× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1779466ab8404032949769e50fd3fae983ad795e2e4d10da0e49d74c23a7c99a
File name: PDFill.exe
Detection ratio: 0 / 68
Analysis date: 2018-01-14 02:50:33 UTC ( 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20180114
AegisLab 20180114
AhnLab-V3 20180113
Alibaba 20180113
ALYac 20180114
Antiy-AVL 20180114
Arcabit 20180114
Avast 20180114
Avast-Mobile 20180113
AVG 20180114
Avira (no cloud) 20180113
AVware 20180103
Baidu 20180112
BitDefender 20180114
Bkav 20180112
CAT-QuickHeal 20180113
ClamAV 20180113
CMC 20180111
Comodo 20180114
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180114
Cyren 20180114
DrWeb 20180114
eGambit 20180114
Emsisoft 20180114
Endgame 20171130
ESET-NOD32 20180113
F-Prot 20180114
F-Secure 20180114
Fortinet 20180114
GData 20180114
Ikarus 20180113
Sophos ML 20170914
Jiangmin 20180114
K7AntiVirus 20180113
K7GW 20180112
Kaspersky 20180114
Kingsoft 20180114
Malwarebytes 20180114
MAX 20180114
McAfee 20180114
McAfee-GW-Edition 20180113
Microsoft 20180113
eScan 20180113
NANO-Antivirus 20180113
nProtect 20180114
Palo Alto Networks (Known Signatures) 20180114
Panda 20180113
Qihoo-360 20180114
Rising 20180114
SentinelOne (Static ML) 20171224
Sophos AV 20180114
SUPERAntiSpyware 20180113
Symantec 20180113
Symantec Mobile Insight 20180112
Tencent 20180114
TheHacker 20180114
TotalDefense 20180113
TrendMicro 20180113
TrendMicro-HouseCall 20180114
Trustlook 20180114
VBA32 20180112
VIPRE 20180114
ViRobot 20180113
Webroot 20180114
WhiteArmor 20180110
Yandex 20180112
Zillya 20180112
ZoneAlarm by Check Point 20180114
Zoner 20180114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) PlotSoft LLC

Product PDFill PDF Editor Professional
Original name PDFill_PDF_Editor_Professional.exe
Internal name PDFill_PDF_Editor_Professional
File version 14.0
Description Create, Edit, Save PDF; Edit PDF file without Adobe Acrobat
Signature verification Signed file, verified signature
Signing date 3:40 PM 12/2/2017
Signers
[+] PlotSoft LLC
Status Valid
Issuer COMODO RSA Code Signing CA
Valid from 1:00 AM 2/15/2017
Valid to 12:59 AM 2/16/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 3F86A68B72421AACB6D26D66734FB98283836928
Serial number 41 3B 26 37 B6 56 7E 8D CC 2E CF DF 9B 1B 3B 52
[+] COMODO RSA Code Signing CA
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 5/9/2013
Valid to 12:59 AM 5/9/2028
Valid usage Code Signing
Algorithm sha384RSA
Thumbprint B69E752BBE88B4458200A7C0F4F5B3CCE6F35B47
Serial number 2E 7C 87 CC 0E 93 4A 52 FE 94 FD 1C B7 CD 34 AF
[+] COMODO SECURE™
Status Valid
Issuer COMODO RSA Certification Authority
Valid from 1:00 AM 1/19/2010
Valid to 12:59 AM 1/19/2038
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha384RSA
Thumbprint AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
Serial number 4C AA F9 CA DB 63 6F E0 1F F7 4E D8 5B 03 86 9D
Counter signers
[+] COMODO SHA-1 Time Stamping Signer
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 12/31/2015
Valid to 7:40 PM 7/9/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 03A5B14663EB12023091B84A6D6A68BC871DE66B
Serial number 16 88 F0 39 25 5E 63 8E 69 14 39 07 E6 33 0B
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-06-26 12:46:25
Entry Point 0x0002F790
Number of sections 5
PE sections
Overlays
MD5 e5685203334dfc3b9e188b4167df0a2a
File type application/x-ms-dos-executable
Offset 305152
Size 19842832
Entropy 8.00
PE imports
RegDeleteKeyA
LookupPrivilegeValueA
RegCloseKey
RegDeleteValueA
OpenServiceA
RegQueryValueExA
AdjustTokenPrivileges
LookupAccountSidA
RegCreateKeyExA
RegCreateKeyA
UnlockServiceDatabase
SetSecurityDescriptorDacl
LookupAccountNameA
RegOpenKeyA
EqualSid
OpenProcessToken
QueryServiceStatus
RegOpenKeyExA
SetEntriesInAclA
GetTokenInformation
CloseServiceHandle
GetSecurityDescriptorDacl
LockServiceDatabase
GetUserNameA
RegEnumKeyExA
RegQueryInfoKeyA
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegSetValueExA
StartServiceA
RegEnumValueA
OpenSCManagerA
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
GetObjectA
GetDeviceCaps
DeleteDC
SetBkMode
GetStockObject
CreateFontIndirectA
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
DebugBreak
GetLocalTime
DeleteCriticalSection
GetDiskFreeSpaceA
GetLocaleInfoA
LocalAlloc
lstrcatA
FindResourceExA
GetTempPathA
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
EnumResourceLanguagesA
HeapReAlloc
SetFileAttributesA
GetExitCodeProcess
LocalFree
MoveFileA
ConnectNamedPipe
GetLogicalDriveStringsA
GetEnvironmentVariableA
LoadResource
FindClose
InterlockedDecrement
FormatMessageA
GetStringTypeExA
OutputDebugStringA
GetSystemTime
InitializeCriticalSection
GetUserDefaultLangID
CopyFileA
ExitProcess
GetVersionExA
RemoveDirectoryA
FreeLibrary
LoadLibraryExA
MultiByteToWideChar
FlushInstructionCache
GetModuleHandleA
CreateThread
GetExitCodeThread
GetCurrentProcess
MulDiv
GetSystemDirectoryA
TerminateProcess
GlobalAlloc
SearchPathA
SetEndOfFile
GetVersion
LeaveCriticalSection
SetCurrentDirectoryA
CreateToolhelp32Snapshot
HeapFree
EnterCriticalSection
Process32First
TerminateThread
lstrcmpiA
SetEvent
QueryPerformanceCounter
GetTickCount
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
Process32Next
GetStartupInfoA
GetFileSize
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GlobalLock
GetProcessHeap
lstrcmpA
FindFirstFileA
lstrcpyA
ResetEvent
GetTempFileNameA
FindNextFileA
GlobalMemoryStatus
GetProcAddress
CreateEventA
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
GetSystemInfo
lstrlenA
GlobalFree
GetThreadLocale
GlobalUnlock
IsDBCSLeadByte
VirtualQuery
CreateNamedPipeA
GetModuleFileNameA
GetShortPathNameA
SizeofResource
GetCurrentProcessId
LockResource
lstrlenW
HeapSize
GetCommandLineA
GetSystemDefaultLangID
RaiseException
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
GetACP
GetCurrentThreadId
CreateProcessA
Sleep
FindResourceA
VirtualAlloc
VarUI4FromStr
OleLoadPicture
ShellExecuteExA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
PathFileExistsA
SetFocus
EmptyClipboard
GetForegroundWindow
GetParent
RedrawWindow
GetScrollRange
GetWindowTextA
EndDialog
LoadMenuA
EnumWindows
GetScrollPos
KillTimer
GetDlgCtrlID
DestroyMenu
ShowWindow
DefWindowProcA
FindWindowA
MessageBeep
GetPropA
MapWindowPoints
GetWindowThreadProcessId
GetSystemMetrics
IsWindow
PostQuitMessage
GetWindowRect
DispatchMessageA
EnableWindow
SetDlgItemTextA
PostMessageA
LoadImageA
SetPropA
MessageBoxA
PeekMessageA
SetWindowLongA
wvsprintfA
TranslateMessage
DialogBoxParamA
GetWindow
GetDC
ReleaseDC
SystemParametersInfoA
RemovePropA
SetWindowTextA
LoadStringA
SetClipboardData
IsWindowVisible
SendMessageA
DestroyWindow
GetClientRect
CreateWindowExA
GetDlgItem
GetWindowLongA
CreateDialogParamA
SetWindowPos
EnableMenuItem
ScreenToClient
InvalidateRect
CloseClipboard
GetSubMenu
GetWindowTextLengthA
SetTimer
LoadIconA
TrackPopupMenu
GetActiveWindow
CharNextA
GetDesktopWindow
CallWindowProcA
GetSystemMenu
MsgWaitForMultipleObjects
SetForegroundWindow
UnregisterClassA
ModifyMenuA
ExitWindowsEx
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoTaskMemAlloc
StgCreateDocfileOnILockBytes
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
CreateILockBytesOnHGlobal
Number of PE resources by type
RT_DIALOG 12
RT_ICON 12
RT_STRING 10
RTF_FILE 2
RT_MENU 2
IMAGE_FILE 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 43
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
7.1

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
14.0.0.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
108032

EntryPoint
0x2f790

OriginalFileName
PDFill_PDF_Editor_Professional.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) PlotSoft LLC

FileVersion
14.0

TimeStamp
2013:06:26 13:46:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
PDFill_PDF_Editor_Professional

ProductVersion
14.0

FileDescription
Create, Edit, Save PDF; Edit PDF file without Adobe Acrobat

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
PlotSoft LLC

CodeSize
196096

ProductName
PDFill PDF Editor Professional

ProductVersionNumber
14.0.0.0

FileTypeExtension
exe

ObjectFileType
Dynamic link library

Compressed bundles
File identification
MD5 e6cc4ec68ad951d07a7779e0fd659c4f
SHA1 6569a78af6825c86169b506c7749aebb16f8f854
SHA256 1779466ab8404032949769e50fd3fae983ad795e2e4d10da0e49d74c23a7c99a
ssdeep
393216:f8MCCzlvPu1NWicyQxfOAASjJdAvL9eckzBigupNqWeGaGg+o9M:blO1NL2mAnNmL9eb3urZom

authentihash 12781b1c4183c3c33df6617d2dd4c687eeb1aade06b7a00f42c37faa3ae70f1e
imphash 0a31740e2b1b0697e2722a3dadbc8a3a
File size 19.2 MB ( 20147984 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-12-04 04:28:10 UTC ( 7 months, 2 weeks ago )
Last submission 2018-07-10 14:48:54 UTC ( 1 week ago )
File names PDFill_PDF_Editor_Professional.exe
pdfill-6144-jetelecharge.exe
PDFill.exe
PDFill_PDF_Editor_Professional.exe
PDFill (1).exe
PDFill_PDF142_Editor_Professional.exe
PDFill_PDF_Editor_Professional.exe
PDFill Free PDF Editor Professional 14.0 build2.exe
PDFill_PDF_Editor_Professional
PDFill_PDF_Editor_Professional.exe
PDFill_PDF_Editor_Professional.exe
PDFill_PDF_Editor_Professional.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Runtime DLLs
UDP communications