× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d5ec3eec813231cfd627bc4aac10e0c09df57a11e4555782296d38a4cec6ba05
File name: photo_designer_7_28mb_us.exe
Detection ratio: 1 / 44
Analysis date: 2013-10-04 14:03:34 UTC ( 5 years, 3 months ago ) View latest
Antivirus Result Update
ESET-NOD32 a variant of Win32/Bundled.Toolbar.Ask 20131004
Yandex 20131003
AhnLab-V3 20131004
AntiVir 20131004
Antiy-AVL 20131003
Avast 20131004
AVG 20131004
Baidu-International 20131004
BitDefender 20131004
Bkav 20131004
ByteHero 20130919
CAT-QuickHeal 20131004
ClamAV 20131003
Commtouch 20131004
Comodo 20131004
DrWeb 20131004
Emsisoft 20131004
F-Prot 20131003
F-Secure 20131004
Fortinet 20131004
GData 20131004
Ikarus 20131004
Jiangmin 20130903
K7AntiVirus 20131003
K7GW 20131003
Kaspersky 20131004
Kingsoft 20130829
Malwarebytes 20131004
McAfee 20131004
McAfee-GW-Edition 20131004
Microsoft 20131004
eScan 20131004
NANO-Antivirus 20131004
Norman 20131004
nProtect 20131004
Panda 20131004
PCTools 20131002
Rising 20130930
Sophos AV 20131004
SUPERAntiSpyware 20131004
Symantec 20131004
TheHacker 20131004
TotalDefense 20131003
TrendMicro 20131004
TrendMicro-HouseCall 20131004
VBA32 20131004
VIPRE 20131004
ViRobot 20131004
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © MAGIX AG

Product MAGIX Photo Designer 7
File version 7.0.1.1
Description MAGIX Photo Designer 7 (en-GB)
Signature verification Signed file, verified signature
Signing date 1:47 PM 2/28/2011
Signers
[+] Magix AG
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2010 CA
Valid from 1:00 AM 11/17/2010
Valid to 12:59 AM 11/25/2011
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint D0B7F7021AE4CD7F80661F318410E7A8070C7B64
Serial number 74 A3 1A 96 D1 09 8A 80 B0 7D C9 4F 11 9E FB BF
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 1:00 AM 6/15/2007
Valid to 12:59 AM 6/15/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, appended, Unicode, ZIP, UTF-8
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-08-12 14:30:28
Entry Point 0x000321DF
Number of sections 4
PE sections
Overlays
MD5 8bb6ca4f18a4aada79bce14ca49de270
File type application/zip
Offset 999424
Size 28561392
Entropy 8.00
PE imports
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegOpenKeyExW
RegEnumKeyW
RegOpenKeyW
RegDeleteKeyW
RegQueryValueExW
RegQueryValueW
InitCommonControlsEx
GetFileTitleW
GetWindowExtEx
SetMapMode
TextOutW
GetRgnBox
SaveDC
CreateRectRgnIndirect
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
DeleteObject
GetObjectW
SetTextColor
ExtTextOutW
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
GetViewportExtEx
PtVisible
ExtSelectClipRgn
ScaleViewportExtEx
SelectObject
SetWindowExtEx
GetTextColor
SetViewportExtEx
Escape
SetBkColor
GetBkColor
GetStdHandle
GetDriveTypeW
GetConsoleOutputCP
FileTimeToSystemTime
WaitForSingleObject
HeapDestroy
GetFileAttributesW
DuplicateHandle
GetExitCodeProcess
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
MapViewOfFileEx
GetVolumeInformationW
SetErrorMode
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetFileTime
GetCPInfo
GetStringTypeA
InterlockedExchange
GetTempPathW
GetSystemTimeAsFileTime
SizeofResource
HeapReAlloc
GetStringTypeW
FreeLibrary
LocalFree
FormatMessageW
ResumeThread
InitializeCriticalSection
LoadResource
GetStringTypeExW
GetLogicalDriveStringsW
FindClose
InterlockedDecrement
GetFullPathNameW
GetCurrentThread
SetLastError
GetUserDefaultUILanguage
TlsGetValue
GlobalFindAtomW
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
FlushFileBuffers
GetModuleFileNameA
GlobalHandle
EnumSystemLocalesA
EnumResourceLanguagesW
SetThreadPriority
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointer
GlobalAddAtomW
CreateThread
GetSystemDirectoryW
SetUnhandledExceptionFilter
ConvertDefaultLocale
MulDiv
ExitThread
SetEnvironmentVariableA
TerminateProcess
WriteConsoleA
GetVersion
SetCurrentDirectoryW
VirtualQuery
LocalFileTimeToFileTime
GetDiskFreeSpaceExW
CreateEventW
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
HeapFree
EnterCriticalSection
SetHandleCount
LoadLibraryW
GetVersionExW
GetOEMCP
QueryPerformanceCounter
GetTickCount
TlsAlloc
VirtualProtect
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetUserDefaultLCID
GetProcessHeap
GetTempFileNameW
CreateFileMappingW
EnumResourceNamesW
CompareStringW
WriteFile
GlobalReAlloc
lstrcmpA
CompareStringA
FindFirstFileW
IsValidLocale
lstrcmpW
GetProcAddress
SetEvent
GetTimeZoneInformation
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetLastError
LocalReAlloc
DosDateTimeToFileTime
LCMapStringW
UnmapViewOfFile
GetSystemInfo
lstrlenA
GlobalFree
GetConsoleCP
LCMapStringA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
GlobalAlloc
lstrlenW
VirtualFree
LockFile
FileTimeToLocalFileTime
GetEnvironmentStrings
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
InterlockedCompareExchange
WritePrivateProfileStringW
SuspendThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
GetACP
GlobalLock
GetModuleHandleW
FreeResource
GetFileAttributesExW
GetLongPathNameW
IsValidCodePage
HeapCreate
FindResourceW
CreateProcessW
Sleep
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SystemTimeToVariantTime
SysAllocStringLen
OleCreateFontIndirect
VariantClear
SysAllocString
SafeArrayDestroy
VariantCopy
SysFreeString
VariantInit
SHFileOperationW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
PathIsUNCW
PathStripToRootW
PathIsRootW
PathFindExtensionW
PathFindFileNameW
MapWindowPoints
GetForegroundWindow
SetMenuItemBitmaps
LoadBitmapW
DestroyMenu
PostQuitMessage
GetMessagePos
SetWindowPos
IsWindow
GrayStringW
EndPaint
GetMessageTime
SetActiveWindow
GetDC
GetCursorPos
MapDialogRect
GetDlgCtrlID
SendMessageW
UnregisterClassA
UnregisterClassW
GetClientRect
DrawTextW
GetNextDlgTabItem
CallNextHookEx
LoadImageW
GetActiveWindow
GetWindowTextW
SetDlgItemTextW
CopyAcceleratorTableW
GetWindowTextLengthW
MsgWaitForMultipleObjects
GetTopWindow
InvalidateRgn
GetMenuItemID
PtInRect
GetParent
UpdateWindow
GetPropW
EqualRect
GetMessageW
ShowWindow
GetNextDlgGroupItem
SetPropW
ValidateRect
PeekMessageW
EnableWindow
CharUpperW
TranslateMessage
IsWindowEnabled
GetWindow
RegisterClassW
GetWindowPlacement
DestroyWindow
SetWindowLongW
EnableMenuItem
GetSubMenu
LoadStringW
IsDialogMessageW
CopyRect
GetSysColorBrush
GetClassInfoW
CreateWindowExW
TabbedTextOutW
GetWindowLongW
CharNextW
IsChild
SetFocus
RegisterWindowMessageW
BeginPaint
OffsetRect
DefWindowProcW
GetClassInfoExW
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
SetCapture
ReleaseCapture
IntersectRect
RemovePropW
SendDlgItemMessageW
PostMessageW
CheckMenuItem
GetClassLongW
GetLastActivePopup
SetWindowTextW
GetDlgItem
GetMenuCheckMarkDimensions
ClientToScreen
PostThreadMessageW
GetMenuItemCount
GetMenuState
SetWindowsHookExW
LoadCursorW
LoadIconW
DispatchMessageW
SetForegroundWindow
CreateDialogIndirectParamW
ReleaseDC
DrawTextExW
EndDialog
SetWindowContextHelpId
GetCapture
MessageBeep
GetWindowThreadProcessId
MessageBoxW
GetMenu
UnhookWindowsHookEx
MoveWindow
GetWindowDC
AdjustWindowRectEx
GetSysColor
RegisterClipboardFormatW
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpW
GetDesktopWindow
SystemParametersInfoW
SetRect
InvalidateRect
CallWindowProcW
GetClassNameW
ModifyMenuW
IsRectEmpty
GetFocus
ReplyMessage
SetCursor
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
ClosePrinter
DocumentPropertiesW
OpenPrinterW
OleUninitialize
CLSIDFromProgID
CoInitialize
OleInitialize
CoRevokeClassObject
OleFlushClipboard
CoUninitialize
CLSIDFromString
CoCreateInstance
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
StgCreateDocfileOnILockBytes
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
CoGetClassObject
OleUIBusyW
Number of PE resources by type
RT_STRING 91
RT_CURSOR 16
RT_GROUP_CURSOR 15
RT_ICON 8
RT_DIALOG 6
RT_RCDATA 5
RT_BITMAP 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
GERMAN 134
NEUTRAL 11
ENGLISH US 1
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
573440

ImageVersion
0.0

ProductName
MAGIX Photo Designer 7

MX_StubVersion
1.1.0.53

UninitializedDataSize
0

LanguageCode
Neutral

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Windows, Latin1

LinkerVersion
8.0

FileOS
Win32

FileTypeExtension
exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
7.0.1.1

TimeStamp
2010:08:12 15:30:28+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
7.0.1.1

FileDescription
MAGIX Photo Designer 7 (en-GB)

OSVersion
4.0

MX_Culture
en-GB

LegalCopyright
Copyright MAGIX AG

MachineType
Intel 386 or later, and compatibles

FileVersionNumber
7.0.1.1

CompanyName
MAGIX AG

CodeSize
421888

FileSubtype
0

ProductVersionNumber
7.0.1.1

EntryPoint
0x321df

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
File identification
MD5 20f7df9276934ec342b8a5855825603f
SHA1 34d719b3f34372ba6e4ed1932227acb505ba6661
SHA256 d5ec3eec813231cfd627bc4aac10e0c09df57a11e4555782296d38a4cec6ba05
ssdeep
786432:ALsScQIiZNO9EE1zQgo9NvqEfpmsO75cFnU6EQ+o2bQ5:aCdEExuBq0p3OAh+o2b4

authentihash 185b518374b82149d16e79b68d442dd6b84031f6b9e765f2893f7c026f607031
imphash ad14b119903bc1aea71f7ca9fc22f265
File size 28.2 MB ( 29560816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2012-06-13 16:59:31 UTC ( 6 years, 7 months ago )
Last submission 2018-05-11 00:07:59 UTC ( 8 months, 1 week ago )
File names photo_designer_7_28mb_us.exe
D5EC3EEC813231CFD627BC4AAC10E0C09DF57A11E4555782296D38A4CEC6BA05
MAGIX Photo Designer_7.0.exe
photo_designer_7.0.exe
aa
Magix Photo Designer_7.0.1.1.exe
photo_designer_7_28mb_us.exe
lp7NUzlDj6.gif
693.exe
octet-stream
magix photo_designer_7_28mb_us.exe
magix-photo-designer-7_7.0.exe
WlmIG.bz2
photo_designer_7_28mb_us.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!