× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4a9fba855fe7d011b565f1257cf1cdb16e9de96fe4f7dd608472526d9062c5cc
File name: 410413
Detection ratio: 0 / 67
Analysis date: 2018-07-30 00:23:05 UTC ( 7 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180729
AegisLab 20180729
AhnLab-V3 20180729
Alibaba 20180713
ALYac 20180729
Antiy-AVL 20180730
Arcabit 20180730
Avast 20180729
Avast-Mobile 20180729
AVG 20180729
Avira (no cloud) 20180729
AVware 20180727
Babable 20180725
Baidu 20180726
BitDefender 20180729
Bkav 20180728
CAT-QuickHeal 20180728
CMC 20180729
Comodo 20180730
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180730
Cyren 20180729
DrWeb 20180729
eGambit 20180730
Emsisoft 20180729
Endgame 20180711
ESET-NOD32 20180729
F-Prot 20180729
F-Secure 20180729
Fortinet 20180729
GData 20180729
Ikarus 20180729
Sophos ML 20180717
Jiangmin 20180729
K7AntiVirus 20180727
K7GW 20180729
Kaspersky 20180729
Kingsoft 20180730
Malwarebytes 20180729
MAX 20180730
McAfee 20180729
McAfee-GW-Edition 20180729
Microsoft 20180729
eScan 20180729
NANO-Antivirus 20180729
Palo Alto Networks (Known Signatures) 20180730
Panda 20180729
Qihoo-360 20180730
Rising 20180729
SentinelOne (Static ML) 20180701
Sophos AV 20180729
SUPERAntiSpyware 20180729
Symantec 20180729
TACHYON 20180729
Tencent 20180730
TheHacker 20180727
TotalDefense 20180729
TrendMicro 20180729
TrendMicro-HouseCall 20180729
Trustlook 20180730
VBA32 20180727
VIPRE 20180729
ViRobot 20180729
Webroot 20180730
Yandex 20180725
Zillya 20180727
ZoneAlarm by Check Point 20180729
Zoner 20180729
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © Xara Group Ltd

Product Xara Web Designer 6
File version 6.0.1.13296
Description Xara Web Designer 6 (en-GB)
Signature verification Signed file, verified signature
Signing date 1:04 PM 7/12/2010
Signers
[+] Xara Ltd
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer Thawte Code Signing CA
Valid from 11:00 PM 09/14/2009
Valid to 10:59 PM 09/23/2010
Valid usage Code Signing, 1.3.6.1.4.1.311.2.1.22
Algorithm sha1RSA
Thumbprint 94B7A91694F52F948615AAF51D21D6E22F2D7C26
Serial number 42 7A 38 92 38 7B FA 30 24 35 9C 59 BF 01 6E 15
[+] Thawte Code Signing CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Premium Server CA
Valid from 11:00 PM 08/05/2003
Valid to 10:59 PM 08/05/2013
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint A706BA1ECAB6A2AB18699FC0D7DD8C7DE36F290F
Serial number 0A
[+] thawte
Status Valid
Issuer Thawte Premium Server CA
Valid from 11:00 PM 07/31/1996
Valid to 11:59 PM 12/31/2020
Valid usage Server Auth, Code Signing
Algorithm md5RSA
Thumbprint 627F8D7827656399D27D7F9044C9FEB3F33EFA9A
Serial number 01
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 11:00 PM 06/14/2007
Valid to 10:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 12:00 AM 12/04/2003
Valid to 11:59 PM 12/03/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 12:00 AM 01/01/1997
Valid to 11:59 PM 12/31/2020
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, appended, Unicode, ZIP, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-05-31 08:58:16
Entry Point 0x00033762
Number of sections 4
PE sections
Overlays
MD5 e718875c268144ae6627e46971717123
File type application/zip
Offset 1032192
Size 50108184
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
InitCommonControlsEx
GetFileTitleW
GetWindowExtEx
SetMapMode
TextOutW
GetTextExtentPoint32W
GetRgnBox
SaveDC
CreateRectRgnIndirect
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
DeleteObject
GetObjectW
SetTextColor
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
PtVisible
ExtSelectClipRgn
ScaleViewportExtEx
SelectObject
SetWindowExtEx
GetTextColor
SetViewportExtEx
Escape
SetBkColor
GetBkColor
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetFileAttributesW
DuplicateHandle
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
MapViewOfFileEx
GetVolumeInformationW
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
SizeofResource
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
TlsGetValue
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
InterlockedDecrement
GlobalFindAtomW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
GlobalHandle
EnumSystemLocalesA
EnumResourceLanguagesW
SetThreadPriority
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointer
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
MulDiv
ExitThread
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GetVersion
SetCurrentDirectoryW
VirtualQuery
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
CreateEventW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
EnumResourceNamesW
CompareStringW
WriteFile
GlobalReAlloc
lstrcmpA
FindNextFileW
CompareStringA
FindFirstFileW
IsValidLocale
lstrcmpW
GetProcAddress
SetEvent
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
VirtualFree
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
InterlockedCompareExchange
WritePrivateProfileStringW
SuspendThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
GetLongPathNameW
WideCharToMultiByte
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
SHFileOperationW
ShellExecuteExW
PathIsUNCW
PathStripToRootW
PathIsRootW
PathFindExtensionW
PathFindFileNameW
MapWindowPoints
GetForegroundWindow
SetMenuItemBitmaps
LoadBitmapW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
GetDlgCtrlID
SendMessageW
UnregisterClassA
UnregisterClassW
GetClientRect
DrawTextW
GetNextDlgTabItem
CallNextHookEx
LoadImageW
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
CopyAcceleratorTableW
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetTopWindow
InvalidateRgn
GetMenuItemID
PtInRect
GetParent
UpdateWindow
GetPropW
EqualRect
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
ValidateRect
PeekMessageW
EnableWindow
CharUpperW
TranslateMessage
IsWindowEnabled
GetWindow
RegisterClassW
GetWindowPlacement
DestroyWindow
IsIconic
GetSubMenu
LoadStringW
IsDialogMessageW
CopyRect
GetSysColorBrush
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsChild
SetFocus
RegisterWindowMessageW
BeginPaint
OffsetRect
DefWindowProcW
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
GetWindowRect
InflateRect
SetCapture
ReleaseCapture
IntersectRect
RemovePropW
SendDlgItemMessageW
PostMessageW
CheckMenuItem
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
PostThreadMessageW
GetMenuItemCount
GetMenuState
SetWindowsHookExW
LoadCursorW
LoadIconW
DispatchMessageW
SetForegroundWindow
GetAsyncKeyState
CreateDialogIndirectParamW
ReleaseDC
DrawTextExW
EndDialog
SetWindowContextHelpId
GetCapture
ScreenToClient
MessageBeep
GetWindowThreadProcessId
MessageBoxW
GetMenu
UnhookWindowsHookEx
MoveWindow
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
SystemParametersInfoA
EnableMenuItem
IsWindowVisible
WinHelpW
GetDesktopWindow
SystemParametersInfoW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
IsRectEmpty
GetFocus
ReplyMessage
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
OleUninitialize
CoTaskMemFree
OleInitialize
CoRevokeClassObject
OleFlushClipboard
CLSIDFromProgID
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
CoTaskMemAlloc
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
OleUIBusyW
Number of PE resources by type
RT_STRING 91
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_ICON 8
RT_DIALOG 6
RT_RCDATA 5
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
GERMAN 134
NEUTRAL 11
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
577536

ImageVersion
0.0

ProductName
Xara Web Designer 6

MX_StubVersion
1.1.0.53

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
8.0

FileOS
Win32

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.0.1.13296

TimeStamp
2010:05:31 10:58:16+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
6.0.1.13296

FileDescription
Xara Web Designer 6 (en-GB)

OSVersion
4.0

MX_Culture
en-GB

LegalCopyright
Copyright Xara Group Ltd

MachineType
Intel 386 or later, and compatibles

FileVersionNumber
6.0.1.13296

CompanyName
Xara Group Ltd

CodeSize
450560

FileSubtype
0

ProductVersionNumber
6.0.1.13296

EntryPoint
0x33762

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 790b5f05e37c77b3bf1f9f4c16a7ab59
SHA1 44d7f9fb892755220b3a333320727b04c4489f49
SHA256 4a9fba855fe7d011b565f1257cf1cdb16e9de96fe4f7dd608472526d9062c5cc
ssdeep
786432:9Iq1NO9mCf3HSPLWw0Ki0QtII24dtqiYJFOXBm54rwmJpDtuBS8qjd:mqm+VKtIf4dtAWBpjuBS8qB

authentihash b25dfdf8989529d0f1e97aba09a8782b21ef61743db0f69ebedd1e09130bd24b
imphash 2d52548f772592f9cef65667563e7fd5
File size 48.8 MB ( 51140376 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win64 Executable (generic) (72.3%)
Win32 Executable (generic) (11.8%)
OS/2 Executable (generic) (5.3%)
Generic Win/DOS Executable (5.2%)
DOS Executable Generic (5.2%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2013-11-12 12:14:04 UTC ( 5 years, 4 months ago )
Last submission 2016-03-17 01:14:30 UTC ( 3 years ago )
File names 4A9FBA855FE7D011B565F1257CF1CDB16E9DE96FE4F7DD608472526D9062C5CC.exe
410413
webdesigner6dl.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!