× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
File name: pdfimpress2014.exe
Detection ratio: 0 / 56
Analysis date: 2015-10-03 07:03:23 UTC ( 4 months, 1 week ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20151003
AVG 20151003
AVware 20151003
Ad-Aware 20151003
AegisLab 20151002
Agnitum 20150930
AhnLab-V3 20151002
Alibaba 20150927
Antiy-AVL 20151003
Arcabit 20151003
Avast 20151003
Avira 20151003
Baidu-International 20151002
BitDefender 20151003
Bkav 20151002
ByteHero 20151003
CAT-QuickHeal 20151002
CMC 20151002
ClamAV 20151002
Comodo 20151003
Cyren 20151003
DrWeb 20151003
ESET-NOD32 20151002
Emsisoft 20151003
F-Prot 20150929
F-Secure 20151003
Fortinet 20151003
GData 20151003
Ikarus 20151003
Jiangmin 20151001
K7AntiVirus 20151003
K7GW 20151003
Kaspersky 20151003
Kingsoft 20151003
Malwarebytes 20151003
McAfee 20151003
McAfee-GW-Edition 20151002
MicroWorld-eScan 20151003
Microsoft 20151003
NANO-Antivirus 20151003
Panda 20151002
Qihoo-360 20151003
Rising 20151002
SUPERAntiSpyware 20151003
Sophos 20151003
Symantec 20151002
Tencent 20151003
TheHacker 20151002
TrendMicro 20151003
TrendMicro-HouseCall 20151003
VBA32 20151001
VIPRE 20151003
ViRobot 20151003
Zillya 20151002
Zoner 20151003
nProtect 20151002
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) 2012 BinaryNow, Inc.

Publisher BinaryNow
Product PDF Impress 2014
Original name setup.exe
File version 2014.0.0.0
Comments Made with MSI Factory
Signature verification Signed file, verified signature
Signing date 9:24 PM 11/6/2013
Signers
[+] BinaryNow
Status Certificate out of its validity period
Valid from 1:00 AM 7/24/2013
Valid to 12:59 AM 9/23/2014
Valid usage Code Signing
Algorithm SHA1
Thumbprint 5F1F7B0533FE6AA15F0854F4EF21B3CEF3A000A3
Serial number 63 FC 07 9E FC FB FB 17 6A A2 D7 55 98 8A 35 18
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] COMODO Time Stamping Signer
Status Certificate out of its validity period
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] USERTrust
Status Valid
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-12 19:01:15
Entry Point 0x000A7063
Number of sections 4
PE sections
Overlays
MD5 debdc1095d202d09ff6949f6819239e7
File type data
Offset 1372160
Size 52226752
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
LookupAccountSidA
RegCreateKeyExA
DeleteService
UnlockServiceDatabase
CloseServiceHandle
RegOpenKeyA
OpenProcessToken
RegSetValueExA
RegQueryValueA
QueryServiceStatus
StartServiceA
RegOpenKeyExA
RegEnumValueA
RegConnectRegistryA
GetTokenInformation
OpenThreadToken
GetUserNameA
RegEnumKeyA
RegEnumKeyExA
RegQueryInfoKeyA
EnumServicesStatusA
FreeSid
AllocateAndInitializeSid
CreateServiceA
GetServiceDisplayNameA
EqualSid
OpenSCManagerA
InitCommonControlsEx
AddFontResourceA
GetWindowExtEx
SetMapMode
GetRgnBox
SaveDC
TextOutA
CreateRectRgnIndirect
GetClipBox
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SetTextColor
GetDeviceCaps
CreateFontA
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
ExtTextOutA
PtVisible
ExtSelectClipRgn
GetBkColor
ScaleViewportExtEx
RemoveFontResourceA
SelectObject
GetTextExtentPoint32A
SetWindowExtEx
GetTextColor
SetViewportExtEx
Escape
SetBkColor
DeleteObject
GetPrivateProfileSectionNamesA
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
lstrcmpW
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetProcAddress
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
EnumResourceLanguagesA
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
MoveFileA
GetLogicalDriveStringsA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
DeviceIoControl
GetModuleFileNameW
GlobalFindAtomA
ExitProcess
GetVersionExA
RemoveDirectoryA
EnumSystemLocalesA
LoadLibraryExA
GetPrivateProfileStringA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
SetFileAttributesA
GetPrivateProfileSectionA
GlobalAddAtomA
SetUnhandledExceptionFilter
ConvertDefaultLocale
GetCurrentProcess
MulDiv
UnlockFile
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
GlobalMemoryStatus
WriteConsoleA
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetDateFormatA
GetFileSize
GlobalDeleteAtom
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetTimeFormatA
GetTempFileNameA
GetComputerNameA
FindNextFileA
IsValidLocale
DuplicateHandle
GlobalLock
GlobalAlloc
GetTimeZoneInformation
CopyFileA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetVolumeInformationA
GetACP
GetVersion
FreeResource
SizeofResource
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
TerminateProcess
FindResourceA
VirtualAlloc
CompareStringA
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
RegisterTypeLib
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
LoadTypeLib
SysFreeString
SysAllocStringByteLen
VariantInit
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
PathFindFileNameA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
SetFocus
GetMessagePos
RedrawWindow
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetTopWindow
MsgWaitForMultipleObjects
GetActiveWindow
GetWindowTextA
InvalidateRgn
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
GetClassInfoExA
ShowWindow
GetPropA
GetNextDlgGroupItem
GetMenuState
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetSubMenu
CreateWindowExA
SetWindowContextHelpId
GetSysColorBrush
ReleaseDC
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
PostMessageA
BeginPaint
OffsetRect
DrawIcon
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
SetCapture
ReleaseCapture
SetWindowLongA
IsRectEmpty
RemovePropA
SetWindowTextA
CheckMenuItem
GetWindowLongA
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
ValidateRect
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
GetAsyncKeyState
MapDialogRect
IntersectRect
EndDialog
CopyRect
GetCapture
MessageBeep
DrawTextExA
GetWindowThreadProcessId
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
GetDesktopWindow
WinHelpA
SetRect
InvalidateRect
wsprintfA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpSendRequestA
InternetSetStatusCallback
InternetQueryDataAvailable
InternetSetOptionExA
InternetWriteFile
HttpOpenRequestA
InternetReadFile
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
InternetGetLastResponseInfoA
InternetConnectA
InternetQueryOptionA
InternetGetConnectedState
InternetErrorDlg
HttpQueryInfoA
InternetSetFilePointer
InternetCrackUrlA
mciSendCommandA
timeGetTime
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CoTaskMemFree
CoRegisterMessageFilter
CoRevokeClassObject
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoCreateInstance
CLSIDFromProgID
CoFreeUnusedLibraries
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
URLDownloadToFileA
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 15
RT_ICON 9
RT_DIALOG 8
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 68
Debug information
ExifTool file metadata
UninitializedDataSize
0

Comments
Made with MSI Factory

InitializedDataSize
524288

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2014.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
ASCII

LinkerVersion
8.0

EntryPoint
0xa7063

OriginalFileName
setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2012 BinaryNow, Inc.

FileVersion
2014.0.0.0

TimeStamp
2009:11:12 20:01:15+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
0.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
BinaryNow, Inc.

CodeSize
843776

ProductName
PDF Impress 2014

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 d3e4953ff0864b3194934f29342e81c5
SHA1 50c30fba73f64ad7c779c6bbe627fc6e7fee0c75
SHA256 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
ssdeep
786432:iq6kJNd+FmKxUZ/n25mowXKIF8r8mNFJv0aR4yutv6w7v2NxZAef3UnRVomJB:iVMOmKxUZ/nDbNmv0j9V2NxaimJj

authentihash 958ac725f460790fe9cbd034578c4a2a445a1ad1e6b59373c0d4504fbc1b779a
imphash 82cca1619cfdd9eb10920ab82f346c23
File size 51.1 MB ( 53598912 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.4%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-11-25 17:38:57 UTC ( 2 years, 2 months ago )
Last submission 2015-10-03 07:03:23 UTC ( 4 months, 1 week ago )
File names pdfimpress2014.exe
setup.exe
pdfimpress2014_115trial.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!