neuber-software-security-task-manager-1-setup.exe

A. & M. Neuber Software

This is a setup and installation application. The file has been seen being downloaded from www.nobox.de.
Publisher:
A. & M. Neuber Software  (signed and verified)

MD5:
cf3c2110d2328f01f7d946510e2b2890

SHA-1:
06a3a15f2950786da8fafbd8f51d9d5fa883759b

SHA-256:
df7c662eec929a77b5cb902ff0aebc11e4997a5584bd3e5f3066e5915b5f2da6

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/22/2024 5:40:22 PM UTC  (today)

File size:
2 MB (2,086,864 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\neuber-software-security-task-manager-1-setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/4/2012 2:00:00 AM

Valid to:
5/1/2015 1:59:59 AM

Subject:
CN=A. & M. Neuber Software, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=A. & M. Neuber Software, L=Halle, S=Sachsen-Anhalt, C=DE

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1F5F2A6D909037A62FE6CCB75DB8B65C

File PE Metadata
Compilation timestamp:
7/30/2007 7:17:28 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
49152:91GRILXcROp6LmzepeRh+JcWMC6aTPrtXis/LqeyIW4eq:91OIAROphzepewftySqX3q

Entry address:
0x7EB8

Entry point:
E8, 19, 28, 00, 00, E9, 16, FE, FF, FF, 55, 8B, EC, 83, EC, 20, 53, 33, DB, 39, 5D, 10, 75, 20, E8, A4, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 35, 15, 00, 00, 83, C4, 14, 83, C8, FF, E9, 80, 00, 00, 00, 8B, 4D, 0C, 3B, CB, 56, 8B, 75, 08, 74, 21, 3B, F3, 75, 1D, E8, 75, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 06, 15, 00, 00, 83, C4, 14, 83, C8, FF, EB, 53, B8, FF, FF, FF, 7F, 3B, C8, 89, 45, E4, 77, 03, 89, 4D, E4, 57, FF, 75, 18, 8D, 45, E0, FF, 75, 14, C7, 45, EC...
 
[+]

Code size:
60 KB (61,440 bytes)

The file neuber-software-security-task-manager-1-setup.exe has been seen being distributed by the following URL.