× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 33d1ffb6cd34c53c5491fd80cac194fcc9ec589a3e10b2727089220ba5cfcd4f
File name: yEd-3.18.1.1_with-JRE8_64-bit_setup.exe
Detection ratio: 0 / 64
Analysis date: 2018-09-01 17:18:08 UTC ( 5 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180901
AegisLab 20180901
AhnLab-V3 20180901
ALYac 20180901
Antiy-AVL 20180901
Arcabit 20180901
Avast 20180901
Avast-Mobile 20180901
AVG 20180901
Avira (no cloud) 20180901
AVware 20180823
Babable 20180822
Baidu 20180830
BitDefender 20180901
Bkav 20180831
CAT-QuickHeal 20180901
ClamAV 20180901
CMC 20180901
Comodo 20180901
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180901
Cyren 20180901
DrWeb 20180901
eGambit 20180901
Emsisoft 20180901
Endgame 20180730
ESET-NOD32 20180901
F-Prot 20180901
F-Secure 20180901
Fortinet 20180901
GData 20180901
Sophos ML 20180717
Jiangmin 20180901
K7AntiVirus 20180901
K7GW 20180901
Kaspersky 20180901
Kingsoft 20180901
Malwarebytes 20180901
MAX 20180901
McAfee 20180901
McAfee-GW-Edition 20180901
Microsoft 20180901
eScan 20180901
NANO-Antivirus 20180901
Palo Alto Networks (Known Signatures) 20180901
Panda 20180901
Qihoo-360 20180901
Rising 20180901
SentinelOne (Static ML) 20180830
Sophos AV 20180901
SUPERAntiSpyware 20180901
Symantec 20180901
Symantec Mobile Insight 20180831
TACHYON 20180901
Tencent 20180901
TheHacker 20180829
TrendMicro 20180901
TrendMicro-HouseCall 20180901
Trustlook 20180901
VBA32 20180831
VIPRE 20180901
ViRobot 20180901
Webroot 20180901
Yandex 20180831
ZoneAlarm by Check Point 20180901
Zoner 20180831
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
Authenticode signature block and FileVersionInfo properties
Copyright
yWorks GmbH

Product yEd Graph Editor
Original name yEd-3.18.1.1_with-JRE8_64-bit_setup.exe
Internal name yEd
File version 3.18.1.1
Description yEd Graph Editor
Signature verification Signed file, verified signature
Signing date 10:49 AM 8/6/2018
Signers
[+] yWorks GmbH
Status Valid
Issuer thawte SHA256 Code Signing CA
Valid from 1:00 AM 9/30/2016
Valid to 12:59 AM 11/7/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint BCD5949EDF86C6C7660341F1651A70EA59CC24A3
Serial number 6E 7C 8A 87 9E E7 64 6F EA 56 25 97 26 95 90 8F
[+] thawte SHA256 Code Signing CA
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint D00CFDBF46C98A838BC10DC4E097AE0152C461BC
Serial number 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] GlobalSign TSA for MS Authenticode advanced - G2
Status Valid
Issuer GlobalSign Timestamping CA - SHA256 - G2
Valid from 1:00 AM 2/19/2018
Valid to 11:00 AM 3/18/2029
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 3EC766D5D4D472E21B1F2143521C31B790D94B68
Serial number 24 54 B8 7F 1E 14 53 AD 37 FA A1 78
[+] GlobalSign Timestamping CA - SHA256 - G2
Status Valid
Issuer GlobalSign
Valid from 11:00 AM 8/2/2011
Valid to 11:00 AM 3/29/2029
Valid usage All
Algorithm sha256RSA
Thumbrint 91843BBD936D86EAFA42A3AFBF33E92831068F99
Serial number 04 00 00 00 00 01 31 89 C6 50 04
[+] GlobalSign Root CA - R3
Status Valid
Issuer GlobalSign
Valid from 11:00 AM 3/18/2009
Valid to 11:00 AM 3/18/2029
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, EFS, IPSEC Tunnel, IPSEC User
Algorithm sha256RSA
Thumbrint D69B561148F01C77C54578C10926DF5B856976AD
Serial number 04 00 00 00 00 01 21 58 53 08 A2
PE header basic information
Target machine x64
Compilation timestamp 2018-04-11 08:05:01
Entry Point 0x0002F52C
Number of sections 6
PE sections
Overlays
MD5 fe25c8e91f62254ab07d34a9ff26dc77
File type data
Offset 446976
Size 82321368
Entropy 8.00
PE imports
RegCreateKeyExW
LookupPrivilegeValueA
RegCloseKey
LookupAccountSidW
RegQueryValueExA
SetEntriesInAclW
OpenServiceW
QueryServiceConfigW
ControlService
LookupPrivilegeValueW
RegDeleteKeyW
DeleteService
RegQueryValueExW
CloseServiceHandle
ChangeServiceConfig2W
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
LookupAccountNameW
RegOpenKeyExA
CreateServiceW
GetNamedSecurityInfoW
RegQueryInfoKeyW
RegEnumKeyExW
RegRestoreKeyW
RegEnumKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
RegEnumValueW
StartServiceW
RegSetValueExW
RegDeleteValueW
OpenSCManagerW
AllocateAndInitializeSid
RegSetValueExA
RegSaveKeyW
RegDeleteValueA
FreeSid
ChangeServiceConfigW
SetNamedSecurityInfoW
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
WaitForSingleObject
GetDriveTypeA
FindNextFileA
SizeofResource
EncodePointer
FlsGetValue
GetProcessId
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetCurrentDirectoryA
GetConsoleMode
GetLocaleInfoA
LocalAlloc
RtlUnwindEx
FreeEnvironmentStringsW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
GetConsoleTitleA
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
ConnectNamedPipe
GetEnvironmentVariableA
LoadResource
FindClose
GetFullPathNameW
DebugBreak
GetEnvironmentVariableW
SetLastError
InitializeCriticalSection
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
CreateMailslotA
DisconnectNamedPipe
RemoveDirectoryA
GetVersionExA
HeapSetInformation
LoadLibraryExA
SetThreadPriority
AllocConsole
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetModuleHandleA
CreateSemaphoreA
CreateThread
SetEnvironmentVariableW
MoveFileExW
GetSystemDirectoryW
CreatePipe
CreateSemaphoreW
GetMailslotInfo
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SetUnhandledExceptionFilter
WriteConsoleA
SetCurrentDirectoryW
SearchPathA
GetDiskFreeSpaceExW
SetEndOfFile
RtlCaptureContext
GetCurrentThreadId
SetCurrentDirectoryA
WriteConsoleW
AreFileApisANSI
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
FlsSetValue
LoadLibraryA
FreeLibrary
GetStartupInfoA
RtlPcToFileHeader
GetWindowsDirectoryW
SetHandleInformation
OpenProcess
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
CompareStringW
WaitNamedPipeW
RemoveDirectoryW
FlushFileBuffers
FindFirstFileA
RtlLookupFunctionEntry
CompareStringA
GetTempFileNameA
FindFirstFileW
GlobalMemoryStatus
DuplicateHandle
WaitForMultipleObjects
GetUserDefaultLCID
GetTimeZoneInformation
CreateFileW
GetFileType
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
GetShortPathNameW
CreateNamedPipeW
GlobalFree
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GlobalUnlock
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentStrings
GetCurrentProcessId
LockResource
GetConsoleTitleW
GetCommandLineW
GetCPInfo
HeapSize
FlsAlloc
GetCommandLineA
FlsFree
GetCurrentThread
SetConsoleTitleW
RaiseException
SetFilePointer
ReadFile
SetConsoleTitleA
CloseHandle
GetACP
GlobalLock
GetModuleHandleW
GetLongPathNameW
CreateProcessA
IsValidCodePage
HeapCreate
GetTempPathW
CreateProcessW
GetLongPathNameA
Sleep
FindResourceA
SafeArrayAccessData
SafeArrayUnaccessData
GetParent
EndDialog
GetLastActivePopup
OffsetRect
FindWindowW
FindWindowA
ShowWindow
SetWindowPos
GetWindowThreadProcessId
SendDlgItemMessageA
MessageBoxW
GetWindowRect
MessageBoxA
DialogBoxParamA
GetWindow
PostMessageW
RegisterClipboardFormatW
RegisterClassW
IsWindowVisible
GetWindowLongPtrW
GetWindowPlacement
SetWindowTextW
GetDlgItem
IsIconic
LoadIconA
EnumWindows
LoadCursorA
GetClassNameW
MonitorFromPoint
CopyRect
GetWindowTextW
SetDlgItemTextW
GetDesktopWindow
LoadIconW
SendMessageTimeoutW
wsprintfW
SetForegroundWindow
DefDlgProcW
ExitWindowsEx
ReleaseStgMedium
CoCreateInstance
CoTaskMemFree
CoInitialize
CoUninitialize
PE exports
Number of PE resources by type
RT_ICON 4
RT_DIALOG 3
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
ENGLISH US 3
PE resources
ExifTool file metadata
SubsystemVersion
5.2

InitializedDataSize
241664

ImageVersion
0.0

ProductName
yEd Graph Editor

FileVersionNumber
3.18.1.1

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x0017

ImageFileCharacteristics
Executable, Large address aware

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
yEd-3.18.1.1_with-JRE8_64-bit_setup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
3.18.1.1

TimeStamp
2018:04:11 09:05:01+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
yEd

ProductVersion
3.18.1.1

FileDescription
yEd Graph Editor

OSVersion
5.2

FileOS
Win32

LegalCopyright
yWorks GmbH

MachineType
AMD AMD64

CompanyName
yWorks GmbH

CodeSize
281600

FileSubtype
0

ProductVersionNumber
3.18.1.1

EntryPoint
0x2f52c

ObjectFileType
Unknown

File identification
MD5 6aae2c0d09a38838542db87070fc90a8
SHA1 e915e74276eb228ecb0fdb148c2f151a9821cd17
SHA256 33d1ffb6cd34c53c5491fd80cac194fcc9ec589a3e10b2727089220ba5cfcd4f
ssdeep
1572864:dTbqZdQ6O160M+4PWHyXcedOiS7XhXCwK3k37XnTkprsRQ85NMo7iWRBVcv9/0yi:wZej4PwwceFsXhXFK8nTkP8kkFBs0yDN

authentihash 9fe3764780625f256c28e43a9f2cdd3a0b5c79adcb8a1123e5070ecaa3d1c072
imphash d0492e6b3a64cfe3df6a481f09acb7f9
File size 78.9 MB ( 82768344 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID InstallShield setup (56.1%)
Win64 Executable (generic) (36.0%)
OS/2 Executable (generic) (2.6%)
Generic Win/DOS Executable (2.6%)
DOS Executable Generic (2.6%)
Tags
64bits peexe assembly signed overlay

VirusTotal metadata
First submission 2018-09-01 17:18:08 UTC ( 5 months, 3 weeks ago )
Last submission 2018-09-01 17:18:08 UTC ( 5 months, 3 weeks ago )
File names yEd-3.18.1.1_with-JRE8_64-bit_setup.exe
yEd
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!