× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3d82ed10278f33da69ba5f1925834a8793d409bdd7e1600003014a3ac030efb8
File name: ashampoo_getback_photo_e1.0.1_sm.exe
Detection ratio: 1 / 45
Analysis date: 2013-08-15 07:25:56 UTC ( 8 months, 1 week ago ) View latest
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
Jiangmin Win32/Virut.bn 20130814
AVG 20130815
Agnitum 20130814
AhnLab-V3 20130815
AntiVir 20130815
Antiy-AVL 20130815
Avast 20130815
BitDefender 20130815
ByteHero 20130814
CAT-QuickHeal 20130814
ClamAV 20130815
Commtouch 20130815
Comodo 20130815
DrWeb 20130815
ESET-NOD32 20130814
Emsisoft 20130815
F-Prot 20130815
F-Secure 20130815
Fortinet 20130815
GData 20130815
Ikarus 20130815
K7AntiVirus 20130814
K7GW 20130814
Kaspersky 20130815
Kingsoft 20130723
Malwarebytes 20130815
McAfee 20130815
McAfee-GW-Edition 20130815
MicroWorld-eScan 20130815
Microsoft 20130815
NANO-Antivirus 20130815
Norman 20130815
PCTools 20130814
Panda 20130814
Rising 20130815
SUPERAntiSpyware 20130815
Sophos 20130815
Symantec 20130815
TheHacker 20130814
TotalDefense 20130814
TrendMicro 20130815
TrendMicro-HouseCall 20130815
VBA32 20130814
VIPRE 20130815
ViRobot 20130815
nProtect 20130815
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright

Publisher Ashampoo GmbH & Co. KG
Product Ashampoo GetBack Photo
File version 1.0.1
Description Ashampoo GetBack Photo Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 2:25 PM 2/4/2013
Signers
[+] Ashampoo GmbH & Co. KG
Status Certificate out of its validity period
Valid from 1:00 AM 3/8/2011
Valid to 12:59 AM 3/1/2014
Valid usage Code Signing
Algorithm SHA1
Thumbrint A6EEED55B42419F14991878E4B28B45544A6B562
Serial number 35 6E DB C5 53 5C 4B 89 E5 6D 2C CB E0 E1 7D 7F
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] COMODO Time Stamping Signer
Status Valid
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] USERTrust
Status Valid
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm SHA1
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Packers identified
F-PROT INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, Unicode, INNO, appended, Unicode, INNO, appended, INNO, INNO, Unicode, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, INNO, Unicode, INNO, appended, Unicode, INNO, appended, INNO, INNO, Unicode, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, appended, INNO, INNO, INNO, appended, INNO, INNO, INNO, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO, Unicode, INNO, INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-10-09 08:48:22
Entry Point 0x0000F3BC
Number of sections 8
PE sections
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetExitCodeProcess
CreateProcessW
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetVersion
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
SysReAllocStringLen
SysFreeString
SysAllocStringLen
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_ICON 8
RT_STRING 6
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 12
NEUTRAL 9
ExifTool file metadata
SubsystemVersion
5.0

Comments
This installation was built with Inno Setup.

InitializedDataSize
150016

ImageVersion
6.0

ProductName
Ashampoo GetBack Photo

FileVersionNumber
1.0.1.0

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

LinkerVersion
2.25

MIMEType
application/octet-stream

FileVersion
1.0.1

TimeStamp
2012:10:09 09:48:22+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:04:09 02:56:04+01:00

ProductVersion
1.0.1

FileDescription
Ashampoo GetBack Photo Setup

OSVersion
5.0

FileCreateDate
2014:04:09 02:56:04+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Ashampoo GmbH & Co. KG

CodeSize
60416

FileSubtype
0

ProductVersionNumber
1.0.1.0

EntryPoint
0xf3bc

ObjectFileType
Executable application

Execution parents
Compressed bundles
File identification
MD5 40506cf358e45f0add9db01157373b06
SHA1 43bab0167df9b1d1b2ca6a8300212cf94efb9120
SHA256 3d82ed10278f33da69ba5f1925834a8793d409bdd7e1600003014a3ac030efb8
ssdeep
196608:OhGErzP6phGaduPpj5s9dIUzAOX1C/4PFbdOms1xS2:2nYYacBNmlA61CA9B1exS2

imphash 48aa5c8931746a9655524f67b25a47ef
File size 7.7 MB ( 8039320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.5%)
Win16/32 Executable Delphi generic (19.5%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
Tags
peexe signed

VirusTotal metadata
First submission 2013-02-05 02:15:01 UTC ( 1 year, 2 months ago )
Last submission 2014-01-15 15:35:25 UTC ( 3 months ago )
File names ashampoo_getback_photo_sm.exe
8494525
3d82ed10278f33da69ba5f1925834a8793d409bdd7e1600003014a3ac030efb8
octet-stream
ashampoo_getback_photo_e1.0.1_sm.exe
output.8494525.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!