× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 49ffe39ed56c35083e8a4f9a01f08a5065bfc2fac188667fa3583ff88c06ef8a
File name: 56d6bbbf46b785.74339739
Detection ratio: 0 / 55
Analysis date: 2016-03-02 10:10:13 UTC ( 2 years, 7 months ago )
Antivirus Result Update
Ad-Aware 20160302
AegisLab 20160302
Yandex 20160301
AhnLab-V3 20160302
Alibaba 20160302
ALYac 20160302
Antiy-AVL 20160302
Arcabit 20160302
Avast 20160302
AVG 20160302
AVware 20160302
Baidu-International 20160302
BitDefender 20160302
Bkav 20160301
ByteHero 20160302
CAT-QuickHeal 20160302
ClamAV 20160302
CMC 20160301
Comodo 20160302
Cyren 20160302
DrWeb 20160302
Emsisoft 20160229
ESET-NOD32 20160302
F-Prot 20160302
F-Secure 20160302
Fortinet 20160301
GData 20160302
Ikarus 20160302
Jiangmin 20160302
K7AntiVirus 20160302
K7GW 20160302
Kaspersky 20160302
Malwarebytes 20160302
McAfee 20160302
McAfee-GW-Edition 20160302
Microsoft 20160302
eScan 20160302
NANO-Antivirus 20160302
nProtect 20160229
Panda 20160301
Qihoo-360 20160302
Rising 20160302
Sophos AV 20160302
SUPERAntiSpyware 20160302
Symantec 20160301
Tencent 20160302
TheHacker 20160301
TotalDefense 20160302
TrendMicro 20160302
TrendMicro-HouseCall 20160302
VBA32 20160302
VIPRE 20160302
ViRobot 20160302
Zillya 20160302
Zoner 20160302
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Product SoftMaker Office Installer
File version 10.0.0.0
Description SoftMaker Office 2016 Setup
Signature verification Signed file, verified signature
Signing date 5:01 AM 2/28/2016
Signers
[+] SoftMaker Software GmbH
Status Valid
Issuer thawte SHA256 Code Signing CA
Valid from 1:00 AM 6/30/2015
Valid to 12:59 AM 9/21/2017
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha256RSA
Thumbprint ABE596813AFBC937F79369CDD0FD290D6EA7F401
Serial number 4B AC CE 6A 5B 02 97 9F AE 0C C3 0D 5F EC 52 F9
[+] thawte SHA256 Code Signing CA
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint D00CFDBF46C98A838BC10DC4E097AE0152C461BC
Serial number 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
[+] thawte
Status Valid
Issuer thawte Primary Root CA
Valid from 1:00 AM 11/17/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 91C6D6EE3E8AC86384E548C299295C756C817B81
Serial number 34 4E D5 57 20 D5 ED EC 49 F4 2F CE 37 DB 2B 6D
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2016-02-05 17:18:46
Entry Point 0x0007DB90
Number of sections 4
PE sections
Overlays
MD5 c84d975c7e1ea38b8213a521e6d55b4a
File type data
Offset 344471040
Size 12632
Entropy 7.36
PE imports
GetTokenInformation
RegCloseKey
OpenProcessToken
FreeSid
DuplicateToken
AllocateAndInitializeSid
CheckTokenMembership
AdjustTokenPrivileges
LookupPrivilegeValueW
Ord(17)
_TrackMouseEvent
CreateDIBPatternBrushPt
PlayMetaFileRecord
GetWindowExtEx
PolylineTo
SetGraphicsMode
SetBkMode
PatBlt
GetClipBox
CreatePen
GetCurrentPositionEx
SaveDC
OffsetClipRgn
SetTextAlign
SetColorAdjustment
CreateRectRgnIndirect
CombineRgn
PlayMetaFile
ModifyWorldTransform
GetClipRgn
GetObjectType
SelectClipRgn
Rectangle
SetMapMode
GetDeviceCaps
SetViewportExtEx
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SetMapperFlags
EnumMetaFile
SetWorldTransform
GetPixel
SetWindowOrgEx
DeleteObject
IntersectClipRect
BitBlt
CreateHatchBrush
OffsetWindowOrgEx
CreatePatternBrush
PolyDraw
RectVisible
ExcludeClipRect
CreateBitmap
Escape
GetStockObject
SetViewportOrgEx
SelectPalette
GetViewportExtEx
PtVisible
SetArcDirection
ExtSelectClipRgn
SetROP2
GetDCOrgEx
CreateCompatibleDC
PolyBezierTo
StretchDIBits
SetStretchBltMode
ScaleWindowExtEx
ScaleViewportExtEx
CreateRectRgn
ArcTo
SelectObject
LineTo
SetPolyFillMode
MoveToEx
CreateCompatibleBitmap
SetWindowExtEx
SetTextJustification
CreateSolidBrush
DPtoLP
ExtCreatePen
SetTextColor
SetBkColor
SetTextCharacterExtra
GetBkColor
SetRectRgn
SelectClipPath
GetStdHandle
GetConsoleOutputCP
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
HeapDestroy
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
UnhandledExceptionFilter
SetErrorMode
SetStdHandle
GetFileTime
GetTempPathA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetExitCodeProcess
LocalFree
MoveFileA
ResumeThread
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
CopyFileA
ExitProcess
FlushFileBuffers
GetModuleFileNameA
EnumSystemLocalesA
EnumResourceLanguagesW
SetThreadPriority
GetSystemDefaultLCID
InterlockedDecrement
FatalAppExitA
GetModuleHandleA
CreateThread
SetUnhandledExceptionFilter
ConvertDefaultLocale
MulDiv
GetDateFormatA
GetSystemDirectoryA
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
ExitThread
GlobalSize
GetStartupInfoA
UnlockFile
SystemTimeToFileTime
GetFileSize
DeleteFileA
GetWindowsDirectoryA
SetEvent
GlobalLock
GetProcessHeap
GetFileSizeEx
GlobalReAlloc
lstrcmpA
CompareStringA
GetTempFileNameA
IsValidLocale
DuplicateHandle
GetUserDefaultLCID
GetTimeZoneInformation
IsDebuggerPresent
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
DosDateTimeToFileTime
GlobalDeleteAtom
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetThreadLocale
GlobalUnlock
LockFile
FileTimeToLocalFileTime
SizeofResource
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
InterlockedCompareExchange
GetCurrentThread
SuspendThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
FreeResource
HeapCreate
VirtualFree
Sleep
SetConsoleCtrlHandler
FindResourceA
VirtualAlloc
GetOEMCP
GetTimeFormatA
SysStringLen
SysStringByteLen
VarBstrFromDec
VarDecFromStr
SafeArrayDestroyData
SafeArrayCreate
SafeArrayAllocDescriptor
VariantCopy
SafeArrayGetElemsize
VariantInit
SafeArrayAllocData
SafeArrayDestroyDescriptor
SafeArrayAccessData
SafeArrayGetLBound
VarBstrFromDate
SafeArrayUnaccessData
SafeArrayDestroy
SafeArrayUnlock
SafeArrayGetUBound
LoadTypeLib
SysFreeString
SysAllocStringByteLen
SafeArrayLock
LoadRegTypeLib
VariantChangeType
SafeArrayGetElement
SafeArrayPtrOfIndex
VarBstrFromCy
VarCyFromStr
SafeArrayRedim
SafeArrayCopy
VariantTimeToSystemTime
SystemTimeToVariantTime
RegisterTypeLib
SysAllocStringLen
VariantClear
SysReAllocStringLen
VarDateFromStr
SafeArrayGetDim
SafeArrayPutElement
DragFinish
PathFindFileNameW
PathRemoveFileSpecW
PathIsUNCW
PathFindExtensionW
PathStripToRootW
PathCombineW
PathRemoveExtensionW
SetFocus
GetForegroundWindow
SetMenuItemBitmaps
SetRectEmpty
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
GetNextDlgTabItem
IsWindow
EndPaint
ScrollWindowEx
WindowFromPoint
DrawIcon
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
ReleaseDC
GetDlgCtrlID
GetMenu
GetClientRect
SetScrollPos
CallNextHookEx
ClientToScreen
GetActiveWindow
LockWindowUpdate
GetTopWindow
DestroyWindow
GetParent
UpdateWindow
EqualRect
CheckRadioButton
ShowWindow
GetDesktopWindow
SetWindowPlacement
TranslateMessage
IsWindowEnabled
GetWindow
GetDlgItemInt
GetMenuBarInfo
SetParent
ScrollWindow
GetWindowPlacement
EnableMenuItem
TrackPopupMenuEx
DrawFocusRect
GetDCEx
ShowOwnedPopups
FillRect
CopyRect
DeferWindowPos
GetDialogBaseUnits
PtInRect
IsChild
MapWindowPoints
BeginPaint
OffsetRect
EndDialog
GetScrollPos
KillTimer
SendDlgItemMessageA
GetSystemMetrics
IsIconic
SetScrollRange
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
IntersectRect
CheckDlgButton
WaitMessage
CreatePopupMenu
CheckMenuItem
GetSubMenu
GetLastActivePopup
SetTimer
GetDlgItem
GetMenuCheckMarkDimensions
BringWindowToTop
ScreenToClient
TrackPopupMenu
GetMenuItemCount
IsDlgButtonChecked
BeginDeferWindowPos
GetMenuState
GetSystemMenu
ReuseDDElParam
GetDC
SetForegroundWindow
ExitWindowsEx
GetScrollRange
GetScrollInfo
GetCapture
RemoveMenu
GetWindowThreadProcessId
GetSysColorBrush
ShowScrollBar
SetMenu
MoveWindow
SetDlgItemInt
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
SetScrollInfo
GetKeyState
EndDeferWindowPos
SystemParametersInfoA
DestroyIcon
IsWindowVisible
UnpackDDElParam
UnionRect
SetRect
DeleteMenu
InvalidateRect
ValidateRect
IsRectEmpty
GetFocus
UnhookWindowsHookEx
SetCursor
ClosePrinter
DocumentPropertiesW
OpenPrinterW
ReadClassStg
CoInitializeEx
CLSIDFromString
IIDFromString
CoTaskMemAlloc
StringFromCLSID
ReleaseStgMedium
CoCreateGuid
SetConvertStg
CoCreateInstance
WriteClassStg
CoUninitialize
CreateBindCtx
CoDisconnectObject
ReadFmtUserTypeStg
OleDuplicateData
OleRegGetUserType
CoTaskMemFree
CoTreatAsClass
StringFromGUID2
WriteFmtUserTypeStg
URLDownloadToFileW
Number of PE resources by type
RES_CAB 11
RT_ICON 7
RT_DIALOG 4
CUSTOM 4
RT_GROUP_CURSOR 1
RT_MANIFEST 1
RT_CURSOR 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 31
PE resources
Debug information
ExifTool file metadata
LegalTrademarks
All Rights Reserved

UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
16.0.0.3764

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
343684608

EntryPoint
0x7db90

MIMEType
application/octet-stream

FileVersion
10.0.0.0

TimeStamp
2016:02:05 18:18:46+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

ProductVersion
16.0.0.3764

FileDescription
SoftMaker Office 2016 Setup

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SoftMaker Software GmbH

CodeSize
785408

ProductName
SoftMaker Office Installer

ProductVersionNumber
16.0.0.3764

FileTypeExtension
exe

ObjectFileType
Dynamic link library

File identification
MD5 e7747c42d559147c536dc824119876fe
SHA1 6d176d23d94ec1bb4a34761c8d59a785f7a6055c
SHA256 49ffe39ed56c35083e8a4f9a01f08a5065bfc2fac188667fa3583ff88c06ef8a
ssdeep
6291456:pFG5BTp8An0JocbHRsya3jXocGlI4cRGHw7m80BF6hnYu89R81YwCc:CV8xez4nXZBM6u8z8f

authentihash 9b750e9d93b5c6561108ff6e7243c4069653f5961388f803b531b288824eb2d7
imphash 262ac618eed8f172ac92edfff5cc5367
File size 328.5 MB ( 344483672 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows ActiveX control (93.1%)
Win32 Executable (generic) (3.6%)
Generic Win/DOS Executable (1.6%)
DOS Executable Generic (1.5%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-03-02 10:10:13 UTC ( 2 years, 7 months ago )
Last submission 2016-03-02 10:10:13 UTC ( 2 years, 7 months ago )
File names ofw2016(1).exe
49FFE39ED56C35083E8A4F9A01F08A5065BFC2FAC188667FA3583FF88C06EF8A.exe
56d6bbbf46b785.74339739
49FFE39ED56C35083E8A4F9A01F08A5065BFC2FAC188667FA3583FF88C06EF8A
SoftMaker Office Installer 16.0.0.3764.exe
49FFE39ED56C35083E8A4F9A01F08A5065BFC2FAC188667FA3583FF88C06EF8A.exe
ofw2016(2).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!