zwcad_plus_2015_ptb.exe

ZWCAD Software Co.,LTD

This is a setup program which is used to install the application. The file has been seen being downloaded from downloads.totalcad.com.br.
Publisher:
ZWCAD Software Co.,LTD  (signed and verified)

MD5:
845e5b40558ccb1260a1c8aef86daf97

SHA-1:
ba3986ebb883cf1433febccf89f9fc08376d645b

SHA-256:
d0804fb346963e3f87408a8590770e452a42f773d44246cb9b6b23aa34ae64e0

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 7:22:13 AM UTC  (today)

File size:
244.3 MB (256,176,576 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\zwcad_plus_2015_ptb.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/14/2013 9:00:00 PM

Valid to:
5/14/2016 8:59:59 PM

Subject:
CN="ZWCAD Software Co.,LTD", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="ZWCAD Software Co.,LTD", L=guangzhou, S=guangdong, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B5F8BAE6A226A7248FFB593C54C14A5

File PE Metadata
Compilation timestamp:
6/10/2014 2:11:07 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6291456:B+5oSGwzQUPND7hYNGOWdjhFod82WfDE6RUTiFtIzjUBaY2IqY:BMl7zQODm7WRhPXfgjvS2+

Entry address:
0x1D41B

Entry point:
E8, 5D, 64, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 7A, FC, FF, FF, C7, 06, F0, B1, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, F0, B1, 42, 00, E9, 2F, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, F0, B1, 42, 00, E8, 1C, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 86, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Code size:
161.5 KB (165,376 bytes)

The file zwcad_plus_2015_ptb.exe has been seen being distributed by the following URL.