× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d6592aeee6b95c700c75481665ac5f3147e2555cc92e1703287c2b9e5f344b25
File name: PDFLogoRemover.exe
Detection ratio: 0 / 46
Analysis date: 2013-04-08 05:17:12 UTC ( 1 year ago ) View latest
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20130407
Agnitum 20130407
AhnLab-V3 20130407
AntiVir 20130408
Antiy-AVL 20130408
Avast 20130408
BitDefender 20130408
ByteHero 20130405
CAT-QuickHeal 20130408
ClamAV 20130408
Commtouch 20130408
Comodo 20130408
DrWeb 20130408
ESET-NOD32 20130407
Emsisoft 20130408
F-Prot 20130408
F-Secure 20130408
Fortinet 20130408
GData 20130408
Ikarus 20130408
Jiangmin 20130408
K7AntiVirus 20130405
Kaspersky 20130408
Kingsoft 20130401
Malwarebytes 20130407
McAfee 20130408
McAfee-GW-Edition 20130408
MicroWorld-eScan 20130408
Microsoft 20130408
NANO-Antivirus 20130408
Norman 20130407
PCTools 20130408
Panda 20130407
Rising 20130403
SUPERAntiSpyware 20130407
Sophos 20130408
Symantec 20130408
TheHacker 20130408
TotalDefense 20130407
TrendMicro 20130408
TrendMicro-HouseCall 20130408
VBA32 20130406
VIPRE 20130408
ViRobot 20130408
eSafe 20130407
nProtect 20130407
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright

Publisher SoftOrbits
Product PDF Logo Remover
File version
Description PDF Logo Remover Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 11:54 PM 2/6/2012
Signers
[+] SoftOrbits
Status Certificate out of its validity period
Valid from 1:00 AM 1/22/2012
Valid to 12:59 AM 2/21/2013
Valid usage Code Signing
Algorithm SHA1
Thumbrint DBAFD1841C8E8562C4C506EB8D8648A6D2815986
Serial number 14 4C 97 5B 08 01 1F AB 22 33 6F ED 3C 94 70 FA
[+] VeriSign Class 3 Code Signing 2010 CA
Status Valid
Valid from 1:00 AM 2/8/2010
Valid to 12:59 AM 2/8/2020
Valid usage Client Auth, Code Signing
Algorithm SHA1
Thumbrint 495847A93187CFB8C71F840CB7B41497AD95C64F
Serial number 52 00 E5 AA 25 56 FC 1A 86 ED 96 C9 D4 4B 33 C7
[+] VeriSign
Status Valid
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm SHA1
Thumbrint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status Certificate out of its validity period
Valid from 1:00 AM 6/15/2007
Valid to 12:59 AM 6/15/2012
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-04-10 16:57:59
Entry Point 0x000163C4
Number of sections 9
PE sections
PE imports
RegCloseKey
OpenProcessToken
RegOpenKeyExW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegQueryValueExW
InitCommonControls
GetLastError
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetModuleFileNameW
WaitForSingleObject
GetVersionExW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetThreadLocale
VirtualProtect
GetFileAttributesW
RtlUnwind
lstrlenW
GetLocalTime
CreateProcessW
DeleteCriticalSection
GetStartupInfoA
SizeofResource
GetWindowsDirectoryW
LocalAlloc
LockResource
GetDiskFreeSpaceW
GetCommandLineW
SetErrorMode
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
EnumCalendarInfoW
GetCPInfo
DeleteFileW
GetProcAddress
GetDateFormatW
InterlockedCompareExchange
GetLocaleInfoW
lstrcpynW
CompareStringW
RaiseException
WideCharToMultiByte
RemoveDirectoryW
SetFilePointer
GetFullPathNameW
ReadFile
GetEnvironmentVariableW
InterlockedExchange
CreateDirectoryW
WriteFile
GetCurrentProcess
CloseHandle
FindFirstFileW
GetACP
GetModuleHandleW
SignalObjectAndWait
SetEvent
FormatMessageW
LoadLibraryW
CreateEventW
GetExitCodeProcess
GetVersion
InitializeCriticalSection
LoadResource
FindResourceW
CreateFileW
VirtualQuery
VirtualFree
FindClose
TlsGetValue
Sleep
SetEndOfFile
TlsSetValue
ExitProcess
GetCurrentThreadId
LeaveCriticalSection
VirtualAlloc
GetFileSize
SetLastError
ResetEvent
VariantChangeType
SafeArrayGetLBound
SafeArrayPtrOfIndex
SysAllocStringLen
VariantClear
SafeArrayCreate
SysReAllocStringLen
SafeArrayGetUBound
VariantCopy
SysFreeString
VariantInit
GetSystemMetrics
SetWindowLongW
MessageBoxW
PeekMessageW
LoadStringW
MessageBoxA
CreateWindowExW
MsgWaitForMultipleObjects
TranslateMessage
CharUpperBuffW
CallWindowProcW
CharNextW
GetKeyboardType
ExitWindowsEx
DispatchMessageW
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_RCDATA 4
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 9
ENGLISH US 4
DUTCH 4
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
60416

MIMEType
application/octet-stream

TimeStamp
2010:04:10 17:57:59+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

FileAccessDate
2014:04:03 08:47:39+01:00

FileDescription
PDF Logo Remover Setup

OSVersion
5.0

FileCreateDate
2014:04:03 08:47:39+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
SoftOrbits

CodeSize
87040

ProductName
PDF Logo Remover

ProductVersionNumber
0.0.0.0

EntryPoint
0x163c4

ObjectFileType
Executable application

File identification
MD5 552260a6d1c0664fd61e6b256cf10833
SHA1 67f51e2a9f43caed275fdde53084784444044b14
SHA256 d6592aeee6b95c700c75481665ac5f3147e2555cc92e1703287c2b9e5f344b25
ssdeep
98304:YbnjgP4yq/b7t9/F7kMRJpTc/jYkl1VoG5j7ypvWOY7uIZcpLvsIhuottCw1Jvqu:YbnBJ/brKs9c/kkl1W4/KWOY7VZCLTEi

imphash 483f0c4259a9148c34961abbda6146c1
File size 5.7 MB ( 5934256 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (86.4%)
Win32 Dynamic Link Library (generic) (5.1%)
Win32 Executable (generic) (3.5%)
Win16/32 Executable Delphi generic (1.6%)
Generic Win/DOS Executable (1.5%)
Tags
peexe signed

VirusTotal metadata
First submission 2012-04-22 14:50:31 UTC ( 1 year, 12 months ago )
Last submission 2014-04-03 07:47:37 UTC ( 2 weeks ago )
File names PDF-Logo-Remover_1.0.exe
file-3838311_exe
pdflogoremover.exe
PDFLogoRemover.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.