× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7f3f810592eebb3c2dbac2081ecb352050b4d70b48b68de8f8d589a281b0f049
File name: nero_coverdesigner.exe
Detection ratio: 1 / 66
Analysis date: 2018-01-14 05:31:03 UTC ( 1 week ago ) View latest
Antivirus Result Update
Webroot Pua.Bundleinstaller.Gen 20180114
Ad-Aware 20180114
AegisLab 20180114
AhnLab-V3 20180113
Alibaba 20180114
ALYac 20180114
Antiy-AVL 20180114
Arcabit 20180114
Avast 20180114
Avast-Mobile 20180113
AVG 20180114
Avira (no cloud) 20180113
AVware 20180103
Baidu 20180112
BitDefender 20180114
Bkav 20180112
CAT-QuickHeal 20180113
ClamAV 20180114
CMC 20180111
Comodo 20180114
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180114
Cyren 20180114
DrWeb 20180114
eGambit 20180114
Emsisoft 20180114
Endgame 20171130
ESET-NOD32 20180114
F-Prot 20180114
F-Secure 20180114
Fortinet 20180114
GData 20180114
Sophos ML 20170914
Jiangmin 20180114
K7AntiVirus 20180114
K7GW 20180112
Kaspersky 20180114
Kingsoft 20180114
Malwarebytes 20180114
MAX 20180114
McAfee 20180114
McAfee-GW-Edition 20180114
Microsoft 20180114
eScan 20180114
NANO-Antivirus 20180114
nProtect 20180114
Palo Alto Networks (Known Signatures) 20180114
Panda 20180113
Qihoo-360 20180114
Rising 20180114
SentinelOne (Static ML) 20171224
Sophos AV 20180114
SUPERAntiSpyware 20180114
Symantec 20180113
Symantec Mobile Insight 20180112
Tencent 20180114
TheHacker 20180114
TotalDefense 20180113
TrendMicro-HouseCall 20180114
Trustlook 20180114
VBA32 20180112
VIPRE 20180114
ViRobot 20180113
WhiteArmor 20180110
Yandex 20180112
Zillya 20180112
ZoneAlarm by Check Point 20180114
Zoner 20180114
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
(c) 2015 Nero AG and its affiliates

Product NeroInstaller
Original name NeroInstaller.exe
Internal name NeroInstaller.exe
File version 1.10.0.9
Description NeroInstaller
Packers identified
F-PROT 7Z
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-11-18 16:27:35
Entry Point 0x00014B04
Number of sections 5
PE sections
Overlays
MD5 00297d13fa1f2b512e91befdc17c8309
File type data
Offset 678912
Size 1156096
Entropy 8.00
PE imports
GetStdHandle
WaitForSingleObject
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
FreeEnvironmentStringsW
SetFileAttributesA
GetTempPathA
WideCharToMultiByte
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
FormatMessageW
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
GetFullPathNameW
SetLastError
InitializeCriticalSection
GetModuleFileNameW
ExitProcess
GetModuleFileNameA
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
GetModuleHandleA
SetFileAttributesW
CreateThread
SetUnhandledExceptionFilter
ExitThread
TerminateProcess
SetEndOfFile
GetVersion
InterlockedIncrement
SetCurrentDirectoryA
AreFileApisANSI
HeapFree
EnterCriticalSection
SetHandleCount
GetOEMCP
IsBadWritePtr
TlsAlloc
GetVersionExA
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryW
DeleteFileW
GetProcAddress
RemoveDirectoryW
FindFirstFileA
ResetEvent
GetTempFileNameA
FindNextFileA
WaitForMultipleObjects
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LCMapStringW
lstrlenA
LCMapStringA
GetEnvironmentStringsW
RemoveDirectoryA
GetCPInfo
GetEnvironmentStrings
SetFileTime
GetCommandLineW
GetCurrentDirectoryA
HeapSize
GetCommandLineA
RaiseException
SetFilePointer
ReadFile
CloseHandle
GetACP
GetCurrentThreadId
CreateProcessA
HeapCreate
VirtualFree
Sleep
IsBadReadPtr
IsBadCodePtr
VirtualAlloc
VariantClear
SysAllocString
ShellExecuteExA
GetWindowLongA
SetTimer
MessageBoxW
LoadIconA
LoadStringA
SetWindowTextA
EndDialog
PostMessageA
CharUpperW
DialogBoxParamW
SendMessageA
LoadStringW
SetWindowTextW
GetDlgItem
SetWindowLongA
KillTimer
DialogBoxParamA
ShowWindow
CharUpperA
DestroyWindow
Number of PE resources by type
RT_ICON 21
RT_STRING 2
RT_DIALOG 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 26
PE resources
ExifTool file metadata
SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
1.10.0.9

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
572928

EntryPoint
0x14b04

OriginalFileName
NeroInstaller.exe

MIMEType
application/octet-stream

LegalCopyright
(c) 2015 Nero AG and its affiliates

FileVersion
1.10.0.9

TimeStamp
2010:11:18 17:27:35+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
NeroInstaller.exe

ProductVersion
1.10.0.9

FileDescription
NeroInstaller

OSVersion
4.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Nero AG

CodeSize
104960

ProductName
NeroInstaller

ProductVersionNumber
1.10.0.9

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 24450b2498f924a3e24afc3e550479e7
SHA1 3c573cb802b56f0e8a139fbf7e888d99dcdb462c
SHA256 7f3f810592eebb3c2dbac2081ecb352050b4d70b48b68de8f8d589a281b0f049
ssdeep
24576:L1OYdajb7Wud+qV1kiZBtu2RJcNqy4Tv58u0Tlr8/uNBrDaoU4N3mY4CK:L1OsuWuYKrG2kvE6BTR8/uN8oUW3m4K

authentihash 641a9ca30bed8528a1e4a12a8313cb8c585789ccc5fc92a132efe9e5ef4c34fa
imphash 3786a4cf8bfee8b4821db03449141df4
File size 1.8 MB ( 1835008 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
peexe overlay

VirusTotal metadata
First submission 2017-07-11 05:55:23 UTC ( 6 months, 2 weeks ago )
Last submission 2018-01-10 01:25:04 UTC ( 1 week, 5 days ago )
File names NeroInstaller.exe
nero_coverdesigner.exe
Nero_CoverDesigner.exe
Nero_CoverDesigner.exe
nero_coverdesigner.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Deleted files
UDP communications