DePopperSetup.exe

DePopper Setup

DAK 2000, Inc.

This is a self-extracting archive and installer.
Publisher:
Droid Informatica  (signed by DAK 2000, Inc.)

Product:
DePopper Setup

Version:
2, 18, 0, 0

MD5:
576b4577ff7511dfda779ff492fe131e

SHA-1:
aa1931a2d08ecc15ebb166c478d5cc61e78312aa

SHA-256:
acefd9bb0ad203c1364ea6f3e3034fd6392b3e6c87ec749ca222d12fa684e9f4

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
5/29/2024 5:56:27 AM UTC  (today)

File size:
1.4 MB (1,459,904 bytes)

Product version:
2, 18, 0, 0

Copyright:
Copyright (C) 1999, 2007 Droid Informatica

Original file name:
DePopperSetup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Signed by:

Authority:
Thawte Consulting (Pty) Ltd.

Valid from:
2/21/2007 7:00:00 PM

Valid to:
9/20/2007 7:59:59 PM

Subject:
CN="DAK 2000, Inc.", OU=SECURE APPLICATION DEVELOPMENT, O="DAK 2000, Inc.", L=Tarzana, S=California, C=US

Issuer:
CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA

Serial number:
17FE358F782AFEE79B4F30828CD2D924

File PE Metadata
Compilation timestamp:
1/17/2007 12:30:49 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:YovOB+OhBRxD2y8C4YSxeLLEY9n9WqiCynhXuCqUcclJsMFQixwEprWL:pa+O9t8PxMWHheWNAMy1Epra

Entry address:
0x4440

Entry point:
55, 8B, EC, 6A, FF, 68, 18, 9A, 41, 00, 68, 38, 76, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, C4, A8, 53, 56, 57, 89, 65, E8, FF, 15, CC, 91, 41, 00, 33, D2, 8A, D4, 89, 15, 6C, 65, 42, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 68, 65, 42, 00, C1, E1, 08, 03, CA, 89, 0D, 64, 65, 42, 00, C1, E8, 10, A3, 60, 65, 42, 00, E8, 54, 03, 00, 00, 85, C0, 75, 0A, 6A, 1C, E8, 49, 01, 00, 00, 83, C4, 04, E8, F1, 15, 00, 00, 85, C0, 75, 0A, 6A, 10, E8, 36, 01, 00, 00, 83, C4, 04, C7, 45, FC...
 
[+]

Entropy:
7.8897

Developed / compiled with:
Microsoft Visual C++

Code size:
96 KB (98,304 bytes)

Scan DePopperSetup.exe - Powered by Reason Core Security