× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c08f376ac917717c406b3b12aaf8b9976219ed2425895cd134c3af0a6f988271
File name: dxo-viewpoint-7250-jetelecharge.exe
Detection ratio: 0 / 64
Analysis date: 2018-07-04 02:00:54 UTC ( 10 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180703
AegisLab 20180704
AhnLab-V3 20180703
ALYac 20180704
Antiy-AVL 20180704
Arcabit 20180704
Avast 20180703
Avast-Mobile 20180703
AVG 20180703
Avira (no cloud) 20180703
AVware 20180703
Babable 20180406
Baidu 20180703
BitDefender 20180703
Bkav 20180703
CAT-QuickHeal 20180703
ClamAV 20180703
CMC 20180703
Comodo 20180703
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cyren 20180704
DrWeb 20180704
eGambit 20180704
Emsisoft 20180704
Endgame 20180612
ESET-NOD32 20180704
F-Prot 20180704
F-Secure 20180704
Fortinet 20180704
GData 20180704
Ikarus 20180703
Sophos ML 20180601
Jiangmin 20180703
K7AntiVirus 20180703
K7GW 20180704
Kaspersky 20180704
Kingsoft 20180704
Malwarebytes 20180703
MAX 20180704
McAfee 20180704
McAfee-GW-Edition 20180703
Microsoft 20180703
eScan 20180704
NANO-Antivirus 20180704
Palo Alto Networks (Known Signatures) 20180704
Panda 20180703
Qihoo-360 20180704
SentinelOne (Static ML) 20180701
Sophos AV 20180704
SUPERAntiSpyware 20180703
Symantec 20180704
TACHYON 20180704
Tencent 20180704
TheHacker 20180628
TotalDefense 20180703
Trustlook 20180704
VBA32 20180629
VIPRE 20180703
ViRobot 20180703
Webroot 20180704
Yandex 20180703
Zillya 20180703
ZoneAlarm by Check Point 20180704
Zoner 20180703
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) DxO Labs

Product DxO ViewPoint 2
Original name InstallShield Setup.exe
Internal name Setup
File version 2.5.93.0
Description DxO ViewPoint 2
Signature verification Signed file, verified signature
Signing date 12:09 PM 9/14/2016
Signers
[+] DxO Labs
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 2/3/2016
Valid to 12:59 AM 11/23/2017
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint AE7AD79C4C3DAE2DFFB93D4A5B7FD7BE0C52C8BF
Serial number 78 EB BA 70 CD 42 2F DB B5 A7 FB E6 29 D4 1E 20
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] GeoTrust 2048-bit Timestamping Signer 4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 6/11/2015
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint D20F3891B90C1FAFD000E44458CD697ABC4E3A4C
Serial number 70 A0 1C F4 EA EF 99 FD 46 6C ED 16 30 C1 B0 1F
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-10-05 20:39:52
Entry Point 0x00068208
Number of sections 4
PE sections
Overlays
MD5 a53e8a4ea381333de9a79b355d3c71de
File type data
Offset 1586688
Size 55220128
Entropy 8.00
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
RegCreateKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
SetSecurityDescriptorDacl
OpenProcessToken
RegEnumKeyW
RegOpenKeyW
GetTokenInformation
RegQueryInfoKeyW
RegEnumKeyExW
OpenThreadToken
RegEnumValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
EqualSid
SetSecurityDescriptorGroup
GetDIBColorTable
GetSystemPaletteEntries
CreateHalftonePalette
GetDeviceCaps
TranslateCharsetInfo
DeleteDC
SetBkMode
CreateFontIndirectW
GetObjectW
BitBlt
RealizePalette
SetTextColor
CreatePalette
GetStockObject
CreateDIBitmap
SelectPalette
UnrealizeObject
CreateCompatibleDC
CreateFontW
SelectObject
CreateSolidBrush
DeleteObject
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
SetEvent
HeapDestroy
GetFileAttributesW
DuplicateHandle
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
ExitProcess
SetErrorMode
FreeEnvironmentStringsW
lstrcatW
GetThreadContext
GetLocaleInfoW
SetStdHandle
GetCPInfo
lstrcmpiA
GetStringTypeA
GetDiskFreeSpaceW
InterlockedExchange
FindResourceExW
WaitForSingleObject
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetExitCodeProcess
LocalFree
FormatMessageW
ResumeThread
CreateEventW
LoadResource
FindClose
InterlockedDecrement
MoveFileW
SetFileAttributesW
SetLastError
InitializeCriticalSection
CopyFileW
GetUserDefaultLangID
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
VerLanguageNameW
GetModuleFileNameA
LoadLibraryA
QueryPerformanceFrequency
EnumSystemLocalesA
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
FatalAppExitA
FlushInstructionCache
GetPrivateProfileStringW
SetFilePointer
CreateThread
GetSystemDirectoryW
GetExitCodeThread
SetUnhandledExceptionFilter
MulDiv
SetEnvironmentVariableA
SetThreadContext
TerminateProcess
SearchPathW
WriteConsoleA
SetCurrentDirectoryW
VirtualQuery
SetEndOfFile
GetVersion
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
FlushFileBuffers
lstrcmpiW
RtlUnwind
GetStartupInfoA
GetDateFormatA
GetWindowsDirectoryW
GetFileSize
WriteProcessMemory
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
VirtualProtectEx
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
WriteFile
CompareStringW
lstrcpyW
RemoveDirectoryW
ExpandEnvironmentStringsW
lstrcmpA
FindNextFileW
lstrcpyA
GetTimeFormatA
ResetEvent
FindFirstFileW
IsValidLocale
lstrcmpW
GetProcAddress
GetTempPathW
GetCurrentDirectoryW
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetTimeFormatW
GetProcessTimes
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
CreateProcessW
SizeofResource
CompareFileTime
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCurrentThread
lstrcpynW
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
lstrcpynA
GetACP
GlobalLock
GetModuleHandleW
TlsGetValue
IsValidCodePage
HeapCreate
FindResourceW
VirtualFree
Sleep
IsBadReadPtr
VirtualAlloc
GetOEMCP
CompareStringA
VarUI4FromStr
VarBstrCat
SysStringLen
SystemTimeToVariantTime
SysStringByteLen
CreateErrorInfo
SysAllocStringLen
VarBstrFromDate
VariantChangeType
VariantClear
SysAllocString
SysReAllocStringLen
RegisterTypeLib
LoadTypeLib
GetErrorInfo
SysFreeString
SysAllocStringByteLen
SetErrorInfo
UuidFromStringW
UuidCreate
RpcStringFreeW
UuidToStringW
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetMalloc
CommandLineToArgvW
SetFocus
EndPaint
CreateDialogIndirectParamW
IntersectRect
EndDialog
BeginPaint
SetWindowTextW
TranslateMessage
DefWindowProcW
MoveWindow
KillTimer
CharPrevW
PostQuitMessage
ShowWindow
GetMessageW
SetWindowPos
wvsprintfW
GetDesktopWindow
GetSystemMetrics
SetWindowLongW
IsWindow
PeekMessageW
GetWindowRect
EnableWindow
CharUpperW
GetWindowDC
SendDlgItemMessageW
GetWindow
PostMessageW
GetSysColor
DispatchMessageW
SetActiveWindow
GetDC
CreateDialogParamW
ReleaseDC
GetDlgCtrlID
SendMessageW
RegisterClassW
wsprintfW
SubtractRect
SetTimer
GetDlgItem
GetDlgItemTextW
MessageBoxW
FindWindowW
ClientToScreen
SetRect
CharNextW
LoadImageW
IsDialogMessageW
FillRect
GetClientRect
WaitForInputIdle
SetDlgItemTextW
GetSysColorBrush
DialogBoxIndirectParamW
LoadCursorW
LoadIconW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
SetForegroundWindow
DestroyWindow
ExitWindowsEx
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ProgIDFromCLSID
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoCreateInstance
CoCreateGuid
CoTaskMemRealloc
CLSIDFromProgID
CoInitializeSecurity
GetRunningObjectTable
CoTaskMemFree
StringFromGUID2
CreateItemMoniker
Number of PE resources by type
RT_STRING 25
RT_DIALOG 23
RT_ICON 11
RT_BITMAP 6
RT_GROUP_ICON 3
GIF 2
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
NEUTRAL 46
ENGLISH US 26
PE resources
Debug information
ExifTool file metadata
FileTypeExtension
exe

UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

ProductName
DxO ViewPoint 2

FileVersionNumber
2.5.93.0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

LegalCopyright
Copyright (c) DxO Labs

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
885248

InternalBuildNumber
99584

OriginalFileName
InstallShield Setup.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
2.5.93.0

TimeStamp
2010:10:05 21:39:52+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Setup

SubsystemVersion
5.0

ProductVersion
2.5.93.0

FileDescription
DxO ViewPoint 2

ISInternalDescription
Setup Launcher Unicode

OSVersion
5.0

FileOS
Win32

ISInternalVersion
17.0.717

MachineType
Intel 386 or later, and compatibles

CompanyName
DxO Labs

CodeSize
700416

FileSubtype
0

ProductVersionNumber
2.5.93.0

EntryPoint
0x68208

ObjectFileType
Dynamic link library

File identification
MD5 c47dafd399b65703c848d6d127af8cd5
SHA1 1b3bb0aa4c637acddbfc305fca47d187270826bd
SHA256 c08f376ac917717c406b3b12aaf8b9976219ed2425895cd134c3af0a6f988271
ssdeep
786432:MuLwySM2cY2phy8wUcNObNHPxdwfc1atSENwXibkS6anvTHkdAoR4QnZ/prddW+c:MuLjhyF8bRvkc1atRV7vTlo7Z/prd0B

authentihash 466eeb9b74b9e978afb2046c159a8d549a2a5fb81a57ca4f40d77a4f10bb87d3
imphash f18e688283da41095f81f4c165a6dcf3
File size 54.2 MB ( 56806816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (53.0%)
Win64 Executable (generic) (34.0%)
Win32 Executable (generic) (5.5%)
OS/2 Executable (generic) (2.4%)
Generic Win/DOS Executable (2.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-09-21 11:27:30 UTC ( 2 years, 8 months ago )
Last submission 2018-07-04 02:00:54 UTC ( 10 months, 3 weeks ago )
File names InstallShield Setup.exe
DxO_ViewPoint_Setup.exe
DxO_ViewPoint_Setup.exe
DxO_ViewPoint_Setup.exe
920582
Setup
DxO_ViewPoint_Setup.exe
DxO_ViewPoint_Setup-2016-09.exe
DxO_ViewPoint_Setup.exe
DxO_ViewPoint_Setup_2.5.17.exe
dxo-viewpoint-7250-jetelecharge.exe
DxO_ViewPoint_Setup.exe
DxO_ViewPoint_Setup (3).exe
DxO_ViewPoint_Setup (1).exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!