× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9389d7c9c70edb79cf29ec67daf9a8d1d3bbd7030bf030020f3154831660106b
File name: dlm_photostory_2018_deluxe.exe
Detection ratio: 0 / 68
Analysis date: 2018-02-14 00:05:02 UTC ( 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20180213
AegisLab 20180213
AhnLab-V3 20180213
Alibaba 20180209
ALYac 20180213
Antiy-AVL 20180213
Arcabit 20180213
Avast 20180213
Avast-Mobile 20180213
AVG 20180213
Avira (no cloud) 20180213
AVware 20180210
Baidu 20180208
BitDefender 20180213
Bkav 20180212
CAT-QuickHeal 20180213
ClamAV 20180213
CMC 20180213
Comodo 20180213
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180214
Cyren 20180213
DrWeb 20180214
eGambit 20180214
Emsisoft 20180213
Endgame 20171130
ESET-NOD32 20180213
F-Prot 20180213
F-Secure 20180211
Fortinet 20180213
GData 20180213
Ikarus 20180213
Sophos ML 20180121
Jiangmin 20180213
K7AntiVirus 20180213
K7GW 20180213
Kaspersky 20180213
Kingsoft 20180214
Malwarebytes 20180213
MAX 20180214
McAfee 20180213
McAfee-GW-Edition 20180213
Microsoft 20180214
eScan 20180213
NANO-Antivirus 20180213
nProtect 20180213
Palo Alto Networks (Known Signatures) 20180214
Panda 20180213
Qihoo-360 20180214
Rising 20180213
SentinelOne (Static ML) 20180115
Sophos AV 20180213
SUPERAntiSpyware 20180213
Symantec 20180213
Symantec Mobile Insight 20180212
Tencent 20180214
TheHacker 20180213
TotalDefense 20180213
TrendMicro 20180213
TrendMicro-HouseCall 20180213
Trustlook 20180214
VBA32 20180213
VIPRE 20180213
ViRobot 20180213
Webroot 20180214
WhiteArmor 20180205
Yandex 20180213
Zillya 20180213
ZoneAlarm by Check Point 20180213
Zoner 20180213
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © MAGIX Software GmbH

Product MAGIX Photostory Deluxe (en-US)
File version 1.3.41.37
Description MAGIX Photostory Deluxe (en-US)
Signature verification Signed file, verified signature
Signing date 3:08 PM 9/27/2017
Signers
[+] MAGIX Software GmbH
Status Valid
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 3/3/2017
Valid to 12:59 AM 4/2/2020
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 6586F58CFA29012106CB2AE0A9398B43CC8D44E2
Serial number 7F 7A 98 21 56 28 D3 AC 30 A9 EA 87 35 C1 BA 22
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2017-02-20 16:55:50
Entry Point 0x0004EAD6
Number of sections 5
PE sections
Overlays
MD5 dde25d32fecbf2b9dbbe5a432b797302
File type data
Offset 1417216
Size 3530872
Entropy 8.00
PE imports
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
RegSetValueExW
RegEnumValueW
RegEnumKeyW
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
InitCommonControlsEx
GetWindowExtEx
SetMapMode
TextOutW
CreateFontIndirectW
GetRgnBox
SaveDC
CreateRectRgnIndirect
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
DeleteObject
GetObjectW
SetTextColor
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
PtVisible
ExtSelectClipRgn
ScaleViewportExtEx
SelectObject
SetWindowExtEx
GetTextColor
CreateSolidBrush
SetViewportExtEx
Escape
GetViewportExtEx
GetBkColor
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
WaitForSingleObject
SetEndOfFile
EncodePointer
GetFileAttributesW
lstrcmpW
GetExitCodeProcess
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
MapViewOfFileEx
UnhandledExceptionFilter
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
FindResourceExW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
CreateEventW
OutputDebugStringW
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
TlsGetValue
MoveFileW
GetFullPathNameW
OutputDebugStringA
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
InitializeCriticalSection
GlobalFindAtomW
GetUserDefaultLangID
LoadResource
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GlobalHandle
SetThreadPriority
EnumSystemLocalesW
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
GetPrivateProfileStringW
GetModuleHandleA
SetFileAttributesW
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
GetSystemDefaultUILanguage
SetUnhandledExceptionFilter
MulDiv
IsProcessorFeaturePresent
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
VirtualQuery
GetDiskFreeSpaceExW
ReadConsoleW
GetVersion
GetProcAddress
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
LoadLibraryA
RtlUnwind
UnlockFile
GetFileSize
GlobalDeleteAtom
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetPrivateProfileIntW
GetProcessHeap
CreateFileMappingW
EnumResourceNamesW
GetTimeFormatW
WriteFile
GetFileSizeEx
GlobalReAlloc
RemoveDirectoryW
GetFileInformationByHandle
lstrcmpA
FindNextFileW
GetCurrentThreadId
ResetEvent
FindFirstFileW
IsValidLocale
DuplicateHandle
WaitForMultipleObjects
GlobalLock
GlobalAlloc
SetEvent
GetTempPathW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
CompareStringW
GetThreadLocale
GetVolumeInformationW
GetEnvironmentStringsW
GlobalUnlock
LockFile
VirtualFree
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
HeapQueryInformation
WideCharToMultiByte
HeapSize
WritePrivateProfileStringW
SuspendThread
RaiseException
TlsFree
SetFilePointer
ReadFile
GlobalFlags
CloseHandle
GetACP
GetModuleHandleW
FreeResource
GetFileAttributesExW
IsValidCodePage
UnmapViewOfFile
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
CreateStdAccessibleObject
LresultFromObject
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
SHGetPathFromIDListW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
Ord(165)
PathIsUNCW
PathStripToRootW
PathFindExtensionW
PathFindFileNameW
RedrawWindow
GetForegroundWindow
SetMenuItemBitmaps
LoadBitmapW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
GetMessageTime
SetMenuItemInfoW
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetMenu
UnregisterClassW
GetClassInfoW
DefWindowProcW
DrawTextW
GetNextDlgTabItem
CallNextHookEx
LoadImageW
ClientToScreen
GetTopWindow
GetWindowTextW
SetDlgItemTextW
CopyAcceleratorTableW
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetActiveWindow
InvalidateRgn
GetMenuItemID
PtInRect
GetClassInfoExW
UpdateWindow
GetPropW
EqualRect
UnhookWindowsHookEx
GetMessageW
ShowWindow
DrawFrameControl
GetNextDlgGroupItem
SetPropW
GetDesktopWindow
PeekMessageW
EnableWindow
CharUpperW
TranslateMessage
IsWindowEnabled
GetWindow
RegisterClassW
LoadStringW
EnableMenuItem
GetSubMenu
SetTimer
IsDialogMessageW
FillRect
CopyRect
DeferWindowPos
RealChildWindowFromPoint
CreateWindowExW
TabbedTextOutW
GetWindowLongW
DestroyWindow
IsChild
MapWindowPoints
RegisterWindowMessageW
GetMonitorInfoW
BeginPaint
OffsetRect
SetFocus
KillTimer
GetParent
SendDlgItemMessageA
GetSystemMetrics
SetWindowLongW
GetWindowRect
SetCapture
ReleaseCapture
IntersectRect
PostMessageW
CheckMenuItem
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
PostThreadMessageW
GetMenuItemCount
ValidateRect
SetWindowsHookExW
LoadCursorW
LoadIconW
DispatchMessageW
SetForegroundWindow
CreateDialogIndirectParamW
ReleaseDC
DrawTextExW
EndDialog
SetWindowContextHelpId
GetCapture
MessageBeep
GetWindowThreadProcessId
GetSysColorBrush
BeginDeferWindowPos
MessageBoxW
SendMessageW
SetMenu
MoveWindow
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
EndDeferWindowPos
DestroyIcon
IsWindowVisible
WinHelpW
SystemParametersInfoW
MonitorFromWindow
SetRect
InvalidateRect
CharNextW
CallWindowProcW
GetClassNameW
GetClientRect
IsRectEmpty
GetFocus
SetCursor
ReplyMessage
RemovePropW
OpenThemeData
CloseThemeData
DrawThemeBackground
ClosePrinter
DocumentPropertiesW
OpenPrinterW
OleUninitialize
CoTaskMemFree
CoInitialize
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoUninitialize
CoCreateGuid
CoCreateInstance
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemAlloc
CLSIDFromString
CreateILockBytesOnHGlobal
CoGetClassObject
OleUIBusyW
Number of PE resources by type
RT_STRING 153
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_DIALOG 9
RT_ICON 8
RT_RCDATA 7
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 77
ENGLISH US 6
SWEDISH 5
HUNGARIAN DEFAULT 5
CZECH DEFAULT 5
FRENCH 5
CHINESE SIMPLIFIED 5
SLOVENIAN DEFAULT 5
DUTCH 5
SPANISH *unknown* 5
NORWEGIAN BOKMAL 5
FINNISH DEFAULT 5
ENGLISH UK 5
PORTUGUESE BRAZILIAN 5
SPANISH 5
FRENCH CANADIAN 5
KOREAN 5
ITALIAN 5
PORTUGUESE 5
GERMAN 5
ENGLISH CAN 5
POLISH DEFAULT 5
JAPANESE DEFAULT 5
DANISH DEFAULT 5
GREEK DEFAULT 5
TURKISH DEFAULT 5
CHINESE TRADITIONAL 5
RUSSIAN 5
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

MX_StubConfig
Release

LinkerVersion
12.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.3.41.37

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
MAGIX Photostory Deluxe (en-US)

MX_StubVersion
1.4.0.0

CharacterSet
Unicode

InitializedDataSize
787456

MX_Culture
en-US

EntryPoint
0x4ead6

MIMEType
application/octet-stream

LegalCopyright
Copyright MAGIX Software GmbH

FileVersion
1.3.41.37

TimeStamp
2017:02:20 17:55:50+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
1.3.41.37

UninitializedDataSize
0

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
MAGIX Software GmbH

CodeSize
664064

ProductName
MAGIX Photostory Deluxe (en-US)

ProductVersionNumber
1.3.41.37

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 c94001e6fbd60523f89d8e9120f165a9
SHA1 6cc73e754319df9817b48b9e14b9ed80e890483e
SHA256 9389d7c9c70edb79cf29ec67daf9a8d1d3bbd7030bf030020f3154831660106b
ssdeep
98304:Hz8a9RETzrwxmO6RCH7qQ0eUWEXQePtUV7H3cmAPCzpVyYJT:jRETzVOdH7tl10/O5XTaCBJT

authentihash fb9735a0091fe8f0dcf9012e4aa2037a21e4654a926e04f983ef88adeee08b2b
imphash 251c54de6a03a36243cdf348b3cbf6c2
File size 4.7 MB ( 4948088 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-10-24 04:44:46 UTC ( 8 months, 3 weeks ago )
Last submission 2018-05-25 09:43:02 UTC ( 1 month, 3 weeks ago )
File names dlm_photostory_2018_deluxe.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.
UDP communications