× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1869529d0def34bdc67d2e6f49feb9a532956b1453447dc0bb2ec2a19e81c200
File name: ppadsetup.exe
Detection ratio: 0 / 70
Analysis date: 2019-01-29 23:57:13 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
Acronis 20190128
Ad-Aware 20190129
AegisLab 20190129
AhnLab-V3 20190129
Alibaba 20180921
ALYac 20190129
Antiy-AVL 20190129
Arcabit 20190129
Avast 20190129
Avast-Mobile 20190128
AVG 20190129
Avira (no cloud) 20190129
Babable 20180917
Baidu 20190128
BitDefender 20190129
Bkav 20190129
CAT-QuickHeal 20190129
ClamAV 20190129
CMC 20190129
Comodo 20190129
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190129
Cyren 20190129
DrWeb 20190129
eGambit 20190129
Emsisoft 20190129
Endgame 20181108
ESET-NOD32 20190129
F-Prot 20190129
F-Secure 20190129
Fortinet 20190129
GData 20190129
Ikarus 20190129
Sophos ML 20181128
Jiangmin 20190129
K7AntiVirus 20190129
K7GW 20190129
Kaspersky 20190129
Kingsoft 20190129
Malwarebytes 20190129
MAX 20190129
McAfee 20190129
McAfee-GW-Edition 20190129
Microsoft 20190129
eScan 20190129
NANO-Antivirus 20190129
Palo Alto Networks (Known Signatures) 20190129
Panda 20190129
Qihoo-360 20190129
Rising 20190129
SentinelOne (Static ML) 20190124
Sophos AV 20190129
SUPERAntiSpyware 20190123
Symantec 20190129
TACHYON 20190128
Tencent 20190129
TheHacker 20190129
TotalDefense 20190129
Trapmine 20190123
TrendMicro 20190129
TrendMicro-HouseCall 20190129
Trustlook 20190129
VBA32 20190129
ViRobot 20190129
Webroot 20190129
Yandex 20190128
Zillya 20190129
ZoneAlarm by Check Point 20190129
Zoner 20190128
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
NCH Software

Product PhotoPad
Original name PhotoPad.exe
Internal name PhotoPad
File version 4.20+
Description PhotoPad Image Editor
Signature verification Signed file, verified signature
Signing date 10:43 AM 12/14/2018
Signers
[+] NCH Software Pty Ltd
Status Valid
Issuer DigiCert EV Code Signing CA
Valid from 11:00 PM 10/02/2018
Valid to 11:00 AM 03/25/2019
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 160E0AE3B956EA75C9F0A5E5D00C7351E5A1722F
Serial number 05 72 F6 D5 E5 59 56 34 97 F3 53 31 5B 4E 81 47
[+] DigiCert EV Code Signing CA
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 11:00 AM 04/18/2012
Valid to 11:00 AM 04/18/2027
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 846896AB1BCF45734855C61B63634DFD8719625B
Serial number 0D D0 E3 37 4A C9 5B DB FA 6B 43 4B 2A 48 EC 06
[+] DigiCert
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 12:00 AM 11/10/2006
Valid to 12:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Serial number 02 AC 5C 26 6A 0B 40 9B 8F 0B 79 F2 AE 46 25 77
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 11:00 PM 10/17/2012
Valid to 11:59 PM 12/29/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/21/2012
Valid to 11:59 PM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-10-23 22:02:44
Entry Point 0x000011D4
Number of sections 5
PE sections
Overlays
MD5 8d2ebc4bee1d2d5162a8022c3a04bf44
File type data
Offset 1567744
Size 14352
Entropy 7.25
PE imports
GetLastError
RemoveDirectoryW
WaitForSingleObject
GetExitCodeProcess
ExitProcess
LoadLibraryA
VerSetConditionMask
SizeofResource
LockResource
GetCommandLineW
GetStartupInfoW
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
lstrcpyW
GetModuleFileNameW
WriteFile
CloseHandle
GetModuleHandleW
FreeLibrary
GetTempPathW
LoadResource
FindResourceW
CreateFileW
SetupIterateCabinetW
ShellExecuteW
ShellExecuteExW
MessageBoxW
wsprintfW
CoInitializeEx
CoUninitialize
Number of PE resources by type
RT_ICON 2
Struct(99) 2
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
English (Australian)

FileFlagsMask
0x0017

FileDescription
PhotoPad Image Editor

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
1564672

EntryPoint
0x11d4

OriginalFileName
PhotoPad.exe

MIMEType
application/octet-stream

LegalCopyright
NCH Software

FileVersion
4.20+

TimeStamp
2018:10:23 15:02:44-07:00

FileType
Win32 EXE

PEType
PE32

InternalName
PhotoPad

ProductVersion
4.20+

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NCH Software

CodeSize
2048

ProductName
PhotoPad

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

Execution parents
PE resource-wise parents
File identification
MD5 9f9b550384936e1581d1ecf93cc7bc02
SHA1 8f6be06087e78ef195f8ada655163a67cbb1ea75
SHA256 1869529d0def34bdc67d2e6f49feb9a532956b1453447dc0bb2ec2a19e81c200
ssdeep
24576:K+WS3+lSNvFINxp2AaDcdLPYUX/VIVETH9+aVt8GS4IXdjllY1ndQsi5E:lz3+l8yNzLQAOVQH9rHXfIfYwjE

authentihash 2c2eea19bb7845bff78b20fd15507e1347c1baec366728f29e7d37867a46b7a4
imphash f1e3b0a5431323b070123d4183ff8736
File size 1.5 MB ( 1582096 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-12-15 02:59:02 UTC ( 4 months, 1 week ago )
Last submission 2019-01-13 14:41:46 UTC ( 3 months, 1 week ago )
File names PhotoPad.exe
photopadsetup_v4.20.exe
ppadsetup.exe
77-3-setup(4).exe
1047615
ppadsetup.exe
photopadcrossstitch.exe
1869529D0DEF34BDC67D2E6F49FEB9A532956B1453447DC0BB2EC2A19E81C200.exe
PhotoPadPhotoEditingSoftware.exe
77-3-setup(4).exe
77-3-setup.exe
77-3-setup(4).exe
PhotoPad
77-3-setup.exe
PhotoPad_Image_Editor_v4.20.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Searched windows
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.