× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
File name: pdfimpress2014.exe
Detection ratio: 0 / 47
Analysis date: 2013-12-03 14:53:41 UTC ( 4 months, 3 weeks ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20131203
Ad-Aware 20131203
Agnitum 20131202
AhnLab-V3 20131203
AntiVir 20131203
Antiy-AVL 20131129
Avast 20131203
Baidu-International 20131203
BitDefender 20131203
Bkav 20131129
ByteHero 20131127
CAT-QuickHeal 20131202
ClamAV 20131203
Commtouch 20131203
Comodo 20131203
DrWeb 20131203
ESET-NOD32 20131203
Emsisoft 20131203
F-Prot 20131203
Fortinet 20131203
GData 20131203
Ikarus 20131203
Jiangmin 20131203
K7AntiVirus 20131203
K7GW 20131203
Kaspersky 20131203
Kingsoft 20130829
Malwarebytes 20131203
McAfee 20131203
McAfee-GW-Edition 20131203
MicroWorld-eScan 20131203
Microsoft 20131203
NANO-Antivirus 20131203
Norman 20131203
Panda 20131203
Rising 20131203
SUPERAntiSpyware 20131203
Sophos 20131203
Symantec 20131203
TheHacker 20131202
TotalDefense 20131203
TrendMicro 20131203
TrendMicro-HouseCall 20131203
VBA32 20131203
VIPRE 20131203
ViRobot 20131203
nProtect 20131203
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright (c) 2012 BinaryNow, Inc.

Publisher BinaryNow
Product PDF Impress 2014
Original name setup.exe
File version 2014.0.0.0
Comments Made with MSI Factory
Signature verification Signed file, verified signature
Signing date 9:24 PM 11/6/2013
Signers
[+] BinaryNow
Status Valid
Valid from 1:00 AM 7/24/2013
Valid to 12:59 AM 9/23/2014
Valid usage Code Signing
Algorithm SHA1
Thumbrint 5F1F7B0533FE6AA15F0854F4EF21B3CEF3A000A3
Serial number 63 FC 07 9E FC FB FB 17 6A A2 D7 55 98 8A 35 18
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] COMODO Time Stamping Signer
Status Valid
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] UTN-USERFirst-Object
Status Valid
Valid from 9:09 AM 6/7/2005
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm SHA1
Thumbrint 8AD5C9987E6F190BD6F5416E2DE44CCD641D8CDA
Serial number 42 1A F2 94 09 84 19 1F 52 0A 4B C6 24 26 A7 4B
[+] USERTrust
Status Valid
Valid from 11:48 AM 5/30/2000
Valid to 11:48 AM 5/30/2020
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm SHA1
Thumbrint 02FAF3E291435468607857694DF5E45B68851868
Serial number 01
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-12 19:01:15
Entry Point 0x000A7063
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
LookupAccountSidA
RegCreateKeyExA
DeleteService
UnlockServiceDatabase
CloseServiceHandle
RegOpenKeyA
OpenProcessToken
RegSetValueExA
RegQueryValueA
QueryServiceStatus
StartServiceA
RegOpenKeyExA
RegEnumValueA
RegConnectRegistryA
GetTokenInformation
OpenThreadToken
GetUserNameA
RegEnumKeyA
RegEnumKeyExA
RegQueryInfoKeyA
EnumServicesStatusA
FreeSid
AllocateAndInitializeSid
CreateServiceA
GetServiceDisplayNameA
EqualSid
OpenSCManagerA
InitCommonControlsEx
AddFontResourceA
GetWindowExtEx
SetMapMode
GetRgnBox
SaveDC
TextOutA
CreateRectRgnIndirect
GetClipBox
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SetTextColor
GetDeviceCaps
CreateFontA
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
ExtTextOutA
PtVisible
ExtSelectClipRgn
GetBkColor
ScaleViewportExtEx
RemoveFontResourceA
SelectObject
GetTextExtentPoint32A
SetWindowExtEx
GetTextColor
SetViewportExtEx
Escape
SetBkColor
DeleteObject
GetPrivateProfileSectionNamesA
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
lstrcmpW
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetProcAddress
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
EnumResourceLanguagesA
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
MoveFileA
GetLogicalDriveStringsA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
DeviceIoControl
GetModuleFileNameW
GlobalFindAtomA
ExitProcess
GetVersionExA
RemoveDirectoryA
EnumSystemLocalesA
LoadLibraryExA
GetPrivateProfileStringA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
SetFileAttributesA
GetPrivateProfileSectionA
GlobalAddAtomA
SetUnhandledExceptionFilter
ConvertDefaultLocale
GetCurrentProcess
MulDiv
UnlockFile
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
GlobalMemoryStatus
WriteConsoleA
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetDateFormatA
GetFileSize
GlobalDeleteAtom
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetTimeFormatA
GetTempFileNameA
GetComputerNameA
FindNextFileA
IsValidLocale
DuplicateHandle
GlobalLock
GlobalAlloc
GetTimeZoneInformation
CopyFileA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetVolumeInformationA
GetACP
GetVersion
FreeResource
SizeofResource
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
TerminateProcess
FindResourceA
VirtualAlloc
CompareStringA
Ord(12)
Ord(161)
Ord(10)
Ord(420)
Ord(184)
Ord(185)
Ord(6)
Ord(16)
Ord(7)
Ord(4)
Ord(150)
Ord(163)
Ord(8)
Ord(2)
Ord(9)
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
PathFindFileNameA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
SetFocus
GetMessagePos
RedrawWindow
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetTopWindow
MsgWaitForMultipleObjects
GetActiveWindow
GetWindowTextA
InvalidateRgn
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
GetClassInfoExA
ShowWindow
GetPropA
GetNextDlgGroupItem
GetMenuState
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetSubMenu
CreateWindowExA
SetWindowContextHelpId
GetSysColorBrush
ReleaseDC
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
PostMessageA
BeginPaint
OffsetRect
DrawIcon
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
SetCapture
ReleaseCapture
SetWindowLongA
IsRectEmpty
RemovePropA
SetWindowTextA
CheckMenuItem
GetWindowLongA
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
ValidateRect
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
GetAsyncKeyState
MapDialogRect
IntersectRect
EndDialog
CopyRect
GetCapture
MessageBeep
DrawTextExA
GetWindowThreadProcessId
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
GetDesktopWindow
WinHelpA
SetRect
InvalidateRect
wsprintfA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpSendRequestA
InternetSetStatusCallback
InternetQueryDataAvailable
InternetSetOptionExA
InternetWriteFile
HttpOpenRequestA
InternetReadFile
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
InternetGetLastResponseInfoA
InternetConnectA
InternetQueryOptionA
InternetGetConnectedState
InternetErrorDlg
HttpQueryInfoA
InternetSetFilePointer
InternetCrackUrlA
mciSendCommandA
timeGetTime
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CoTaskMemFree
CoRegisterMessageFilter
CoRevokeClassObject
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoCreateInstance
CLSIDFromProgID
CoFreeUnusedLibraries
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
URLDownloadToFileA
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 15
RT_ICON 9
RT_DIALOG 8
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 68
ExifTool file metadata
UninitializedDataSize
0

Comments
Made with MSI Factory

InitializedDataSize
524288

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2014.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
ASCII

LinkerVersion
8.0

FileOS
Win32

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2012 BinaryNow, Inc.

FileVersion
2014.0.0.0

TimeStamp
2009:11:12 20:01:15+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
0.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

OriginalFilename
setup.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
BinaryNow, Inc.

CodeSize
843776

ProductName
PDF Impress 2014

ProductVersionNumber
0.0.0.0

EntryPoint
0xa7063

ObjectFileType
Executable application

File identification
MD5 d3e4953ff0864b3194934f29342e81c5
SHA1 50c30fba73f64ad7c779c6bbe627fc6e7fee0c75
SHA256 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
ssdeep
786432:iq6kJNd+FmKxUZ/n25mowXKIF8r8mNFJv0aR4yutv6w7v2NxZAef3UnRVomJB:iVMOmKxUZ/nDbNmv0j9V2NxaimJj

File size 51.1 MB ( 53598912 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.4%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed

VirusTotal metadata
First submission 2013-11-25 17:38:57 UTC ( 4 months, 4 weeks ago )
Last submission 2013-12-03 14:53:41 UTC ( 4 months, 3 weeks ago )
File names pdfimpress2014.exe
setup.exe
pdfimpress2014_115trial.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!