imagemagick 6.8.8-5free-конвертировать растровые изображения.exe

ImageMagick 6.8.8 Q8 (32-bit)

ImageMagick Studio LLC

This is a self-extracting archive and installer. The file has been seen being downloaded from ftp.sunet.se and multiple other hosts.
Publisher:
ImageMagick Studio LLC

Product:
ImageMagick 6.8.8 Q8 (32-bit)

Description:
ImageMagick 6.8.8 Q8 (32-bit) Setup

MD5:
e85822073eb8b969beadea8eca686dcd

SHA-1:
df9a8e1ce82f9b418624f1c0c2b343ee6b1603ae

SHA-256:
305a676c484146369a7458bb166c1375f86feae61b64b7f2bd99582ac26e6c85

Scanner detections:
2 / 68

Status:
Clean  (2 probable false positive detections)

Explanation:
These detections are probably false positives (erroneous), the file is probably malware free.

Analysis date:
4/26/2024 3:11:34 AM UTC  (today)

Scan engine
Detection
Engine version

F-Prot
W32/Downloader-Sml
v6.4.7.1.166

Trend Micro House Call
TROJ_GEN.F47V0210
7.2.102

File size:
18.2 MB (19,052,659 bytes)

Product version:
6.8.8

Copyright:
Copyright © 1999-2013 ImageMagick Studio LLC

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
10/13/2013 12:19:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
393216:VpqOhuX/VmEjG6C2G/NnEn9EHE9A9RN4XlliDx0dtG4B0LB:VpqCk9miG6yBQYFWXlliDxItGuS

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file imagemagick 6.8.8-5free-конвертировать растровые изображения.exe has been seen being distributed by the following 2 URLs.