timeleft.exe

TimeLeft

NesterSoft Inc.

The program is a setup application that uses the Inno Setup installer.
Publisher:
NesterSoft Inc.   (signed by NesterSoft Inc.)

Product:
TimeLeft

Description:
TimeLeft Setup

Version:
3.44.0.233

MD5:
6e362e7e5bb0acaeb2a3c6aeef39db80

SHA-1:
17ae1f02c87be88063c700843678c0f8fb0c6431

SHA-256:
fe1aab7094f92931a1ff9e9097d674bce0e000fd22e23e45e7b3a577de1e36ca

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/19/2024 2:31:13 AM UTC  (today)

File size:
2.2 MB (2,348,832 bytes)

Product version:
3.44.0.233

Copyright:
Copyright © 1999-2009 NesterSoft Inc.

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\desktop helpers\timeleft.exe

Digital Signature
Signed by:

Authority:
The USERTRUST Network

Valid from:
11/18/2007 6:00:00 PM

Valid to:
11/18/2009 5:59:59 PM

Subject:
CN=NesterSoft Inc., O=NesterSoft Inc., STREET=40 Sarno st, L=Woodbridge, S=ON, PostalCode=L4H1X6, C=CA

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00BD7B4D8DB71EECC7A9330046460DD3C3

File PE Metadata
Compilation timestamp:
6/19/1992 5:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x9A58

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 6E, 96, FF, FF, E8, 75, A8, FF, FF, E8, A0, CA, FF, FF, E8, E7, CA, FF, FF, E8, 0E, F3, FF, FF, E8, 75, F4, FF, FF, 33, C0, 55, 68, 0B, A1, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, D4, A0, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 9B, FE, FF, FF, E8, 02, FA, FF, FF, 8D, 55, F0, 33, C0, E8, AC, D0, FF, FF, 8B, 55, F0, B8, E4, CD, 40, 00, E8, 1F, 97, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, E4, CD, 40, 00, B2, 01, B8...
 
[+]

Entropy:
7.9953

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36.5 KB (37,376 bytes)

Scan timeleft.exe - Powered by Reason Core Security