× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f643d8c78e76d7721e129385d0d2181ee973c7a32e97f5b9da88e999ebf78a27
File name: ppadsetup.exe
Detection ratio: 0 / 68
Analysis date: 2019-04-20 19:10:04 UTC ( 1 month ago ) View latest
Antivirus Result Update
Acronis 20190419
Ad-Aware 20190420
AegisLab 20190420
AhnLab-V3 20190420
Alibaba 20190402
ALYac 20190420
Antiy-AVL 20190419
Arcabit 20190420
Avast 20190420
Avast-Mobile 20190415
AVG 20190420
Avira (no cloud) 20190420
Babable 20180918
Baidu 20190318
BitDefender 20190420
Bkav 20190420
CAT-QuickHeal 20190420
ClamAV 20190420
CMC 20190321
Comodo 20190420
CrowdStrike Falcon (ML) 20190212
Cybereason 20190417
Cyren 20190420
DrWeb 20190420
eGambit 20190420
Emsisoft 20190420
Endgame 20190403
ESET-NOD32 20190420
F-Prot 20190420
F-Secure 20190420
FireEye 20190420
Fortinet 20190420
GData 20190420
Ikarus 20190420
Sophos ML 20190313
Jiangmin 20190420
K7AntiVirus 20190420
K7GW 20190420
Kaspersky 20190420
Kingsoft 20190420
Malwarebytes 20190420
MAX 20190420
MaxSecure 20190420
McAfee 20190420
McAfee-GW-Edition 20190420
Microsoft 20190420
eScan 20190420
NANO-Antivirus 20190420
Palo Alto Networks (Known Signatures) 20190420
Panda 20190420
Qihoo-360 20190420
Rising 20190420
SentinelOne (Static ML) 20190420
Sophos AV 20190420
SUPERAntiSpyware 20190418
Symantec Mobile Insight 20190418
TACHYON 20190421
Tencent 20190420
TheHacker 20190419
TotalDefense 20190416
Trapmine 20190325
TrendMicro-HouseCall 20190420
Trustlook 20190420
VBA32 20190419
ViRobot 20190420
Yandex 20190419
Zillya 20190419
ZoneAlarm by Check Point 20190420
Zoner 20190420
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
NCH Software

Product PhotoPad
Original name PhotoPad.exe
Internal name PhotoPad
File version 5.09+
Description PhotoPad Image Editor
Signature verification Signed file, verified signature
Signing date 12:56 AM 3/28/2019
Signers
[+] NCH Software, Inc.
Status Valid
Issuer DigiCert EV Code Signing CA
Valid from 01:00 AM 03/23/2019
Valid to 12:00 PM 03/30/2022
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 9B124A8ED8791E75C97255EDC2AD48DECA01DB8B
Serial number 0A 01 C3 FF 88 55 F0 08 C8 E4 FA 63 97 32 52 E6
[+] DigiCert EV Code Signing CA
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 12:00 PM 04/18/2012
Valid to 12:00 PM 04/18/2027
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 846896AB1BCF45734855C61B63634DFD8719625B
Serial number 0D D0 E3 37 4A C9 5B DB FA 6B 43 4B 2A 48 EC 06
[+] DigiCert
Status Valid
Issuer DigiCert High Assurance EV Root CA
Valid from 01:00 AM 11/10/2006
Valid to 01:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
Serial number 02 AC 5C 26 6A 0B 40 9B 8F 0B 79 F2 AE 46 25 77
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 12:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 01/01/1997
Valid to 12:59 AM 01/01/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-23 03:23:38
Entry Point 0x000011D4
Number of sections 5
PE sections
Overlays
MD5 5d1b13c006b9eefc937d99c573cc4989
File type data
Offset 1585152
Size 14344
Entropy 7.25
PE imports
GetLastError
GetModuleFileNameW
WaitForSingleObject
FreeLibrary
ExitProcess
LoadLibraryA
VerSetConditionMask
RemoveDirectoryW
SizeofResource
LockResource
GetCommandLineW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
WriteFile
lstrcpyW
SetEnvironmentVariableW
GetTempPathW
CloseHandle
GetModuleHandleW
GetExitCodeProcess
LoadResource
FindResourceW
CreateFileW
SetupIterateCabinetW
ShellExecuteW
ShellExecuteExW
MessageBoxW
wsprintfW
CoInitializeEx
CoUninitialize
Number of PE resources by type
RT_ICON 2
Struct(99) 2
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
PE resources
ExifTool file metadata
SubsystemVersion
4.0

InitializedDataSize
1582080

ImageVersion
0.0

ProductName
PhotoPad

FileVersionNumber
0.0.0.0

UninitializedDataSize
0

LanguageCode
English (Australian)

FileFlagsMask
0x0017

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
8.0

FileTypeExtension
exe

OriginalFileName
PhotoPad.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
5.09+

TimeStamp
2019:03:23 04:23:38+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
PhotoPad

ProductVersion
5.09+

FileDescription
PhotoPad Image Editor

OSVersion
4.0

FileOS
Win32

LegalCopyright
NCH Software

MachineType
Intel 386 or later, and compatibles

CompanyName
NCH Software

CodeSize
2048

FileSubtype
0

ProductVersionNumber
0.0.0.0

EntryPoint
0x11d4

ObjectFileType
Executable application

Execution parents
PE resource-wise parents
File identification
MD5 275c3fa335f893ba3ee8677713c40964
SHA1 5469e4ea509fc6648df08817eb61e04f06a0e189
SHA256 f643d8c78e76d7721e129385d0d2181ee973c7a32e97f5b9da88e999ebf78a27
ssdeep
49152:bvopgqj/XYZ2a3OSh20rlenflHIF4iVL:E2aYEaeSh2AuoOYL

authentihash 3256597dda0f83ba450e2ed6c79e10ac993e3dac6ace923b4cb65c50e29d06d8
imphash cbec819355193197a58ef878ecd2c3f4
File size 1.5 MB ( 1599496 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2019-03-28 12:28:40 UTC ( 1 month, 4 weeks ago )
Last submission 2019-04-23 19:56:14 UTC ( 1 month ago )
File names PhotoPad.exe
nch1setup.exe
ppadsetup.exe
ppadsetup.exe
photopadcrossstitch.exe
77-3-setup.exe
PhotoPad
nchsetupreftrackphotopadrefsetup-PhotoPad-Win-EN.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Shell commands
Searched windows
Hooking activity
Runtime DLLs
Additional details
The file installs an application-defined hook procedure into a hook chain. You would install a hook procedure to monitor the system for certain types of events. These events are associated either with a specific thread or with all threads in the same desktop as the calling thread. This is done making use of the SetWindowsHook Windows API function.