zwcad_plus_2015_sp3_ptb.exe

ZWCAD Software Co.,LTD

This is a setup program which is used to install the application. The file has been seen being downloaded from download.zwsoft.com.
Publisher:
ZWCAD Software Co.,LTD  (signed and verified)

MD5:
2a9beb9ef6021b9e36647b788ad6186e

SHA-1:
318d8a24a06f2c04e46413ea05d0442154803afe

SHA-256:
f3a5806827ac765b69f0a7dd65c4199196f1bf93a31e62d721d3e8fa637f0c11

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/28/2024 1:28:19 PM UTC  (today)

File size:
244.3 MB (256,176,280 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\zwcad_plus_2015_sp3_ptb.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/14/2013 9:00:00 PM

Valid to:
5/14/2016 8:59:59 PM

Subject:
CN="ZWCAD Software Co.,LTD", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="ZWCAD Software Co.,LTD", L=guangzhou, S=guangdong, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B5F8BAE6A226A7248FFB593C54C14A5

File PE Metadata
Compilation timestamp:
6/10/2014 2:11:07 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6291456:Q+5oTGwzQUPND7hYNGOWdjhFod87cM/h1njUxnzAeYg/QE:QMU7zQODm7WRhPQM/h1jezKgP

Entry address:
0x1D41B

Entry point:
E8, 5D, 64, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 7A, FC, FF, FF, C7, 06, F0, B1, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, F0, B1, 42, 00, E9, 2F, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, F0, B1, 42, 00, E8, 1C, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 86, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Code size:
161.5 KB (165,376 bytes)

The file zwcad_plus_2015_sp3_ptb.exe has been seen being distributed by the following URL.