× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a09787812790b59ec3d36120788ae9f80b7bdda1e2d7a17a46d8112324632737
File name: file
Detection ratio: 0 / 54
Analysis date: 2016-02-07 03:16:08 UTC ( 3 days, 14 hours ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20160207
Ad-Aware 20160207
AegisLab 20160207
Agnitum 20160206
AhnLab-V3 20160206
Alibaba 20160204
Antiy-AVL 20160207
Arcabit 20160207
Avast 20160207
Avira 20160206
Baidu-International 20160206
BitDefender 20160207
Bkav 20160204
ByteHero 20160207
CAT-QuickHeal 20160206
CMC 20160205
ClamAV 20160206
Comodo 20160206
Cyren 20160207
DrWeb 20160207
ESET-NOD32 20160207
Emsisoft 20160207
F-Prot 20160129
F-Secure 20160206
Fortinet 20160207
GData 20160207
Ikarus 20160206
Jiangmin 20160206
K7AntiVirus 20160206
K7GW 20160207
Kaspersky 20160207
Malwarebytes 20160207
McAfee 20160207
McAfee-GW-Edition 20160207
MicroWorld-eScan 20160207
Microsoft 20160207
NANO-Antivirus 20160207
Panda 20160206
Qihoo-360 20160207
Rising 20160206
SUPERAntiSpyware 20160206
Sophos 20160207
Symantec 20160206
Tencent 20160207
TheHacker 20160206
TotalDefense 20160207
TrendMicro 20160207
TrendMicro-HouseCall 20160207
VBA32 20160204
VIPRE 20160207
ViRobot 20160206
Zillya 20160206
Zoner 20160207
nProtect 20160205
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 2008-2010 The Eraser Project

Original name Eraser Setup Bootstrapper
Internal name Eraser Setup Bootstrapper
File version 6.0.10.2620
Description Eraser Setup Bootstrapper
Comments Eraser Setup Bootstrapper
Signature verification Signed file, verified signature
Signing date 1:15 AM 5/22/2012
Signers
[+] Joel Low - Open Source Developer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Valid from 1:01 PM 5/30/2011
Valid to 1:01 PM 5/29/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 799A50726E864D3A7C4090F764A34052417726A0
Serial number 69 71 9A 06 13 22 37 34 74 44 BE 9A C8 53 60 D2
[+] Certum Level III CA
Status Valid
Valid from 1:53 PM 3/3/2009
Valid to 1:53 PM 3/3/2024
Valid usage All
Algorithm sha1RSA
Thumbprint 827E72353D6910A9DEC7F3D1061676E80356FD53
Serial number 04 7A 53
[+] Certum
Status Valid
Valid from 11:46 AM 6/11/2002
Valid to 11:46 AM 6/11/2027
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, OCSP Signing
Algorithm sha1RSA
Thumbprint 6252DC40F71143A22FDE9EF7348E064251B18118
Serial number 01 00 20
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-05-22 00:13:25
Link date 1:13 AM 5/22/2012
Entry Point 0x0000F32C
Number of sections 5
PE sections
Overlays
MD5 24076b0c28ab395ce34ee70ef24bfafe
File type data
Offset 9104896
Size 5560
Entropy 7.34
PE imports
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateFontIndirectW
GetStdHandle
WaitForSingleObject
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
SetLastError
BeginUpdateResourceW
UpdateResourceW
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentThreadId
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
EndUpdateResourceW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetModuleFileNameW
FindNextFileW
FindFirstFileW
IsValidLocale
GetUserDefaultLCID
CreateFileW
GetFileType
TlsSetValue
ExitProcess
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
LCMapStringW
FindResourceW
LCMapStringA
GetEnvironmentStringsW
CreateProcessW
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
GetTempPathW
VirtualFree
Sleep
VirtualAlloc
CommandLineToArgvW
UpdateWindow
GetMessageW
DefWindowProcW
PostQuitMessage
ShowWindow
SetWindowLongW
MessageBoxW
PeekMessageW
RegisterClassExW
TranslateMessage
DispatchMessageW
SendMessageW
GetWindowLongW
SetWindowTextW
SystemParametersInfoW
InvalidateRect
CallWindowProcW
LoadCursorW
LoadIconW
CreateWindowExW
EnableWindow
DestroyWindow
Number of PE resources by type
RT_ICON 7
RT_MANIFEST 1
RT_VERSION 1
RT_RCDATA 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 10
NEUTRAL DEFAULT 1
Debug information
ExifTool file metadata
SubsystemVersion
5.0

Comments
Eraser Setup Bootstrapper

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
6.0.10.2620

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
8983552

EntryPoint
0xf32c

OriginalFileName
Eraser Setup Bootstrapper

MIMEType
application/octet-stream

LegalCopyright
Copyright 2008-2010 The Eraser Project

FileVersion
6.0.10.2620

TimeStamp
2012:05:22 01:13:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Eraser Setup Bootstrapper

ProductVersion
6.0.10.2620

FileDescription
Eraser Setup Bootstrapper

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
The Eraser Project

CodeSize
120320

FileSubtype
0

ProductVersionNumber
6.0.10.2620

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
Execution parents
Compressed bundles
File identification
MD5 3880c0fd3083474cb7fae16dc62c747f
SHA1 f6c4003ef93bd226a37ef9a86dae4aa21cdbc8d7
SHA256 a09787812790b59ec3d36120788ae9f80b7bdda1e2d7a17a46d8112324632737
ssdeep
196608:N4kVBD0NXBaNHWW2jRwbCSri693//PgZq5AEix+dvwAqUW3e:mkV5IjFa/g03w+dvwyWu

authentihash 46b1d5cc0716d8ea16bdb5b8695d1c5fa09b0c2c5555dca038b0d77af664b6c5
imphash 52eb8318dd4c9811ca006137d912ab20
File size 8.7 MB ( 9110456 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.4%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
software-collection via-tor peexe signed overlay

VirusTotal metadata
First submission 2012-05-22 04:20:37 UTC ( 3 years, 8 months ago )
Last submission 2016-02-07 03:16:08 UTC ( 3 days, 14 hours ago )
File names Eraser 6.0.10.2620.exe
eraser_8678.exe
eraser_60102620.exe
Eraser 6.0.10.2620.exe
filename
Eraser.exe
Eraser 6.0.10.2620(cancellazione file).exe
eraser 6.0.10.2620.exe
eraser-6.0.10.2620.exe
Eraser Setup Bootstrapper
eraser 6.0.10.2620.exe.f1ejfhw.partial
Eraser(HDD Data Removal)_6.0.10.2620.exe
Eraser 6.exe
Eraser 6_0_10_2620_exe
Eraser 2014 oficial - 6.0.10.2620.exe
eraser%206.0.10.2620[1].exe
Eraser 6.0.10.2620(non portatile)scaricato dal sito ufficiale.exe
eraser_6.0.10.2620.exe
Не подтвержден 707107.crdownload
Eraser 6.0.10.2620 (2).exe
output.10274401.txt
MEv56IBB.exe.part
Eraser_6.0.10.2620_2.exe
Eraser 6.0.10.2620.exe
Eraser 6.0.10.2620_32-bits.exe
Software collections
website http://oldapps.com/eraser.php?old_eraser=7707
oldapps http://oldapps.com/eraser.php?old_eraser=7707?download
product Eraser 6.0.10
developer Heidi Computers Ltd.
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!