× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
File name: 2014_Setup.exe
Detection ratio: 0 / 56
Analysis date: 2016-04-29 20:35:39 UTC ( 2 months, 4 weeks ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20160429
AVG 20160429
AVware 20160429
Ad-Aware 20160429
AegisLab 20160429
AhnLab-V3 20160429
Alibaba 20160429
Antiy-AVL 20160429
Arcabit 20160429
Avast 20160429
Avira (no cloud) 20160429
Baidu 20160429
Baidu-International 20160429
BitDefender 20160429
Bkav 20160429
CAT-QuickHeal 20160429
CMC 20160429
ClamAV 20160429
Comodo 20160429
Cyren 20160429
DrWeb 20160429
ESET-NOD32 20160429
Emsisoft 20160429
F-Prot 20160429
F-Secure 20160429
Fortinet 20160429
GData 20160429
Ikarus 20160429
Jiangmin 20160429
K7AntiVirus 20160429
K7GW 20160429
Kaspersky 20160429
Kingsoft 20160429
Malwarebytes 20160429
McAfee 20160429
McAfee-GW-Edition 20160429
eScan 20160429
Microsoft 20160429
NANO-Antivirus 20160429
Panda 20160429
Qihoo-360 20160429
Rising 20160429
SUPERAntiSpyware 20160429
Sophos 20160429
Symantec 20160429
Tencent 20160429
TheHacker 20160429
TrendMicro 20160429
TrendMicro-HouseCall 20160429
VBA32 20160429
VIPRE 20160429
ViRobot 20160429
Yandex 20160429
Zillya 20160429
Zoner 20160429
nProtect 20160429
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) 2012 BinaryNow, Inc.

Product PDF Impress 2014
Original name setup.exe
File version 2014.0.0.0
Comments Made with MSI Factory
Signature verification Signed file, verified signature
Signing date 9:24 PM 11/6/2013
Signers
[+] BinaryNow
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 7/24/2013
Valid to 12:59 AM 9/23/2014
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 5F1F7B0533FE6AA15F0854F4EF21B3CEF3A000A3
Serial number 63 FC 07 9E FC FB FB 17 6A A2 D7 55 98 8A 35 18
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] COMODO Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2009-11-12 19:01:15
Entry Point 0x000A7063
Number of sections 4
PE sections
Overlays
MD5 debdc1095d202d09ff6949f6819239e7
File type data
Offset 1372160
Size 52226752
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
ControlService
LookupAccountSidA
RegCreateKeyExA
DeleteService
UnlockServiceDatabase
CloseServiceHandle
RegOpenKeyA
OpenProcessToken
RegSetValueExA
RegQueryValueA
QueryServiceStatus
StartServiceA
RegOpenKeyExA
RegEnumValueA
RegConnectRegistryA
GetTokenInformation
OpenThreadToken
GetUserNameA
RegEnumKeyA
RegEnumKeyExA
RegQueryInfoKeyA
EnumServicesStatusA
FreeSid
AllocateAndInitializeSid
CreateServiceA
GetServiceDisplayNameA
EqualSid
OpenSCManagerA
InitCommonControlsEx
AddFontResourceA
GetWindowExtEx
SetMapMode
GetRgnBox
SaveDC
TextOutA
CreateRectRgnIndirect
GetClipBox
GetObjectA
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SetTextColor
GetDeviceCaps
CreateFontA
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
ExtTextOutA
PtVisible
ExtSelectClipRgn
GetBkColor
ScaleViewportExtEx
RemoveFontResourceA
SelectObject
GetTextExtentPoint32A
SetWindowExtEx
GetTextColor
SetViewportExtEx
Escape
SetBkColor
DeleteObject
GetPrivateProfileSectionNamesA
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
lstrcmpW
FreeEnvironmentStringsA
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
ExpandEnvironmentStringsA
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetProcAddress
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
EnumResourceLanguagesA
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
MoveFileA
GetLogicalDriveStringsA
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
DeviceIoControl
GetModuleFileNameW
GlobalFindAtomA
ExitProcess
GetVersionExA
RemoveDirectoryA
EnumSystemLocalesA
LoadLibraryExA
GetPrivateProfileStringA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
SetFilePointer
SetFileAttributesA
GetPrivateProfileSectionA
GlobalAddAtomA
SetUnhandledExceptionFilter
ConvertDefaultLocale
GetCurrentProcess
MulDiv
UnlockFile
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
GlobalMemoryStatus
WriteConsoleA
VirtualQuery
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
SetCurrentDirectoryA
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetStartupInfoA
GetDateFormatA
GetFileSize
GlobalDeleteAtom
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetUserDefaultLCID
GetProcessHeap
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
GetTimeFormatA
GetTempFileNameA
GetComputerNameA
FindNextFileA
IsValidLocale
DuplicateHandle
GlobalLock
GlobalAlloc
GetTimeZoneInformation
CopyFileA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
SystemTimeToFileTime
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
GetCurrentProcessId
LockResource
SetFileTime
GetCurrentDirectoryA
HeapSize
GetCommandLineA
GetCurrentThread
GetSystemDefaultLangID
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetVolumeInformationA
GetACP
GetVersion
FreeResource
SizeofResource
CreateProcessA
WideCharToMultiByte
IsValidCodePage
HeapCreate
VirtualFree
Sleep
TerminateProcess
FindResourceA
VirtualAlloc
CompareStringA
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
RegisterTypeLib
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
LoadTypeLib
SysFreeString
SysAllocStringByteLen
VariantInit
SHGetFileInfoA
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
PathFindFileNameA
PathFindExtensionA
UrlUnescapeA
PathIsUNCA
PathStripToRootA
SetFocus
GetMessagePos
RedrawWindow
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
DrawTextA
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetTopWindow
MsgWaitForMultipleObjects
GetActiveWindow
GetWindowTextA
InvalidateRgn
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
EqualRect
EnumWindows
GetClassInfoExA
ShowWindow
GetPropA
GetNextDlgGroupItem
GetMenuState
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetSubMenu
CreateWindowExA
SetWindowContextHelpId
GetSysColorBrush
ReleaseDC
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
PostMessageA
BeginPaint
OffsetRect
DrawIcon
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
SetCapture
ReleaseCapture
SetWindowLongA
IsRectEmpty
RemovePropA
SetWindowTextA
CheckMenuItem
GetWindowLongA
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
ValidateRect
GetSystemMenu
GetDC
SetForegroundWindow
ExitWindowsEx
PostThreadMessageA
GetAsyncKeyState
MapDialogRect
IntersectRect
EndDialog
CopyRect
GetCapture
MessageBeep
DrawTextExA
GetWindowThreadProcessId
AppendMenuA
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
GetDesktopWindow
WinHelpA
SetRect
InvalidateRect
wsprintfA
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
HttpSendRequestA
InternetSetStatusCallback
InternetQueryDataAvailable
InternetSetOptionExA
InternetWriteFile
HttpOpenRequestA
InternetReadFile
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
InternetGetLastResponseInfoA
InternetConnectA
InternetQueryOptionA
InternetGetConnectedState
InternetErrorDlg
HttpQueryInfoA
InternetSetFilePointer
InternetCrackUrlA
mciSendCommandA
timeGetTime
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CoTaskMemFree
CoRegisterMessageFilter
CoRevokeClassObject
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoCreateInstance
CLSIDFromProgID
CoFreeUnusedLibraries
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleInitialize
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
URLDownloadToFileA
Number of PE resources by type
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_STRING 15
RT_ICON 9
RT_DIALOG 8
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 68
Debug information
ExifTool file metadata
UninitializedDataSize
0

Comments
Made with MSI Factory

InitializedDataSize
524288

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2014.0.0.0

LanguageCode
English (U.S.)

FileFlagsMask
0x0000

CharacterSet
ASCII

LinkerVersion
8.0

EntryPoint
0xa7063

OriginalFileName
setup.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) 2012 BinaryNow, Inc.

FileVersion
2014.0.0.0

TimeStamp
2009:11:12 20:01:15+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
0.0.0.0

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
BinaryNow, Inc.

CodeSize
843776

ProductName
PDF Impress 2014

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 d3e4953ff0864b3194934f29342e81c5
SHA1 50c30fba73f64ad7c779c6bbe627fc6e7fee0c75
SHA256 1764272988ef332a9ca06edd3b16c7a31eb198da509a73214e6762a25147f399
ssdeep
786432:iq6kJNd+FmKxUZ/n25mowXKIF8r8mNFJv0aR4yutv6w7v2NxZAef3UnRVomJB:iVMOmKxUZ/nDbNmv0j9V2NxaimJj

authentihash 958ac725f460790fe9cbd034578c4a2a445a1ad1e6b59373c0d4504fbc1b779a
imphash 82cca1619cfdd9eb10920ab82f346c23
File size 51.1 MB ( 53598912 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (52.9%)
Generic Win/DOS Executable (23.5%)
DOS Executable Generic (23.5%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-11-25 17:38:57 UTC ( 2 years, 8 months ago )
Last submission 2016-04-29 20:35:39 UTC ( 2 months, 4 weeks ago )
File names setup.exe
pdfimpress2014.exe
pdfimpress2014_115trial.exe
2014_Setup.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!