× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 40e0b9ba6dcd2ca218e75e2c3f327c4ef187bf03e541c856b21123764d109ba5
File name: jre-8u60-windows-x64.exe
Detection ratio: 0 / 54
Analysis date: 2016-01-25 16:08:24 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware 20160125
AegisLab 20160125
Yandex 20160124
AhnLab-V3 20160125
Alibaba 20160125
ALYac 20160125
Antiy-AVL 20160125
Arcabit 20160125
Avast 20160125
AVG 20160125
Avira (no cloud) 20160125
Baidu-International 20160125
BitDefender 20160125
Bkav 20160123
ByteHero 20160125
CAT-QuickHeal 20160125
ClamAV 20160125
CMC 20160111
Comodo 20160125
Cyren 20160125
DrWeb 20160125
Emsisoft 20160125
ESET-NOD32 20160125
F-Prot 20160125
F-Secure 20160125
Fortinet 20160125
GData 20160125
Ikarus 20160125
Jiangmin 20160125
K7AntiVirus 20160125
K7GW 20160125
Kaspersky 20160125
Malwarebytes 20160125
McAfee 20160125
McAfee-GW-Edition 20160125
Microsoft 20160125
eScan 20160125
NANO-Antivirus 20160125
nProtect 20160125
Panda 20160124
Qihoo-360 20160125
Rising 20160125
Sophos AV 20160125
SUPERAntiSpyware 20160125
Symantec 20160124
Tencent 20160125
TheHacker 20160124
TrendMicro 20160125
TrendMicro-HouseCall 20160125
VBA32 20160125
VIPRE 20160125
ViRobot 20160125
Zillya 20160124
Zoner 20160125
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem that targets 64bit architectures.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2015

Product Java Platform SE 8 U60
Original name jre-8u60-fcs-bin-b27-windows-amd64-04_aug_2015.exe
Internal name Setup Launcher
File version 8.0.600.27
Description Java Platform SE binary
Signature verification Signed file, verified signature
Signing date 8:53 PM 8/4/2015
Signers
[+] Oracle America, Inc.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Symantec Class 3 SHA256 Code Signing CA
Valid from 1:00 AM 4/14/2015
Valid to 12:59 AM 4/14/2018
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 3B75816D15A6D8F4598E9CF5603F1839EE84D73D
Serial number 12 F0 27 7E 0F 23 3B 39 F9 41 9B 06 E8 CD E3 52
[+] Symantec Class 3 SHA256 Code Signing CA
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 12/10/2013
Valid to 12:59 AM 12/10/2023
Valid usage Client Auth, Code Signing
Algorithm sha256RSA
Thumbprint 007790F6561DAD89B0BCD85585762495E358F8A5
Serial number 3D 78 D7 F9 76 49 60 B2 61 7D F4 F0 1E CA 86 2A
[+] VeriSign
Status Valid
Issuer VeriSign Class 3 Public Primary Certification Authority - G5
Valid from 1:00 AM 11/8/2006
Valid to 12:59 AM 7/17/2036
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm sha1RSA
Thumbprint 4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5
Serial number 18 DA D1 9E 26 7D E8 BB 4A 21 58 CD CC 6B 3B 4A
Counter signers
[+] Symantec Time Stamping Services Signer - G4
Status Valid
Issuer Symantec Time Stamping Services CA - G2
Valid from 1:00 AM 10/18/2012
Valid to 12:59 AM 12/30/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 65439929B67973EB192D6FF243E6767ADF0834E4
Serial number 0E CF F4 38 C8 FE BF 35 6E 04 D8 6A 98 1B 1A 50
[+] Symantec Time Stamping Services CA - G2
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 12/21/2012
Valid to 12:59 AM 12/31/2020
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 6C07453FFDDA08B83707C09B82FB3D15F35336B1
Serial number 7E 93 EB FB 7C C6 4E 59 EA 4B 9A 77 D4 06 FC 3B
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine x64
Compilation timestamp 2015-08-04 19:53:02
Entry Point 0x0007CCFC
Number of sections 6
PE sections
Overlays
MD5 5c868425a6f4b89a1aa81a05395cd612
File type data
Offset 56495104
Size 6240
Entropy 7.32
PE imports
RegDeleteKeyA
RegOpenCurrentUser
RegCloseKey
ConvertSidToStringSidW
RegQueryValueExA
RegCreateKeyExA
CryptHashData
CryptCreateHash
RegOpenKeyA
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
OpenProcessToken
RegOpenKeyExA
CopySid
GetTokenInformation
CryptReleaseContext
CryptAcquireContextA
RegQueryInfoKeyW
RegEnumKeyExA
CryptDestroyHash
CryptGetHashParam
RegSetValueExA
RegDeleteValueA
GetWindowsAccountDomainSid
InitCommonControlsEx
CryptUnprotectData
CryptProtectData
CryptStringToBinaryA
CryptBinaryToStringA
GetDeviceCaps
GetStdHandle
GetDriveTypeW
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
EncodePointer
FlsGetValue
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetLocaleInfoA
LocalAlloc
lstrcatA
OpenFileMappingA
ExitProcess
FreeEnvironmentStringsW
GetLocaleInfoW
SetStdHandle
GetTempPathA
GetCPInfo
LoadLibraryW
WriteFile
GetSystemTimeAsFileTime
SetDllDirectoryA
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
FormatMessageA
GetFullPathNameW
GetSystemWow64DirectoryA
SetLastError
GetUserDefaultUILanguage
PeekNamedPipe
OpenThread
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
FlushFileBuffers
RemoveDirectoryA
FlushViewOfFile
QueryPerformanceFrequency
HeapSetInformation
EnumSystemLocalesA
LoadLibraryExA
GetUserDefaultLCID
SetHandleCount
RtlVirtualUnwind
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
SetFilePointer
CreateThread
GetSystemDefaultUILanguage
CreatePipe
GetExitCodeThread
SetUnhandledExceptionFilter
SetHandleInformation
MulDiv
SetThreadStackGuarantee
ExitThread
DecodePointer
SetEnvironmentVariableA
TerminateProcess
GetModuleHandleExW
VirtualQuery
SetEndOfFile
GetVersion
GetModuleHandleExA
WriteConsoleW
CreateToolhelp32Snapshot
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
OpenProcess
lstrcmpiA
FreeLibrary
QueryPerformanceCounter
GetTickCount
VirtualProtect
FlsSetValue
LoadLibraryA
Process32Next
RtlPcToFileHeader
MoveFileExA
Process32First
CreateDirectoryA
DeleteFileA
GetStartupInfoW
CreateDirectoryW
GetProcAddress
GetProcessHeap
CompareStringW
GetFileInformationByHandle
lstrcmpA
UnmapViewOfFile
FindFirstFileA
lstrcpyA
CreateFileMappingA
FindNextFileA
IsValidLocale
FindFirstFileExW
RtlUnwindEx
GetModuleFileNameA
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
CreateFileA
GetCurrentThreadId
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
IsDBCSLeadByte
lstrlenW
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
FlsAlloc
GetCommandLineA
FlsFree
RaiseException
MapViewOfFile
GetModuleHandleA
ReadFile
RtlCaptureContext
CloseHandle
lstrcpynA
GetACP
GetModuleHandleW
CreateProcessA
IsValidCodePage
RtlLookupFunctionEntry
FindResourceW
Sleep
FindResourceA
VirtualAlloc
GetOEMCP
VarUI4FromStr
VariantChangeType
SysAllocStringLen
SysStringByteLen
VariantClear
SysAllocString
VariantCopy
GetErrorInfo
SysFreeString
VariantInit
SHGetFolderLocation
FindExecutableA
SHGetFolderPathW
SHBrowseForFolderA
SHGetFolderPathA
SHGetPathFromIDListA
CommandLineToArgvW
Ord(12)
PathAppendA
SetFocus
GetMessageA
SetWindowLongPtrW
GetParent
PostQuitMessage
EnumWindows
DefWindowProcW
SetWindowLongPtrA
GetMessageW
DefWindowProcA
ShowWindow
SetWindowPos
GetClassInfoExW
GetWindowThreadProcessId
GetWindowRect
DispatchMessageA
RegisterClassExW
PostMessageA
MessageBoxA
PeekMessageA
AdjustWindowRectEx
TranslateMessage
MsgWaitForMultipleObjectsEx
DispatchMessageW
RegisterClassExA
ReleaseDC
LoadStringA
GetWindowLongPtrW
SendMessageA
LoadStringW
SetWindowTextW
GetWindowLongPtrA
EnableMenuItem
SetRect
wsprintfA
CreateWindowExA
LoadCursorA
GetDC
CharNextA
GetDesktopWindow
IsWindowUnicode
GetSystemMenu
GetFocus
CreateWindowExW
GetClientRect
GetAncestor
IsChild
DestroyWindow
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetGetConnectedState
InternetErrorDlg
HttpQueryInfoA
InternetCrackUrlA
Ord(67)
Ord(87)
Ord(204)
Ord(44)
Ord(159)
Ord(158)
Ord(91)
Ord(141)
Ord(168)
Ord(31)
Ord(117)
Ord(189)
Ord(115)
Ord(8)
Ord(137)
Ord(160)
OleUninitialize
CoUninitialize
CoInitialize
OleInitialize
CoCreateGuid
CoTaskMemRealloc
CoCreateInstance
OleSetContainedObject
OleRun
IIDFromString
CoTaskMemFree
StringFromGUID2
CoTaskMemAlloc
Number of PE resources by type
RT_HTML 164
RT_STRING 110
RT_ICON 12
JAVA_INSTALLER 2
JAVA_INSTALLER_UTIL 1
RT_MANIFEST 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
CHINESE TRADITIONAL 174
ENGLISH US 28
ITALIAN NEUTRAL 10
SWEDISH NEUTRAL 10
SPANISH NEUTRAL 10
GERMAN NEUTRAL 10
CHINESE SIMPLIFIED 10
PORTUGUESE BRAZILIAN 10
JAPANESE DEFAULT 10
FRENCH NEUTRAL 10
KOREAN 10
PE resources
ExifTool file metadata
SubsystemVersion
5.2

FileDescription
Java Platform SE binary

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
8.0.600.27

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FullVersion
1.8.0_60-b27

CharacterSet
Unicode

InitializedDataSize
55806976

EntryPoint
0x7ccfc

OriginalFileName
jre-8u60-fcs-bin-b27-windows-amd64-04_aug_2015.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright 2015

FileVersion
8.0.600.27

TimeStamp
2015:08:04 20:53:02+01:00

FileType
Win64 EXE

PEType
PE32+

InternalName
Setup Launcher

ProductVersion
8.0.600.27

UninitializedDataSize
0

OSVersion
5.2

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
AMD AMD64

CompanyName
Oracle Corporation

CodeSize
701440

ProductName
Java Platform SE 8 U60

ProductVersionNumber
8.0.600.27

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
Compressed bundles
File identification
MD5 a1892dff2ffb5ccfe3d46d8295f38326
SHA1 87976e29f58276685c63833ae42df7b2b5fe921c
SHA256 40e0b9ba6dcd2ca218e75e2c3f327c4ef187bf03e541c856b21123764d109ba5
ssdeep
1572864:CRtjUQ3zB1jcMqnI70/t+/oWRSGp3oXgl:m3zXjDqnhk/JRS9gl

authentihash 7e4fc5162999a3a69595068e82e024c2e001cfb2197e64e51582adb9338b990f
imphash 40c21057eb5a95ca4c026b743c10e185
File size 53.9 MB ( 56501344 bytes )
File type Win32 EXE
Magic literal
PE32+ executable for MS Windows (GUI) Mono/.Net assembly

TrID Win32 EXE PECompact compressed (generic) (79.7%)
Win32 Executable (generic) (8.6%)
OS/2 Executable (generic) (3.8%)
Generic Win/DOS Executable (3.8%)
DOS Executable Generic (3.8%)
Tags
64bits peexe assembly signed overlay

VirusTotal metadata
First submission 2015-08-11 16:16:09 UTC ( 3 years, 6 months ago )
Last submission 2018-02-01 13:46:24 UTC ( 1 year ago )
File names SkypeSetup.exe
jre-8u60-setup.exe
jre-8u60-windows-x64(1).exe
jre860_64.exe
jre-8u60-windows-x64.exe.4208_1.13936.partial
Java Version 8 Update 60-jre-8u60-windows-x64.exe
java.exe
unconfirmed 349013.crdownload
bit35d7.tmp
target.exe
d5c49a9e-9607-4b53-bd3f-725ca1e97131.exe
jre-8u60-windows-x64.exe.8td1l8u.partial
Java-1.8.0.60_x64.exe
bitd341.tmp
40e0b9ba6dcd2ca218e75e2c3f327c4ef187bf03e541c856b21123764d109ba5-content_6b350960-706d-47e0-8496-b91977aec919.1.ent0004c.temp
jre-8u60-windows-x64.exe.wfarwg2.partial
jre-8u60-windows-x64.exe.18272_1.939.partial
jre-8u60-windows-x64.exe.5588_1.1614.partial
jre-8u60-windows-x64.exe
jre-8u60-windows-x64.exe.qhsn3fi.partial
bit930c.tmp
bitfb63.tmp
jre-8u60-windows-x64.exe.iqmjde2.partial
jre-8u60-windows-x64 (1).exe
bitc314.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!