× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d6652d387e7658f8c053e73c909f57ff914564ac5b46f15c558321ffbad4f4d5
File name: gs32.exe
Detection ratio: 0 / 57
Analysis date: 2016-04-02 04:02:05 UTC ( 2 years, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160402
AegisLab 20160402
AhnLab-V3 20160401
Alibaba 20160401
ALYac 20160402
Antiy-AVL 20160402
Arcabit 20160402
Avast 20160402
AVG 20160402
Avira (no cloud) 20160402
AVware 20160402
Baidu 20160402
Baidu-International 20160401
BitDefender 20160402
Bkav 20160401
CAT-QuickHeal 20160401
ClamAV 20160402
CMC 20160401
Comodo 20160401
Cyren 20160402
DrWeb 20160402
Emsisoft 20160402
ESET-NOD32 20160402
F-Prot 20160402
F-Secure 20160402
Fortinet 20160401
GData 20160402
Ikarus 20160401
Jiangmin 20160402
K7AntiVirus 20160401
K7GW 20160402
Kaspersky 20160402
Kingsoft 20160402
Malwarebytes 20160402
McAfee 20160402
McAfee-GW-Edition 20160402
Microsoft 20160402
eScan 20160402
NANO-Antivirus 20160402
nProtect 20160401
Panda 20160401
Qihoo-360 20160402
Rising 20160402
Sophos AV 20160402
SUPERAntiSpyware 20160402
Symantec 20160331
Tencent 20160402
TheHacker 20160330
TotalDefense 20160330
TrendMicro 20160402
TrendMicro-HouseCall 20160402
VBA32 20160401
VIPRE 20160402
ViRobot 20160402
Yandex 20160316
Zillya 20160401
Zoner 20160402
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1996-12-16 17:07:38
Entry Point 0x000043A0
Number of sections 6
PE sections
Overlays
MD5 5e06bfc4f5132fecd344b95a69b3c874
File type data
Offset 52224
Size 1548504
Entropy 7.94
PE imports
LineTo
RestoreDC
SelectObject
GetTextExtentPoint32A
MoveToEx
CreatePen
SaveDC
ExtTextOutA
CreateSolidBrush
SetBkColor
DeleteObject
SetTextColor
GetLastError
HeapFree
GetStdHandle
DosDateTimeToFileTime
LCMapStringW
HeapCreate
LoadLibraryA
lstrlenA
lstrcmpiA
WaitForSingleObject
GetDriveTypeA
LCMapStringA
HeapDestroy
GetTickCount
CreateDirectoryA
FlushFileBuffers
GetEnvironmentStringsW
GlobalUnlock
IsDBCSLeadByte
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
HeapReAlloc
GetEnvironmentStrings
GetCurrentDirectoryA
lstrcatA
LockResource
SetFileTime
DeleteFileA
GetWindowsDirectoryA
UnhandledExceptionFilter
ExitProcess
FreeEnvironmentStringsW
MultiByteToWideChar
GetProcAddress
GetStartupInfoA
SetStdHandle
CompareStringW
GetCPInfo
GetFileAttributesA
GetStringTypeA
SetFilePointer
lstrcmpA
ReadFile
GetCommandLineA
lstrcpyA
GetCurrentProcess
CloseHandle
lstrcpynA
RemoveDirectoryA
GetACP
GetDiskFreeSpaceA
GetStringTypeW
FreeResource
SetEnvironmentVariableA
GetOEMCP
TerminateProcess
CreateProcessA
WideCharToMultiByte
SetHandleCount
LoadResource
WriteFile
VirtualFree
LocalFileTimeToFileTime
GetFileType
SetEndOfFile
CreateFileA
HeapAlloc
GetVersion
FindResourceA
VirtualAlloc
SetCurrentDirectoryA
GetModuleHandleA
CompareStringA
CharPrevA
UpdateWindow
EndDialog
PostQuitMessage
CopyRect
ShowWindow
DefWindowProcA
FindWindowA
SendDlgItemMessageA
GetSystemMetrics
GetWindowRect
DispatchMessageA
MoveWindow
MessageBoxA
PeekMessageA
TranslateMessage
DialogBoxParamA
GetSysColor
SetWindowTextA
LoadStringA
GetClientRect
GetDlgItem
CreateDialogParamA
RegisterClassA
InvalidateRect
wsprintfA
LoadCursorA
LoadIconA
FillRect
CharNextA
GetWindowTextA
SetCursor
DestroyWindow
Number of PE resources by type
RT_ICON 3
RT_DIALOG 2
RT_GROUP_ICON 2
RT_STRING 1
Struct(1024) 1
Number of PE resources by language
ENGLISH US 9
PE resources
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

FileTypeExtension
exe

TimeStamp
1996:12:16 18:07:38+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
33792

LinkerVersion
4.2

EntryPoint
0x43a0

InitializedDataSize
23040

SubsystemVersion
4.0

ImageVersion
0.0

OSVersion
4.0

UninitializedDataSize
0

File identification
MD5 db63613ed0c0a461da5e8ded639f3405
SHA1 008af12cdb06afb10a717ab07015162508fd2d1e
SHA256 d6652d387e7658f8c053e73c909f57ff914564ac5b46f15c558321ffbad4f4d5
ssdeep
49152:8QFst2U8sCzZddr4kyqqDk7gqKgJQs3pL:yoU8tZLGqQkBTJQsd

authentihash 49be02dd59d47edd250ef493d661ff8d6e9fb9661d4a49972d7e4b2fc2cf8233
imphash b238a3e50fadcb9c9eddb006db73388c
File size 1.5 MB ( 1600728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ 4.x (50.4%)
InstallShield setup (16.1%)
Win32 Executable MS Visual C++ (generic) (11.6%)
Win64 Executable (generic) (10.3%)
Windows screen saver (4.9%)
Tags
peexe overlay software-collection

VirusTotal metadata
First submission 2009-11-06 22:48:31 UTC ( 8 years, 7 months ago )
Last submission 2017-03-14 07:04:24 UTC ( 1 year, 3 months ago )
File names file
webgenie-guestbook-star.exe
gs32.exe
gs32.exe
file
B7556DEFD8F3C63D6CB618A6E863520086569456.exe
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Searched windows
Runtime DLLs