA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
FillConsoleOutputCharacterW
GetModuleFileNameA
GetLocalTime
GetVolumePathNamesForVolumeNameW
DeleteCriticalSection
GetAtomNameA
GetVolumeInformationA
GetCurrentDirectoryW
GetSystemDefaultLCID
GetConsoleTitleW
GetCompressedFileSizeW
GetDateFormatW
GetPrivateProfileStructW
FreeEnvironmentStringsW
GetCompressedFileSizeA
GetUserDefaultLCID
GetThreadContext
DebugBreak
GetLocaleInfoW
SetCommConfig
ExpandEnvironmentStringsW
GetTempPathA
GetCPInfo
GetSystemDirectoryW
VirtualLock
DeleteVolumeMountPointW
GetCommTimeouts
GlobalAddAtomA
GetCurrentProcess
GetVolumeNameForVolumeMountPointW
FindVolumeMountPointClose
FindNextFileA
WritePrivateProfileStructW
GetStringTypeW
ExpandEnvironmentStringsA
EscapeCommFunction
WriteProfileStringW
GetThreadSelectorEntry
LocalSize
GetEnvironmentVariableA
GlobalHandle
VirtualFree
GetFileAttributesW
_lopen
GetTickCount
ExitProcess
GetProcAddress
GetModuleHandleA
MprConfigInterfaceGetInfo
NetApiBufferReallocate
NetLocalGroupAddMembers
NetLocalGroupGetMembers
GetErrorInfo
SafeArrayAllocDescriptorEx
RasGetEntryPropertiesA
FindExecutableW
FindExecutableA
ExtractAssociatedIconW
SHRegWriteUSValueW
StrStrW
GetComputerObjectNameW
EnumerateSecurityPackagesW
FreeCredentialsHandle
EmptyClipboard
IsWinEventHookInstalled
DrawTextA
GetScrollRange
GetScrollPos
DefWindowProcA
DestroyMenu
GetMessageW
GetShellWindow
GetUserObjectInformationW
GetCaretPos
LoadMenuW
GetClipboardSequenceNumber
OemToCharBuffA
DestroyIcon
GetWindowRect
GetCursorInfo
MessageBoxIndirectA
IsWindowUnicode
GetDlgItemTextA
GetMessageExtraInfo
CharLowerW
GetWindowTextLengthW
GetKeyNameTextW
GetDlgItemInt
GetTabbedTextExtentW
ReleaseDC
GetClassInfoA
GetClipCursor
DefFrameProcW
LoadStringA
GetLastActivePopup
GetRawInputData
IsZoomed
GetClassInfoW
GetKeyboardLayoutList
BringWindowToTop
FrameRect
InvalidateRect
InsertMenuA
GetWindowLongA
FindWindowExA
DestroyCaret
LoadIconA
GetKeyboardLayoutNameW
FillRect
DefDlgProcA
ModifyMenuW
DestroyAcceleratorTable
GetMenuState
CopyAcceleratorTableW
FindWindowExW
GetWindowRgnBox
GetWindowTextA
EnumWindowStationsW
GetMenuStringW
GetUrlCacheEntryInfoExW
FindNextUrlCacheEntryExW
GetUrlCacheEntryInfoW
DefDriverProc
GetPrinterDriverDirectoryW
DeletePrinter
CryptCATCDFEnumAttributes
CryptCATGetMemberInfo
GetColorProfileHeader
fputc
fputws
fseek
fsetpos
fputwc
setvbuf
vfprintf
strncmp
GetRunningObjectTable
MkParseDisplayName
CoInternetIsFeatureEnabledForUrl
Number of PE resources by type
RT_VERSION 1
WAVE 1
Number of PE resources by language
ENGLISH US 2
PE resources
Debug information
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.0.0.14

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
266240

EntryPoint
0x21c57

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 1998 - 2003 GTek Technologies Ltd.

FileVersion
1, 0, 0, 14

TimeStamp
2018:09:19 13:31:08+02:00

FileType
Win32 EXE

PEType
PE32

InternalName
keyboard

ProductVersion
3, 0, 0, 1

SubsystemVersion
5.0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
GTek Technologies Ltd.

CodeSize
0

ProductName
GTCoach

ProductVersionNumber
3.0.0.1

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 5769c77a6928150847b62793fbd6a908
SHA1 d8a1b00da16bbd314740f2451757db4b276440cd
SHA256 822ab83028bf7d05aad1354ed09c9f829a2c6d9385231b21dd667b45410b3357
ssdeep
3072:3j1tFpt8+elT7aruIQa4Epc4p8H3CdQhpLakLa3nS6bxpStZMp8PhsxAKKYiPnu4:3j1XbpyFazz8y+vWkLaX7xISPK9ZL

authentihash 5fbd32edb4954709731b9dcf7e116991033a67beb703570a36ff02ea2e1d40f2
imphash 972e9ad8e652b83134a1c699ede5274b
File size 394.0 KB ( 403456 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe

VirusTotal metadata
First submission 2018-09-19 04:34:48 UTC ( 5 months ago )
Last submission 2018-10-06 09:47:53 UTC ( 4 months, 1 week ago )
File names eCsd3O2eezSs.exe
4mUYKcTrHqJl.exe
3x2aVEdNm.exe
keyboard
NKdLJBzs.exe
6o6XRrHg.exe
xGAeiMcr.exe
KazTEbfjJmcB.exe
VVDZXA1UXGD.exe
qYkZJpoP.exe
VXgCV4Vt.exe
MVPa4clD0.exe
palloada.exe
1LUA0Zqplb.exe
sTtzVFR05.exe
output.114089078.txt
Usx0ilZo.exe
tOQXfJhpgH8H.exe
PxzXxyyuw.exe
bfisVY5AN9l.exe
hqxIV3jt.exe
09sYW06LY.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!