× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d80ba433f3a946c0af042d8bd02c88203b598d1ba83f5163618203131d4a300d
File name: gotpage.BIN
Detection ratio: 18 / 55
Analysis date: 2016-04-23 06:31:26 UTC ( 3 years ago ) View latest
Antivirus Result Update
Avast Win32:Malware-gen 20160423
Avira (no cloud) TR/Crypt.ZPACK.qztc 20160423
Bkav HW32.Packed.E8B0 20160422
Emsisoft Trojan.Win32.MalPack (A) 20160423
ESET-NOD32 Win32/Dridex.AA 20160423
GData Win32.Trojan.Agent.4QQMWC 20160423
Ikarus Trojan.Win32.Dridex 20160423
Kaspersky Trojan.Win32.Waldek.let 20160423
Malwarebytes Trojan.MalPack.RV 20160423
McAfee RDN/Generic.com 20160423
McAfee-GW-Edition BehavesLike.Win32.Virut.dh 20160423
Qihoo-360 HEUR/QVM07.1.Malware.Gen 20160423
Rising PE:Malware.Generic/QRS!1.9E2D [F] 20160423
Sophos AV Troj/Mdrop-HFA 20160423
Symantec Trojan.Cridex 20160423
TrendMicro TSPY_FAREIT.DG 20160423
TrendMicro-HouseCall TSPY_FAREIT.DG 20160423
ViRobot Trojan.Win32.S.Agent.212992.AZX[h] 20160423
Ad-Aware 20160423
AegisLab 20160423
AhnLab-V3 20160422
Alibaba 20160422
ALYac 20160423
Antiy-AVL 20160423
Arcabit 20160423
AVG 20160423
AVware 20160423
Baidu 20160422
Baidu-International 20160422
BitDefender 20160423
CAT-QuickHeal 20160422
ClamAV 20160422
CMC 20160421
Comodo 20160423
Cyren 20160422
DrWeb 20160423
F-Prot 20160422
F-Secure 20160423
Fortinet 20160423
K7AntiVirus 20160423
K7GW 20160423
Kingsoft 20160423
Microsoft 20160423
eScan 20160423
NANO-Antivirus 20160423
nProtect 20160422
Panda 20160422
SUPERAntiSpyware 20160423
Tencent 20160423
TheHacker 20160422
VBA32 20160421
VIPRE 20160423
Yandex 20160422
Zillya 20160422
Zoner 20160423
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows command line subsystem.
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-02-24 16:45:40
Entry Point 0x00025D78
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
QueryServiceConfigA
LsaNtStatusToWinError
DeleteService
RegSetValueW
LsaOpenPolicy
CloseServiceHandle
RegisterEventSourceW
DeregisterEventSource
RegDeleteValueA
NotifyBootConfigStatus
InitiateSystemShutdownA
CloseEventLog
ReadEventLogA
LsaAddAccountRights
IsTextUnicode
RegisterServiceCtrlHandlerA
RegDeleteValueW
NotifyChangeEventLog
OpenSCManagerW
BackupEventLogA
CreateServiceA
RegSetValueExA
QueryServiceLockStatusW
EnumServicesStatusW
ReadEventLogW
OpenSCManagerA
EqualSid
ImageList_GetImageCount
PropertySheetA
ImageList_SetOverlayImage
ImageList_Destroy
ImageList_AddMasked
InitializeFlatSB
ImageList_Create
ImageList_LoadImageA
FlatSB_SetScrollInfo
FlatSB_GetScrollPos
ImageList_Remove
Ord(17)
Ord(16)
ImageList_SetIconSize
FlatSB_SetScrollPos
CreatePropertySheetPageA
ImageList_ReplaceIcon
ImageList_Add
Ord(8)
GetDIBColorTable
CreateICA
GetWindowOrgEx
CreateMetaFileA
GetCurrentPositionEx
CreateRectRgnIndirect
GetBrushOrgEx
TranslateCharsetInfo
CreateCompatibleDC
SetBkMode
CreateDCW
CreateDIBSection
RealizePalette
CreateHatchBrush
GetObjectA
GetCurrentObject
GetStockObject
GetViewportExtEx
SelectClipRgn
EnumFontFamiliesExA
CreateFontW
GetFontLanguageInfo
ExtEscape
CreateRectRgn
GetTextExtentPoint32A
Polyline
SetBkColor
GetBkColor
StackWalk
SymGetLineFromAddr
_acmdln
_mbscoll
__p__fmode
_adjust_fdiv
__setusermatherr
_controlfp
exit
_XcptFilter
__getmainargs
_initterm
fopen
__p__commode
__set_app_type
SysFreeString
VarUdateFromDate
SysStringLen
VariantInit
VariantCopyInd
RasEnumDevicesA
RasGetEntryDialParamsA
RasEnumConnectionsA
RasGetErrorStringA
SHGetFileInfoA
ExtractIconA
SHBrowseForFolderW
Shell_NotifyIconW
ExtractIconW
SHGetPathFromIDListW
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
FindExecutableW
ShellExecuteExW
SHAppBarMessage
SHGetFileInfoW
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
DoEnvironmentSubstW
InternetConnectA
InternetAttemptConnect
InternetOpenW
InternetGetCookieA
InternetTimeFromSystemTime
waveOutReset
waveInOpen
midiInGetNumDevs
mmioWrite
SendDriverMessage
waveOutGetDevCapsA
mmioDescend
timeSetEvent
sndPlaySoundA
mixerGetLineControlsA
mciSendStringA
waveInGetErrorTextA
timeEndPeriod
mixerGetNumDevs
waveInGetDevCapsA
mmioSeek
waveOutGetNumDevs
mixerGetLineInfoW
joyGetPosEx
waveOutClose
waveOutMessage
joyGetPos
timeGetTime
midiInGetDevCapsA
waveInClose
midiInOpen
joySetThreshold
mmioOpenA
OpenDriver
mixerGetDevCapsA
midiOutGetNumDevs
mmioRead
waveOutPrepareHeader
mixerGetControlDetailsA
CommDlgExtendedError
GetOpenFileNameW
GetOpenFileNameA
PrintDlgW
PageSetupDlgW
GetSaveFileNameA
CoRegisterMessageFilter
Number of PE resources by type
RT_ACCELERATOR 3
RT_DIALOG 3
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH AUS 8
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileVersionNumber
0.21.78.190

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Gasps

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
180224

EntryPoint
0x25d78

OriginalFileName
Conjoint.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2010

FileVersion
105, 167, 66, 45

TimeStamp
2015:02:24 17:45:40+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Crown

ProductVersion
138, 195, 33, 58

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows command line

MachineType
Intel 386 or later, and compatibles

CompanyName
Uniblue Systems Limited

CodeSize
151552

FileSubtype
0

ProductVersionNumber
0.193.61.45

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e4e3247051146dd066dd97993ea7cadc
SHA1 64b1fa3168f719591d8e0f48212612f9ab1ad274
SHA256 d80ba433f3a946c0af042d8bd02c88203b598d1ba83f5163618203131d4a300d
ssdeep
6144:HRaELSV2JSXXm58hK6N5CdwpvCT4GolmgqUH0EC:HRHwXXk8QHdwpvoo+5E

authentihash 7692e78d22d259383315cb8f4bb7e50f34e207ad2a6d5128b8b5b253ba3be726
imphash b881969ad6cd771a7221410bb685db6e
File size 208.0 KB ( 212992 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (console) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (35.0%)
Win64 Executable (generic) (31.0%)
Windows screen saver (14.7%)
Win32 Dynamic Link Library (generic) (7.3%)
Win32 Executable (generic) (5.0%)
Tags
peexe

VirusTotal metadata
First submission 2016-04-22 13:02:44 UTC ( 3 years ago )
Last submission 2018-10-09 18:47:58 UTC ( 6 months, 2 weeks ago )
File names favicon.ico
e4e3247051146dd066dd97993ea7cadc.exe
favicon.ico.exe
radC431D.tmp
e4e3247051146dd066dd97993ea7cadc.exe
rad01F20.tmp
rad78075.tmp
d80ba433f3a946c0_gxc_3bel.ico.part
favicon.ico.bin
gotpage.BIN
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created mutexes
Opened mutexes
Opened service managers
Runtime DLLs
UDP communications