× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 568c5c14f72bfd8adfcd22f49932a52830572e8d7e0871b3b2632c5d1f7d201c
File name: 00c7693681d111c0b74121ea513abe91
Detection ratio: 45 / 51
Analysis date: 2014-04-26 15:50:24 UTC ( 1 year, 2 months ago )
Antivirus Result Update
AVG Generic32.QXK 20140426
Ad-Aware Gen:Variant.Kazy.156788 20140426
Agnitum Worm.Cridex!nlsoedaCABQ 20140425
AhnLab-V3 Trojan/Win32.Bublik 20140426
AntiVir TR/Kazy.156788 20140426
Antiy-AVL Trojan/Win32.Bublik 20140426
Avast Win32:Injector-BOP [Trj] 20140426
Baidu-International Trojan.Win32.Bublik.AXBR 20140426
BitDefender Gen:Variant.Kazy.156788 20140426
Bkav W32.Clod5c3.Trojan.dec5 20140426
CAT-QuickHeal Trojan.Coremhead 20140426
CMC Trojan.Win32.Bublik!O 20140424
Commtouch W32/Trojan.JVUY-4109 20140426
Comodo TrojWare.Win32.Kryptik.AYQE 20140426
DrWeb Trojan.Necurs.277 20140426
ESET-NOD32 Win32/Cridex.AA 20140426
Emsisoft Trojan.Win32.Bublik (A) 20140426
F-Secure Gen:Variant.Kazy.156788 20140426
Fortinet W32/Krypt.AXIU!tr 20140426
GData Gen:Variant.Kazy.156788 20140426
Ikarus Trojan.Win32.Bublik 20140426
Jiangmin Trojan/Bublik.hdk 20140426
K7AntiVirus Riskware ( 0040eff71 ) 20140426
K7GW Riskware ( 0040eff71 ) 20140426
Kaspersky Trojan.Win32.Bublik.ajyb 20140426
Kingsoft Win32.Troj.Generic.z.(kcloud) 20140426
Malwarebytes Trojan.FakeMS.ED 20140426
McAfee PWS-Zbot-FASE!00C7693681D1 20140426
McAfee-GW-Edition PWS-Zbot-FASE!00C7693681D1 20140425
MicroWorld-eScan Gen:Variant.Kazy.156788 20140426
Microsoft Worm:Win32/Cridex.E 20140426
NANO-Antivirus Trojan.Win32.Bublik.blvzkw 20140426
Norman Cridex.EK 20140426
Panda Trj/Hexas.HEU 20140426
Qihoo-360 HEUR/Malware.QVM20.Gen 20140426
Rising PE:Malware.XPACK!1.9C22 20140426
SUPERAntiSpyware Trojan.Agent/Gen-Necurs 20140426
Sophos Troj/Zbot-EHY 20140426
Symantec Trojan.Bebloh 20140426
TheHacker Trojan/Cridex.aa 20140425
TrendMicro WORM_CRIDEX.GG 20140426
TrendMicro-HouseCall WORM_CRIDEX.GG 20140426
VBA32 BScope.Malware-Cryptor.SB.01798 20140425
VIPRE Trojan.Win32.Cridex.c (v) 20140425
nProtect Trojan/W32.Bublik.152064.B 20140425
AegisLab 20140426
ByteHero 20140426
ClamAV 20140426
F-Prot 20140426
TotalDefense 20140426
ViRobot 20140426
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
© ?????????? ??????????. ??? ????? ????????.

Publisher ?????????? ??????????
Product ???????????? ??????? Microsoft® Windows®
Original name GRPCONV.EXE
Internal name GrpConv
File version 5.1.2600.5512 (xpsp.080413-2105)
Description ????????? ????? ?????????? ???????? Windows
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-03-22 11:24:35
Link date 12:24 PM 3/22/2013
Entry Point 0x00004570
Number of sections 5
PE sections
PE imports
RegOpenKeyExW
LocalLock
lstrlenA
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetModuleFileNameA
GetFileSize
LoadLibraryA
GetACP
GetCurrentProcess
GetWindowsDirectoryW
GetCurrentProcessId
lstrcatA
UnhandledExceptionFilter
GetStartupInfoW
GetProcAddress
GetModuleHandleA
ReadFile
SetUnhandledExceptionFilter
lstrcpyA
GetStartupInfoA
CloseHandle
GetSystemTimeAsFileTime
GetSystemDirectoryA
MoveFileExA
LocalUnlock
LocalFree
TerminateProcess
CreateFileW
lstrcatW
CreateFileA
ExitProcess
GetCurrentThreadId
LocalAlloc
LoadIconW
LoadIconA
_cexit
__p__fmode
_c_exit
_except_handler3
_acmdln
_exit
__p__commode
malloc
free
_controlfp
exit
_XcptFilter
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
sprintf
__set_app_type
Number of PE resources by type
RT_STRING 2
RT_ICON 1
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
RUSSIAN 6
ExifTool file metadata
SubsystemVersion
5.0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
5.1.2600.5512

UninitializedDataSize
0

LanguageCode
Russian

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
137216

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
. .

FileVersion
5.1.2600.5512 (xpsp.080413-2105)

TimeStamp
2013:03:22 12:24:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
GrpConv

FileAccessDate
2014:04:26 16:51:45+01:00

ProductVersion
5.1.2600.5512

FileDescription
Windows

OSVersion
5.0

FileCreateDate
2014:04:26 16:51:45+01:00

OriginalFilename
GRPCONV.EXE

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
14336

ProductName
Microsoft Windows

ProductVersionNumber
5.1.2600.5512

EntryPoint
0x4570

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 00c7693681d111c0b74121ea513abe91
SHA1 a2431ae0ed6b914641f5b0dd7ed535e3d99dfb74
SHA256 568c5c14f72bfd8adfcd22f49932a52830572e8d7e0871b3b2632c5d1f7d201c
ssdeep
3072:l0664bBnKbefU1gpt/b1ODdAhI0egPciFkRAOYnlZ5L:l08dm1YNSa

imphash 86cd8c929c7b8f58fcfdd0b45d5646c7
File size 148.5 KB ( 152064 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe

VirusTotal metadata
First submission 2013-03-22 15:22:24 UTC ( 2 years, 3 months ago )
Last submission 2014-04-26 15:50:24 UTC ( 1 year, 2 months ago )
File names about.exe
6561360.exe
GrpConv
00c7693681d111c0b74121ea513abe91
8003594.exe
00c7693681d111c0b74121ea513abe91
info.exe
readme.exe
calc.exe
KB00990274.exe
report20130321.PDF.exe
contacts.exe
GRPCONV.EXE
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.