gyazo-2.3.0.exe

Gyazo

Nota Inc.

This is a setup and installation application. The file has been seen being downloaded from files.gyazo.com.
Publisher:
Nota Inc.   (signed by Nota Inc.)

Product:
Gyazo

Description:
Gyazo Setup

MD5:
07580b61cab244dfe4394463f33bf132

SHA-1:
47225e4a245cc8c2d0533caf792cc1fbe671cb41

SHA-256:
a3516d3f6432d91c27700810667754d7afb4f82214aff5fcbbf7d1bf6d52710d

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 9:45:26 PM UTC  (today)

File size:
9.2 MB (9,698,760 bytes)

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\gyazo-2.3.0.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
6/18/2014 4:10:19 AM

Valid to:
7/14/2015 10:48:44 AM

Subject:
E=contact@notaland.com, CN=Nota Inc., O=Nota Inc., L=San Jose, S=CA, C=US

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121F3D603CC0C83C55C20EF4F31654CA50C

File PE Metadata
Compilation timestamp:
7/9/2014 3:58:13 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
196608:oQZjOlQ+0bMqnqbYVwPYheiL2dRyrU3Oq1cn0mzydwfngBRfII5O:oQZylQBoAqbYOPYhebR+ttzydIERAI

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.9974

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file gyazo-2.3.0.exe has been seen being distributed by the following URL.

Scan gyazo-2.3.0.exe - Powered by Reason Core Security