× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 21ad785f2bbfa7c1e22de1e159f26835c98c848e294eea29b9377c98ae6f013e
File name: pix600ee.exe
Detection ratio: 0 / 45
Analysis date: 2013-10-25 09:02:50 UTC ( 5 months, 3 weeks ago ) View latest
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20131024
Agnitum 20131024
AhnLab-V3 20131024
AntiVir 20131025
Antiy-AVL 20131025
Avast 20131025
Baidu-International 20131025
BitDefender 20090218
Bkav 20131024
ByteHero 20130924
CAT-QuickHeal 20131023
ClamAV 20131025
Commtouch 20131025
Comodo 20131025
DrWeb 20131025
ESET-NOD32 20131025
Emsisoft 20131025
F-Prot 20131025
Fortinet 20131025
GData 20131025
Ikarus 20131025
Jiangmin 20131025
K7AntiVirus 20131024
K7GW 20131025
Kaspersky 20131025
Kingsoft 20130829
Malwarebytes 20131025
McAfee 20131025
McAfee-GW-Edition 20131025
MicroWorld-eScan 20131025
Microsoft 20131025
NANO-Antivirus 20131025
Norman 20131024
Panda 20131024
Rising 20131025
SUPERAntiSpyware 20131025
Sophos 20131025
Symantec 20131025
TheHacker 20131024
TotalDefense 20131024
TrendMicro 20131025
TrendMicro-HouseCall 20131025
VBA32 20131024
VIPRE 20131025
ViRobot 20131025
nProtect 20131025
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright (c) 2012 Flexera Software LLC. All Rights Reserved.

Publisher Isao Maruoka
Product Pixia 6 English Edition
Original name InstallShield Setup.exe
Internal name Setup
File version 6.00.0050
Description Setup Launcher Unicode
Signature verification Signed file, verified signature
Signing date 1:58 PM 10/21/2013
Signers
[+] Isao Maruoka
Status Valid
Valid from 9:28 AM 11/20/2012
Valid to 4:34 AM 3/2/2014
Valid usage Code Signing
Algorithm SHA1
Thumbrint 2479FF0E2BF264C370866009B19260B9067B0F04
Serial number 11 21 11 1B 5F 1A 6C C6 0D 93 8C 6C 05 02 CB 29 1F AD
[+] GlobalSign CodeSigning CA - G2
Status Valid
Valid from 11:00 AM 4/13/2011
Valid to 11:00 AM 4/13/2019
Valid usage Code Signing
Algorithm SHA1
Thumbrint 9000401777DD2B43393D7B594D2FF4CBA4516B38
Serial number 04 00 00 00 00 01 2F 4E E1 35 5C
[+] GlobalSign
Status Valid
Valid from 1:00 PM 9/1/1998
Valid to 1:00 PM 1/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, 1.3.6.1.5.5.8.2.2
Algorithm SHA1
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-04-25 01:16:12
Entry Point 0x0006AABB
Number of sections 4
PE sections
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
RegCreateKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
SetSecurityDescriptorDacl
OpenProcessToken
RegEnumKeyW
RegOpenKeyW
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
RegEnumValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
EqualSid
SetSecurityDescriptorGroup
GetDIBColorTable
GetSystemPaletteEntries
CreateHalftonePalette
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
SetBkMode
CreateFontIndirectW
GetObjectW
BitBlt
RealizePalette
SetTextColor
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
UnrealizeObject
CreateCompatibleDC
CreateFontW
SelectObject
CreateSolidBrush
DeleteObject
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
SetEvent
HeapDestroy
GetFileAttributesW
DuplicateHandle
GetLocalTime
HeapAlloc
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
SetErrorMode
FreeEnvironmentStringsW
lstrcatW
GetThreadContext
GetLocaleInfoW
SetStdHandle
GetCPInfo
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
FindResourceExW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
FormatMessageW
ResumeThread
CreateEventW
LoadResource
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
GetEnvironmentVariableW
SetLastError
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
VerLanguageNameW
GetModuleFileNameA
LoadLibraryA
QueryPerformanceFrequency
EnumSystemLocalesA
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FatalAppExitA
FlushInstructionCache
GetPrivateProfileStringW
SetFilePointer
CreateThread
MoveFileExW
GetSystemDirectoryW
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
SetThreadContext
TerminateProcess
SearchPathW
WriteConsoleA
SetCurrentDirectoryW
GlobalAlloc
SetEndOfFile
GetVersion
InterlockedIncrement
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
WriteProcessMemory
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
VirtualProtectEx
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
WriteFile
CompareStringW
lstrcpyW
RemoveDirectoryW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
lstrcpyA
GetTimeFormatA
ResetEvent
FindFirstFileW
IsValidLocale
lstrcmpW
GetProcAddress
GetTempPathW
GetCurrentDirectoryW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetTimeFormatW
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
VirtualQuery
lstrlenW
Process32NextW
CreateProcessW
SizeofResource
CompareFileTime
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
Process32FirstW
GetCurrentThread
lstrcpynW
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetModuleHandleW
TlsGetValue
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
IsBadReadPtr
VirtualAlloc
GetOEMCP
CompareStringA
Ord(161)
Ord(12)
Ord(149)
Ord(6)
Ord(313)
Ord(184)
Ord(277)
Ord(4)
Ord(202)
Ord(150)
Ord(7)
Ord(201)
Ord(200)
Ord(163)
Ord(5)
Ord(114)
Ord(2)
Ord(9)
UuidFromStringW
UuidCreate
RpcStringFreeW
UuidToStringW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
CommandLineToArgvW
SetFocus
EndPaint
CreateDialogIndirectParamW
IntersectRect
EndDialog
BeginPaint
SetWindowTextW
TranslateMessage
DefWindowProcW
MoveWindow
KillTimer
CharPrevW
PostQuitMessage
ShowWindow
GetMessageW
SetWindowPos
wvsprintfW
GetDesktopWindow
GetSystemMetrics
SetWindowLongW
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
GetDC
CharUpperW
GetWindowDC
SendDlgItemMessageW
GetWindow
PostMessageW
GetSysColor
SetActiveWindow
DispatchMessageW
CreateDialogParamW
ReleaseDC
GetDlgCtrlID
SendMessageW
RegisterClassW
wsprintfW
SubtractRect
SetTimer
GetDlgItem
GetDlgItemTextW
MessageBoxW
FindWindowW
ClientToScreen
SetRect
CharNextW
LoadImageW
IsDialogMessageW
FillRect
GetClientRect
WaitForInputIdle
SetDlgItemTextW
GetSysColorBrush
DialogBoxIndirectParamW
LoadCursorW
LoadIconW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
DestroyWindow
ExitWindowsEx
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ProgIDFromCLSID
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
CoTaskMemRealloc
CLSIDFromProgID
CoInitializeSecurity
GetRunningObjectTable
CoTaskMemFree
StringFromGUID2
CreateItemMoniker
Number of PE resources by type
RT_STRING 25
RT_DIALOG 23
RT_ICON 12
RT_BITMAP 6
RT_GROUP_ICON 3
RT_MANIFEST 1
GIF 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 46
ENGLISH US 26
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.0.50.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Setup Launcher Unicode

CharacterSet
Unicode

InitializedDataSize
522752

FileOS
Win32

InternalBuildNumber
115289

ISInternalVersion
19.0.160

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.00.0050

TimeStamp
2012:04:25 02:16:12+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

ProductVersion
6.00.0050

SubsystemVersion
5.0

ISInternalDescription
Setup Launcher Unicode

OSVersion
5.0

OriginalFilename
InstallShield Setup.exe

LegalCopyright
Copyright (c) 2012 Flexera Software LLC. All Rights Reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Isao Maruoka / Soldier

CodeSize
713728

ProductName
Pixia 6 English Edition

ProductVersionNumber
6.0.50.0

EntryPoint
0x6aabb

ObjectFileType
Dynamic link library

File identification
MD5 ce1c6fdf816a1feea6951677e1cbac05
SHA1 8fc7d6a9864177155d4a8910bb808b702380fdc5
SHA256 21ad785f2bbfa7c1e22de1e159f26835c98c848e294eea29b9377c98ae6f013e
ssdeep
393216:FEgi/aUCc0UVZtQYT07Cz5a+wYsbm0pqjE0019GYoJ:FEg0aUC2Zv07CzE+S100HroJ

File size 14.6 MB ( 15267536 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (52.0%)
Win32 Executable MS Visual C++ (generic) (37.6%)
Win32 Executable (generic) (5.4%)
Generic Win/DOS Executable (2.4%)
DOS Executable Generic (2.4%)
Tags
peexe signed

VirusTotal metadata
First submission 2013-10-21 16:02:22 UTC ( 5 months, 4 weeks ago )
Last submission 2013-10-25 09:02:50 UTC ( 5 months, 3 weeks ago )
File names InstallShield Setup.exe
Setup
pix600ee.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!