× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 298cfb63ba7a0d7656d1967a759acd1acd68416e8cc34e591e3a063b485c3702
File name: vpsetup.exe
Detection ratio: 0 / 67
Analysis date: 2018-01-12 17:56:27 UTC ( 1 week, 1 day ago )
Antivirus Result Update
Ad-Aware 20180112
AegisLab 20180112
AhnLab-V3 20180112
Alibaba 20180112
ALYac 20180112
Antiy-AVL 20180112
Arcabit 20180112
Avast 20180112
Avast-Mobile 20180112
AVG 20180112
Avira (no cloud) 20180112
AVware 20180103
Baidu 20180112
BitDefender 20180112
Bkav 20180112
CAT-QuickHeal 20180112
ClamAV 20180112
CMC 20180111
Comodo 20180112
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180112
Cyren 20180112
DrWeb 20180112
eGambit 20180112
Emsisoft 20180112
Endgame 20171130
ESET-NOD32 20180112
F-Prot 20180112
F-Secure 20180112
Fortinet 20180112
GData 20180112
Ikarus 20180112
Sophos ML 20170914
Jiangmin 20180112
K7AntiVirus 20180112
K7GW 20180112
Kaspersky 20180112
Kingsoft 20180112
Malwarebytes 20180112
MAX 20180112
McAfee 20180112
McAfee-GW-Edition 20180112
Microsoft 20180112
eScan 20180112
NANO-Antivirus 20180112
nProtect 20180112
Palo Alto Networks (Known Signatures) 20180112
Panda 20180112
Qihoo-360 20180112
Rising 20180112
SentinelOne (Static ML) 20171224
Sophos AV 20180112
SUPERAntiSpyware 20180112
Symantec 20180112
Symantec Mobile Insight 20180111
Tencent 20180112
TheHacker 20180112
TrendMicro 20180112
TrendMicro-HouseCall 20180112
Trustlook 20180112
VBA32 20180112
VIPRE 20180112
ViRobot 20180112
Webroot 20180112
WhiteArmor 20180110
Yandex 20180112
Zillya 20180112
ZoneAlarm by Check Point 20180112
Zoner 20180112
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
NCH Software

Product VideoPad
Original name VideoPad.exe
Internal name VideoPad
File version 5.32
Description VideoPad Video Editor
Signature verification Signed file, verified signature
Signing date 7:14 AM 12/14/2017
Signers
[+] NCH Software
Status Valid
Issuer thawte SHA256 Code Signing CA
Valid from 1:00 AM 6/20/2017
Valid to 12:59 AM 8/12/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 44B0F5447257258ACEAA023D320BC8DFCEB8FA51
Serial number 17 B7 A4 CB 0D AF 6C 32 93 32 70 F0 76 1D CE E0
[+] thawte SHA256 Code Signing CA
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint D00CFDBF46C98A838BC10DC4E097AE0152C461BC
Serial number 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-10-25 00:08:33
Entry Point 0x000011D4
Number of sections 5
PE sections
Overlays
MD5 101e01db7296f92f6d4dd965df03980c
File type data
Offset 5766144
Size 12968
Entropy 7.35
PE imports
GetLastError
GetModuleFileNameW
WaitForSingleObject
FindResourceW
GetExitCodeProcess
ExitProcess
LoadLibraryA
VerSetConditionMask
SizeofResource
LockResource
GetCommandLineW
GetStartupInfoW
SetEnvironmentVariableW
CreateDirectoryW
DeleteFileW
GetProcAddress
lstrcpyW
RemoveDirectoryW
GetTempPathW
CloseHandle
GetModuleHandleW
FreeLibrary
LoadResource
WriteFile
CreateFileW
SetupIterateCabinetW
ShellExecuteW
ShellExecuteExW
MessageBoxW
wsprintfW
CoInitializeEx
CoUninitialize
Number of PE resources by type
RT_ICON 2
Struct(99) 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
English (Australian)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
5763072

EntryPoint
0x11d4

OriginalFileName
VideoPad.exe

MIMEType
application/octet-stream

LegalCopyright
NCH Software

FileVersion
5.32

TimeStamp
2016:10:25 01:08:33+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
VideoPad

ProductVersion
5.32

FileDescription
VideoPad Video Editor

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
NCH Software

CodeSize
2048

ProductName
VideoPad

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

PE resource-wise parents
File identification
MD5 4deab1fdaae1e4c0ec0f9e31084da5c6
SHA1 95c7c07388315424d3e36e83bc31bfd577429c49
SHA256 298cfb63ba7a0d7656d1967a759acd1acd68416e8cc34e591e3a063b485c3702
ssdeep
98304:PO1knRgFy848SWGDRz/vEVZfo3twIkOqoWIM2/V0jI1QiKzYImQ0uw45EktpC71C:G1Py8PSRz/sVZfPOj//asZKDcKEkvC7M

authentihash 6c3f5b022014ea3322bb7a8576ff592d067bd3bdbb768c9ccdb475585c838db9
imphash 96b80544389cff6b990a929a73e4967b
File size 5.5 MB ( 5779112 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-12-14 08:53:45 UTC ( 1 month, 1 week ago )
Last submission 2018-01-12 17:56:27 UTC ( 1 week, 1 day ago )
File names VideoPad.exe
vpsetup.exe
298CFB63BA7A0D7656D1967A759ACD1ACD68416E8CC34E591E3A063B485C3702
VideoPad Video Editor_vpsetup.exe
298CFB63BA7A0D7656D1967A759ACD1ACD68416E8CC34E591E3A063B485C3702.exe
vpsetup.exe
vpsetup.exe
VideoPad
133-1-setup.exe
videopadsetup_v5.32.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Searched windows
Runtime DLLs