ppjr_general_v8.5.exe

Penpower Online Tool Application

Penpower Technology Ltd.

Publisher:
Penpower  (signed by Penpower Technology Ltd.)

Product:
Penpower Online Tool Application

Version:
1, 0, 0, 1

MD5:
da3c1d059a0eae46d11df282fb179d26

SHA-1:
533ba191b3120026d02195406f8550a59386b4ef

SHA-256:
b78e075e27d8d8de952ea3c508f6ac87b2a666e08f09ebb936672a737f471c82

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/18/2024 1:58:15 AM UTC  (today)

File size:
650.3 KB (665,936 bytes)

Product version:
1, 0, 0, 1

Copyright:
Copyright (C) 2012

Original file name:
PPSfExe.EXE

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\ppjr_general_v8.5.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
5/8/2013 6:04:57 PM

Valid to:
5/8/2016 6:04:57 PM

Subject:
E=support@penpower.net, CN=Penpower Technology Ltd., OU=Penpower Technology Ltd., O=Penpower Technology Ltd., L=Hsinchu, S=Taiwan, C=TW

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121034880A2677F83AA4E84AA628E62F381

File PE Metadata
Compilation timestamp:
2/7/2013 3:36:36 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:Y/jEsZpx0VRGOIKE7h6nq3IU4pmpeUNGoz13KQj6cs2fis:Y/AXVRGOIP7h6nYQpmpe1C1Jj6cs2fz

Entry address:
0xF578

Entry point:
55, 8B, EC, 6A, FF, 68, F0, EC, 42, 00, 68, 40, 2B, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 0C, B2, 42, 00, 33, D2, 8A, D4, 89, 15, F4, D7, 43, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, F0, D7, 43, 00, C1, E1, 08, 03, CA, 89, 0D, EC, D7, 43, 00, C1, E8, 10, A3, E8, D7, 43, 00, 6A, 01, E8, 03, 35, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C2, 00, 00, 00, 59, E8, AE, 32, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B1, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Entropy:
7.5230

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
168 KB (172,032 bytes)

The file ppjr_general_v8.5.exe has been seen being distributed by the following URL.