× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cd7ceeb8f03bf685e4364ccea1bec55454a2243e02164fe0ec9ae40d466e0da
File name: goScreenCaptureSetup.exe
Detection ratio: 2 / 58
Analysis date: 2017-01-26 01:31:16 UTC ( 2 years ago ) View latest
Antivirus Result Update
Jiangmin TrojanDownloader.MSIL.nks 20170126
Zillya Downloader.Banload.Win32.74115 20170125
Ad-Aware 20170126
AegisLab 20170125
AhnLab-V3 20170125
Alibaba 20170122
ALYac 20170125
Antiy-AVL 20170125
Arcabit 20170126
Avast 20170126
AVG 20170126
Avira (no cloud) 20170125
AVware 20170126
Baidu 20170125
BitDefender 20170126
Bkav 20170123
CAT-QuickHeal 20170125
ClamAV 20170125
CMC 20170125
Comodo 20170125
CrowdStrike Falcon (ML) 20161024
Cyren 20170126
DrWeb 20170126
Emsisoft 20170126
ESET-NOD32 20170126
F-Prot 20170126
F-Secure 20170126
Fortinet 20170126
GData 20170126
Ikarus 20170125
Sophos ML 20170111
K7AntiVirus 20170125
K7GW 20170126
Kaspersky 20170126
Kingsoft 20170126
Malwarebytes 20170126
McAfee 20170126
McAfee-GW-Edition 20170126
Microsoft 20170126
eScan 20170126
NANO-Antivirus 20170126
nProtect 20170125
Panda 20170125
Qihoo-360 20170126
Rising 20170125
Sophos AV 20170125
SUPERAntiSpyware 20170126
Symantec 20170125
Tencent 20170126
TheHacker 20170125
TotalDefense 20170125
TrendMicro 20170126
TrendMicro-HouseCall 20170126
Trustlook 20170126
VBA32 20170125
VIPRE 20170125
ViRobot 20170125
WhiteArmor 20170123
Yandex 20170125
Zoner 20170125
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Signature verification Signed file, verified signature
Signing date 5:03 AM 7/20/2016
Signers
[+] cc Devnet Ltd
Status Valid
Issuer DigiCert SHA2 Assured ID Code Signing CA
Valid from 11:00 PM 04/25/2016
Valid to 11:00 AM 04/30/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint F07184A78C9C86C31D3C8D8732A8BBDB2CDB326F
Serial number 0D C3 57 14 16 1D 93 E6 87 5A 0F F5 0F C6 00 35
[+] DigiCert SHA2 Assured ID Code Signing CA
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 11:00 AM 10/22/2013
Valid to 11:00 AM 10/22/2028
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 92C1588E85AF2201CE7915E8538B492F605B80C6
Serial number 04 09 18 1B 5F D5 BB 66 75 53 43 B5 6F 95 50 08
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Counter signers
[+] DigiCert Timestamp Responder
Status Valid
Issuer DigiCert Assured ID CA-1
Valid from 11:00 PM 10/21/2014
Valid to 11:00 PM 10/21/2024
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 614D271D9102E30169822487FDE5DE00A352B01D
Serial number 03 01 9A 02 3A FF 58 B1 6B D6 D5 EA E6 17 F0 66
[+] DigiCert Assured ID CA-1
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2021
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing
Algorithm sha1RSA
Thumbrint 19A09B5A36F4DD99727DF783C17A51231A56C117
Serial number 06 FD F9 03 96 03 AD EA 00 0A EB 3F 27 BB BA 1B
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-02-17 02:33:57
Entry Point 0x0000CCF4
Number of sections 5
PE sections
Overlays
MD5 42efb16014ab372d79c63d8da53d17ba
File type data
Offset 1929216
Size 7256
Entropy 7.16
PE imports
GetDeviceCaps
CreateDCA
DeleteDC
CreateFontIndirectA
SelectObject
GetTextExtentPoint32A
SetTextAlign
ExtTextOutA
DeleteObject
SetBkColor
GetBkColor
SetTextColor
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
SetErrorMode
_llseek
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
_lopen
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
GetEnvironmentVariableA
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetSystemTime
InitializeCriticalSection
CopyFileA
ExitProcess
FlushFileBuffers
RemoveDirectoryA
GetVolumeInformationA
LoadLibraryExA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
_lclose
SetUnhandledExceptionFilter
GetSystemDirectoryA
MoveFileExA
TerminateProcess
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetVersion
LeaveCriticalSection
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GlobalLock
_lread
GetProcessHeap
FindFirstFileA
CreateFileMappingA
FindNextFileA
GlobalMemoryStatus
GetProcAddress
CreateFileW
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
DosDateTimeToFileTime
LCMapStringW
HeapCreate
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
GetModuleFileNameA
GetEnvironmentStrings
GetCurrentProcessId
SetFileTime
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
UnmapViewOfFile
VirtualFree
GetLongPathNameA
Sleep
VirtualAlloc
Number of PE resources by type
RT_STRING 7
RT_ICON 4
RT_DIALOG 2
RT_MANIFEST 1
WZ_MANIFEST 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 16
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
2016:02:16 18:33:57-08:00

FileType
Win32 EXE

PEType
PE32

CodeSize
86016

LinkerVersion
8.0

ImageFileCharacteristics
No relocs, Executable, 32-bit

EntryPoint
0xccf4

InitializedDataSize
135168

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 f1503f1f97244ce54f551820982885e0
SHA1 63103a033ac455be24c9d295be675a4b758f9f19
SHA256 3cd7ceeb8f03bf685e4364ccea1bec55454a2243e02164fe0ec9ae40d466e0da
ssdeep
49152:byVPV0yPkqlMsz/HQJkUUgdNgxO+Jk8lauacPhuGKvcW:bWdkNC/HQJPNg9kpuac5uPcW

authentihash ec2416a15982cf405c3873ed593c59649c3d09b875f1bf77d38f5baec930cbdb
imphash cc000e0a56358759c95f653af1246259
File size 1.8 MB ( 1936472 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (31.5%)
Win64 Executable (generic) (27.9%)
Winzip Win32 self-extracting archive (generic) (23.2%)
Win32 Dynamic Link Library (generic) (6.6%)
Win32 Executable (generic) (4.5%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-11-20 06:08:19 UTC ( 2 years, 3 months ago )
Last submission 2018-07-13 05:51:09 UTC ( 7 months, 1 week ago )
File names goScreenCaptureSetup.exe
goScreenCaptureSetup.exe
932067
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Copied files
Deleted files
Created processes
Opened mutexes
Runtime DLLs
UDP communications