× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7eaab310ad75bca9ef5ddf5c3697a8662c7588fbab16a6ae50fc51333451090a
File name: 1047032
Detection ratio: 0 / 70
Analysis date: 2018-12-02 14:17:19 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181202
AegisLab 20181202
AhnLab-V3 20181202
Alibaba 20180921
ALYac 20181202
Antiy-AVL 20181202
Arcabit 20181202
Avast 20181202
Avast-Mobile 20181202
AVG 20181202
Avira (no cloud) 20181202
Babable 20180918
Baidu 20181130
BitDefender 20181202
Bkav 20181129
CAT-QuickHeal 20181202
ClamAV 20181202
CMC 20181202
Comodo 20181202
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181202
Cyren 20181202
DrWeb 20181202
eGambit 20181202
Emsisoft 20181202
Endgame 20181108
ESET-NOD32 20181202
F-Prot 20181202
F-Secure 20181202
Fortinet 20181202
GData 20181202
Ikarus 20181202
Sophos ML 20181128
Jiangmin 20181202
K7AntiVirus 20181202
K7GW 20181202
Kaspersky 20181202
Kingsoft 20181202
Malwarebytes 20181202
MAX 20181202
McAfee 20181202
McAfee-GW-Edition 20181202
Microsoft 20181202
eScan 20181202
NANO-Antivirus 20181202
Palo Alto Networks (Known Signatures) 20181202
Panda 20181202
Qihoo-360 20181202
Rising 20181202
SentinelOne (Static ML) 20181011
Sophos AV 20181202
SUPERAntiSpyware 20181128
Symantec 20181201
Symantec Mobile Insight 20181121
TACHYON 20181202
Tencent 20181202
TheHacker 20181129
TotalDefense 20181202
Trapmine 20181128
TrendMicro 20181202
TrendMicro-HouseCall 20181202
Trustlook 20181202
VBA32 20181130
VIPRE 20181202
ViRobot 20181202
Webroot 20181202
Yandex 20181130
Zillya 20181130
ZoneAlarm by Check Point 20181202
Zoner 20181202
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
(c) 2015 Nero AG and its affiliates

Product NeroInstaller
Original name NeroInstaller.exe
Internal name NeroInstaller.exe
File version 1.12.0.1
Description NeroInstaller
Signature verification Signed file, verified signature
Signing date 11:31 AM 9/26/2018
Signers
[+] Nero AG
Status Valid
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 12:00 AM 05/22/2018
Valid to 11:59 PM 08/12/2021
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint B96362BC3FE5A31D46B1089BB7D130E127FB77A7
Serial number 65 17 37 24 05 BC 77 3A 6B DE 3D CA 0A 95 D6 D1
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 12/10/2013
Valid to 11:59 PM 12/09/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 12:00 AM 11/08/2006
Valid to 11:59 PM 07/16/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] GlobalSign TSA for Standard - G2
Status Valid
Issuer GlobalSign Timestamping CA - G2
Valid from 12:00 AM 05/24/2016
Valid to 12:00 AM 06/24/2027
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 83FDE1BA76FEF55291B50D6861906DAA45B58CB5
Serial number 11 21 B4 55 35 1E BB 1A B2 4F 97 EF 07 FE 2A B3 0B 8A
[+] GlobalSign Timestamping CA - G2
Status Valid
Issuer GlobalSign Root CA
Valid from 10:00 AM 04/13/2011
Valid to 12:00 PM 01/28/2028
Valid usage All
Algorithm sha1RSA
Thumbrint C0E49D2D7D90A5CD427F02D9125694D5D6EC5B71
Serial number 04 00 00 00 00 01 2F 4E E1 52 D7
[+] GlobalSign Root CA - R1
Status Valid
Issuer GlobalSign Root CA
Valid from 12:00 PM 09/01/1998
Valid to 12:00 PM 01/28/2028
Valid usage Server Auth, Client Auth, Code Signing, Email Protection, Timestamp Signing, OCSP Signing, EFS, IPSEC Tunnel, IPSEC User, IPSEC IKE Intermediate
Algorithm sha1RSA
Thumbrint B1BC968BD4F49D622AA89A81F2150152A41D829C
Serial number 04 00 00 00 00 01 15 4B 5A C3 94
Packers identified
F-PROT 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-11-18 16:27:35
Entry Point 0x00014B04
Number of sections 5
PE sections
Overlays
MD5 ed9a23afccfba4146580b37c724bf50b
File type data
Offset 678912
Size 2590904
Entropy 8.00
PE imports
GetStdHandle
WaitForSingleObject
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FreeEnvironmentStringsW
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
GetFullPathNameW
SetLastError
InitializeCriticalSection
GetModuleFileNameW
ExitProcess
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
SetFileAttributesW
CreateThread
SetUnhandledExceptionFilter
ExitThread
TerminateProcess
SetEndOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
AreFileApisANSI
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
IsBadWritePtr
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetProcAddress
RemoveDirectoryW
FindFirstFileA
ResetEvent
GetTempFileNameA
FindNextFileA
WaitForMultipleObjects
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
LCMapStringA
GetEnvironmentStringsW
RemoveDirectoryA
GetCPInfo
GetEnvironmentStrings
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
SetFilePointer
ReadFile
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
VariantClear
SysAllocString
ShellExecuteExA
GetWindowLongA
SetTimer
MessageBoxW
LoadIconA
LoadStringA
SetWindowTextA
EndDialog
PostMessageA
CharUpperW
DialogBoxParamW
SendMessageA
LoadStringW
SetWindowTextW
GetDlgItem
SetWindowLongA
KillTimer
DialogBoxParamA
ShowWindow
CharUpperA
DestroyWindow
Number of PE resources by type
RT_ICON 21
RT_STRING 2
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 26
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.12.0.1

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
NeroInstaller

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, 32-bit

CharacterSet
Unicode

InitializedDataSize
572928

EntryPoint
0x14b04

OriginalFileName
NeroInstaller.exe

MIMEType
application/octet-stream

LegalCopyright
(c) 2015 Nero AG and its affiliates

FileVersion
1.12.0.1

TimeStamp
2010:11:18 17:27:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
NeroInstaller.exe

ProductVersion
1.12.0.1

SubsystemVersion
4.0

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nero AG

CodeSize
104960

ProductName
NeroInstaller

ProductVersionNumber
1.12.0.1

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e1922be62f0edd9cc13d4040885de4b5
SHA1 b07ce39d9527dde21b7f3373701e1b96ea5be3cd
SHA256 7eaab310ad75bca9ef5ddf5c3697a8662c7588fbab16a6ae50fc51333451090a
ssdeep
98304:R1O/gS65sqww5ZGyqg41UTlSZhTQTelAI2aF2:R1O/p6log41UoZpQir2aF2

authentihash 4bca760cd03f6d5282ec08d7de24eb0755a00557226cf963fdfd047b2040c938
imphash 3786a4cf8bfee8b4821db03449141df4
File size 3.1 MB ( 3269816 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (33.7%)
Win64 Executable (generic) (29.8%)
Microsoft Visual C++ compiled executable (generic) (17.8%)
Win32 Dynamic Link Library (generic) (7.1%)
Win32 Executable (generic) (4.8%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2018-09-26 14:30:38 UTC ( 4 months, 3 weeks ago )
Last submission 2019-01-31 09:00:50 UTC ( 2 weeks, 3 days ago )
File names Nero_Video2019-1.12.0.1_stub_trial.exe
Nero_Video2019-1.12.0.1_stub_trial.exe
Nero_Video2019-1.12.0.1_stub_trial.exe
7EAAB310AD75BCA9EF5DDF5C3697A8662C7588FBAB16A6AE50FC51333451090A.exe
NeroInstaller.exe
Nero_Video2019-1.12.0.1_stub_trial.exe
1047032
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files