× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b7779b2e73e29e885454bd71203a2ebb263d3fad32385ffd37cd3f2a96f0a455
File name: burn4free-setup-silent.exe
Detection ratio: 0 / 55
Analysis date: 2016-01-13 20:01:54 UTC ( 3 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160113
AegisLab 20160113
Yandex 20160113
AhnLab-V3 20160113
Alibaba 20160113
ALYac 20160113
Antiy-AVL 20160113
Arcabit 20160113
Avast 20160113
AVG 20160113
Avira (no cloud) 20160113
AVware 20160111
Baidu-International 20160113
BitDefender 20160113
Bkav 20160113
ByteHero 20160113
CAT-QuickHeal 20160113
ClamAV 20160113
CMC 20160111
Comodo 20160113
Cyren 20160113
DrWeb 20160113
Emsisoft 20160113
ESET-NOD32 20160113
F-Prot 20160111
F-Secure 20160113
Fortinet 20160113
GData 20160113
Ikarus 20160113
Jiangmin 20160113
K7AntiVirus 20160113
K7GW 20160113
Kaspersky 20160113
Malwarebytes 20160113
McAfee 20160113
McAfee-GW-Edition 20160113
Microsoft 20160113
eScan 20160113
NANO-Antivirus 20160113
nProtect 20160113
Panda 20160113
Qihoo-360 20160113
Rising 20160113
Sophos AV 20160113
SUPERAntiSpyware 20160113
Symantec 20160113
Tencent 20160113
TheHacker 20160113
TrendMicro 20160113
TrendMicro-HouseCall 20160113
VBA32 20160113
VIPRE 20160113
ViRobot 20160113
Zillya 20160113
Zoner 20160113
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright

Product Burn4Free DVD Burning Software
File version 9.0.0.0
Description Burn4Free DVD Burning Software Setup
Comments This installation was built with Inno Setup.
Packers identified
F-PROT INNO, appended
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0000A5F8
Number of sections 8
PE sections
Overlays
MD5 4d1f59f7b9e5b1152b055130bb265479
File type data
Offset 104960
Size 2280845
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_ICON 9
RT_STRING 6
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 12
NEUTRAL 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
9.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
63488

EntryPoint
0xa5f8

MIMEType
application/octet-stream

FileVersion
9.0.0.0

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
4.0

ProductVersion
9.0.0.0

FileDescription
Burn4Free DVD Burning Software Setup

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Sakysoft s.r.l.

CodeSize
40448

ProductName
Burn4Free DVD Burning Software

ProductVersionNumber
9.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
File identification
MD5 a5a88551578c0e65bdcc1a91bed40361
SHA1 1727c0914510c3d9853990d1a4bc753c6d76e0c2
SHA256 b7779b2e73e29e885454bd71203a2ebb263d3fad32385ffd37cd3f2a96f0a455
ssdeep
49152:+9PFJ2O19/gpRxs6Y1GIcmXa3PF7IRCjdImg/HaLynCCS:YPFL7gpRHY1nczPF7IYjdIpHAyCCS

authentihash 305e7b21bd45a8a2051df13b37eea91ca4b7cd67dd452b0533394bc0ac2fc449
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 2.3 MB ( 2385805 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (71.1%)
Win32 Executable Delphi generic (9.1%)
Windows screen saver (8.4%)
Win32 Dynamic Link Library (generic) (4.2%)
Win32 Executable (generic) (2.9%)
Tags
peexe overlay

VirusTotal metadata
First submission 2016-01-07 18:16:24 UTC ( 3 years, 4 months ago )
Last submission 2017-01-13 16:48:29 UTC ( 2 years, 4 months ago )
File names burn4free-setup.exe
burn4free_dvd_copy
burn4free-setup.exe
Burn4Free_9.0.0.0_Setup.exe
B7779B2E73E29E885454BD71203A2EBB263D3FAD32385FFD37CD3F2A96F0A455
Burn4Free_DVD_Copy.exe
burn4free-setup.exe
burn4free-setup-silent.exe
Burn4Free_9.0.0.0.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
DNS requests
TCP connections
UDP communications