× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5d9f72888f9a4510ad25c31dd7081ecbfcb2db97a419dfb225dc8678b945d9d2
File name: Nero_BurningROM2018-1.10.0.9_stub_trial.exe
Detection ratio: 0 / 65
Analysis date: 2018-02-09 21:38:05 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180209
AegisLab 20180209
AhnLab-V3 20180209
Alibaba 20180209
ALYac 20180209
Antiy-AVL 20180209
Arcabit 20180209
Avast 20180209
Avast-Mobile 20180209
AVG 20180209
Avira (no cloud) 20180209
AVware 20180209
Baidu 20180208
BitDefender 20180209
Bkav 20180209
CAT-QuickHeal 20180209
ClamAV 20180209
CMC 20180209
Comodo 20180209
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180209
Cyren 20180209
DrWeb 20180209
eGambit 20180209
Emsisoft 20180209
Endgame 20171130
ESET-NOD32 20180209
F-Prot 20180209
F-Secure 20180209
Fortinet 20180209
GData 20180209
Sophos ML 20180120
Jiangmin 20180209
K7AntiVirus 20180209
K7GW 20180209
Kaspersky 20180209
Kingsoft 20180209
Malwarebytes 20180209
MAX 20180209
McAfee 20180209
McAfee-GW-Edition 20180209
Microsoft 20180209
eScan 20180209
NANO-Antivirus 20180209
nProtect 20180209
Palo Alto Networks (Known Signatures) 20180209
Panda 20180209
Qihoo-360 20180209
Rising 20180209
SentinelOne (Static ML) 20180115
Sophos AV 20180209
SUPERAntiSpyware 20180209
Symantec 20180209
Symantec Mobile Insight 20180209
Tencent 20180209
TheHacker 20180208
TotalDefense 20180209
TrendMicro-HouseCall 20180209
Trustlook 20180209
VBA32 20180209
VIPRE 20180209
ViRobot 20180209
Webroot 20180209
WhiteArmor 20180205
Yandex 20180207
ZoneAlarm by Check Point 20180209
Zoner 20180209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
(c) 2015 Nero AG and its affiliates

Product NeroInstaller
Original name NeroInstaller.exe
Internal name NeroInstaller.exe
File version 1.10.0.9
Description NeroInstaller
Signature verification Signed file, verified signature
Signing date 11:44 AM 9/15/2017
Signers
[+] Nero AG
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 4/14/2015
Valid to 12:59 AM 7/14/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 05090088C6BD3606A3DDB675BA6ADBD3C02008BB
Serial number 4D 7A 5E 95 C9 2E 17 B8 E5 B3 1A 2B D0 45 3A 49
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-11-18 16:27:35
Entry Point 0x00014B04
Number of sections 5
PE sections
Overlays
MD5 e467188407f2759d357381d407f21afe
File type data
Offset 678912
Size 2460696
Entropy 8.00
PE imports
GetStdHandle
WaitForSingleObject
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FreeEnvironmentStringsW
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
GetFullPathNameW
SetLastError
InitializeCriticalSection
GetModuleFileNameW
ExitProcess
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
SetFileAttributesW
CreateThread
SetUnhandledExceptionFilter
ExitThread
TerminateProcess
SetEndOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
AreFileApisANSI
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
IsBadWritePtr
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetProcAddress
RemoveDirectoryW
FindFirstFileA
ResetEvent
GetTempFileNameA
FindNextFileA
WaitForMultipleObjects
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
LCMapStringA
GetEnvironmentStringsW
RemoveDirectoryA
GetCPInfo
GetEnvironmentStrings
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
SetFilePointer
ReadFile
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
VariantClear
SysAllocString
ShellExecuteExA
GetWindowLongA
SetTimer
MessageBoxW
LoadIconA
LoadStringA
SetWindowTextA
EndDialog
PostMessageA
CharUpperW
DialogBoxParamW
SendMessageA
LoadStringW
SetWindowTextW
GetDlgItem
SetWindowLongA
KillTimer
DialogBoxParamA
ShowWindow
CharUpperA
DestroyWindow
Number of PE resources by type
RT_ICON 21
RT_STRING 2
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 26
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.10.0.9

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
572928

EntryPoint
0x14b04

OriginalFileName
NeroInstaller.exe

MIMEType
application/octet-stream

LegalCopyright
(c) 2015 Nero AG and its affiliates

FileVersion
1.10.0.9

TimeStamp
2010:11:18 17:27:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
NeroInstaller.exe

ProductVersion
1.10.0.9

FileDescription
NeroInstaller

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nero AG

CodeSize
104960

ProductName
NeroInstaller

ProductVersionNumber
1.10.0.9

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 53ffd577089249aae78598e9ae63a1c2
SHA1 bf43e16f7a7e81df2421631fbee99e6bc3d38d2e
SHA256 5d9f72888f9a4510ad25c31dd7081ecbfcb2db97a419dfb225dc8678b945d9d2
ssdeep
49152:P1OsuWhYKrG2kvE6BTR8/uN8oUW3m4/xesdOOeDLMxB1oXhr45RcBmApe:P1O/I7GVE6BTRN+WW4gKeDaB1CqRcBmn

authentihash adbf4070bc617b218f8f77bb482637866aceca8726543c05c1b5f1d78a31b3ab
imphash 3786a4cf8bfee8b4821db03449141df4
File size 3.0 MB ( 3139608 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2017-09-21 11:00:06 UTC ( 10 months ago )
Last submission 2018-07-20 21:05:06 UTC ( 18 hours, 32 minutes ago )
File names Nero_BurningROM2018_Trial_Rus_Setup.exe
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
1024663
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
nero-35-jetelecharge.exe
5D9F72888F9A4510AD25C31DD7081ECBFCB2DB97A419DFB225DC8678B945D9D2.exe
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
nero-burning-rom-2018-1-10-0-9.exe
Nero_BurningROM-1.10.0.9_stub_trial.exe
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
NeroInstaller.exe
6fa378a72eafbe87f02e.exe
aa
Nero_BurningROM_Trial_Rus_Setup.exe
Nero_BurningROM2018-1.10.0.9_stub_trial.exe
5e5b782f9d9a3b828193.exe
nero-35-jetelecharge.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files