× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a09787812790b59ec3d36120788ae9f80b7bdda1e2d7a17a46d8112324632737
File name: Eraser Setup Bootstrapper
Detection ratio: 0 / 57
Analysis date: 2015-05-23 23:47:11 UTC ( 3 hours, 17 minutes ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20150524
AVG 20150524
AVware 20150524
Ad-Aware 20150524
AegisLab 20150524
Agnitum 20150523
AhnLab-V3 20150523
Alibaba 20150523
Antiy-AVL 20150523
Avast 20150524
Avira 20150523
Baidu-International 20150523
BitDefender 20150524
Bkav 20150523
ByteHero 20150524
CAT-QuickHeal 20150523
CMC 20150520
ClamAV 20150523
Comodo 20150523
Cyren 20150523
DrWeb 20150523
ESET-NOD32 20150523
Emsisoft 20150523
F-Prot 20150523
F-Secure 20150523
Fortinet 20150524
GData 20150523
Ikarus 20150523
Jiangmin 20150522
K7AntiVirus 20150523
K7GW 20150523
Kaspersky 20150523
Kingsoft 20150524
Malwarebytes 20150524
McAfee 20150524
McAfee-GW-Edition 20150523
MicroWorld-eScan 20150523
Microsoft 20150524
NANO-Antivirus 20150523
Norman 20150523
Panda 20150523
Qihoo-360 20150524
Rising 20150523
SUPERAntiSpyware 20150523
Sophos 20150523
Symantec 20150524
Tencent 20150524
TheHacker 20150521
TotalDefense 20150523
TrendMicro 20150523
TrendMicro-HouseCall 20150523
VBA32 20150523
VIPRE 20150524
ViRobot 20150523
Zillya 20150521
Zoner 20150521
nProtect 20150522
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
Copyright © 2008-2010 The Eraser Project

Publisher Joel Low - Open Source Developer
Original name Eraser Setup Bootstrapper
Internal name Eraser Setup Bootstrapper
File version 6.0.10.2620
Description Eraser Setup Bootstrapper
Comments Eraser Setup Bootstrapper
Signature verification Signed file, verified signature
Signing date 1:15 AM 5/22/2012
Signers
[+] Joel Low - Open Source Developer
Status Certificate out of its validity period
Valid from 1:01 PM 5/30/2011
Valid to 1:01 PM 5/29/2012
Valid usage Code Signing
Algorithm SHA1
Thumbprint 799A50726E864D3A7C4090F764A34052417726A0
Serial number 69 71 9A 06 13 22 37 34 74 44 BE 9A C8 53 60 D2
[+] Certum Level III CA
Status Valid
Valid from 1:53 PM 3/3/2009
Valid to 1:53 PM 3/3/2024
Valid usage All
Algorithm SHA1
Thumbprint 827E72353D6910A9DEC7F3D1061676E80356FD53
Serial number 04 7A 53
[+] Certum
Status Valid
Valid from 11:46 AM 6/11/2002
Valid to 11:46 AM 6/11/2027
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing, OCSP Signing
Algorithm SHA1
Thumbprint 6252DC40F71143A22FDE9EF7348E064251B18118
Serial number 01 00 20
Counter signers
[+] Symantec Time Stamping Services Signer - G3
Status Certificate out of its validity period
Valid from 1:00 AM 5/1/2012
Valid to 12:59 AM 1/1/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint 8FD99D63FB3AFBD534A4F6E31DACD27F59504021
Serial number 79 A2 A5 85 F9 D1 15 42 13 D9 B8 3E F6 B6 8D ED
[+] VeriSign Time Stamping Services CA
Status Certificate out of its validity period
Valid from 1:00 AM 12/4/2003
Valid to 12:59 AM 12/4/2013
Valid usage Timestamp Signing
Algorithm SHA1
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Valid from 1:00 AM 1/1/1997
Valid to 12:59 AM 1/1/2021
Valid usage Timestamp Signing
Algorithm MD5
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
Packers identified
F-PROT CAB, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2012-05-22 00:13:25
Entry Point 0x0000F32C
Number of sections 5
PE sections
Overlays
MD5 24076b0c28ab395ce34ee70ef24bfafe
File type data
Offset 9104896
Size 5560
Entropy 7.34
PE imports
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateFontIndirectW
GetStdHandle
WaitForSingleObject
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
GetCPInfo
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetOEMCP
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
SetLastError
BeginUpdateResourceW
UpdateResourceW
RemoveDirectoryW
IsDebuggerPresent
HeapAlloc
GetModuleFileNameA
EnumSystemLocalesA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentThreadId
InterlockedIncrement
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
EndUpdateResourceW
GetExitCodeProcess
QueryPerformanceCounter
GetTickCount
TlsAlloc
LoadLibraryA
RtlUnwind
GetStartupInfoA
GetFileSize
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetModuleFileNameW
FindNextFileW
FindFirstFileW
IsValidLocale
GetUserDefaultLCID
CreateFileW
GetFileType
TlsSetValue
ExitProcess
LeaveCriticalSection
GetNativeSystemInfo
GetLastError
LCMapStringW
FindResourceW
LCMapStringA
GetEnvironmentStringsW
CreateProcessW
SizeofResource
GetCurrentProcessId
LockResource
GetCommandLineW
WideCharToMultiByte
HeapSize
InterlockedCompareExchange
RaiseException
TlsFree
GetModuleHandleA
ReadFile
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
HeapCreate
GetTempPathW
VirtualFree
Sleep
VirtualAlloc
CommandLineToArgvW
UpdateWindow
GetMessageW
DefWindowProcW
PostQuitMessage
ShowWindow
SetWindowLongW
MessageBoxW
PeekMessageW
RegisterClassExW
TranslateMessage
DispatchMessageW
SendMessageW
GetWindowLongW
SetWindowTextW
SystemParametersInfoW
InvalidateRect
CallWindowProcW
LoadCursorW
LoadIconW
CreateWindowExW
EnableWindow
DestroyWindow
Number of PE resources by type
RT_ICON 7
RT_MANIFEST 1
RT_VERSION 1
RT_RCDATA 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 10
NEUTRAL DEFAULT 1
ExifTool file metadata
SubsystemVersion
5.0

Comments
Eraser Setup Bootstrapper

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
6.0.10.2620

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
8983552

EntryPoint
0xf32c

OriginalFileName
Eraser Setup Bootstrapper

MIMEType
application/octet-stream

LegalCopyright
Copyright 2008-2010 The Eraser Project

FileVersion
6.0.10.2620

TimeStamp
2012:05:22 01:13:25+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Eraser Setup Bootstrapper

ProductVersion
6.0.10.2620

FileDescription
Eraser Setup Bootstrapper

OSVersion
5.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
The Eraser Project

CodeSize
120320

FileSubtype
0

ProductVersionNumber
6.0.10.2620

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
Execution parents
Compressed bundles
File identification
MD5 3880c0fd3083474cb7fae16dc62c747f
SHA1 f6c4003ef93bd226a37ef9a86dae4aa21cdbc8d7
SHA256 a09787812790b59ec3d36120788ae9f80b7bdda1e2d7a17a46d8112324632737
ssdeep
196608:N4kVBD0NXBaNHWW2jRwbCSri693//PgZq5AEix+dvwAqUW3e:mkV5IjFa/g03w+dvwyWu

authentihash 46b1d5cc0716d8ea16bdb5b8695d1c5fa09b0c2c5555dca038b0d77af664b6c5
imphash 52eb8318dd4c9811ca006137d912ab20
File size 8.7 MB ( 9110456 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (67.3%)
Win32 Dynamic Link Library (generic) (14.2%)
Win32 Executable (generic) (9.7%)
Generic Win/DOS Executable (4.3%)
DOS Executable Generic (4.3%)
Tags
software-collection overlay peexe signed via-tor

VirusTotal metadata
First submission 2012-05-22 04:20:37 UTC ( 3 years ago )
Last submission 2015-05-23 18:42:39 UTC ( 8 hours, 21 minutes ago )
File names Eraser 6.0.10.2620.exe
eraser_8678.exe
Eraser 6.0.10.2620.exe
Eraser.exe
Eraser 6.0.10.2620(cancellazione file).exe
eraser 6.0.10.2620.exe
eraser-6.0.10.2620.exe
Eraser Setup Bootstrapper
eraser 6.0.10.2620.exe.f1ejfhw.partial
Eraser(HDD Data Removal)_6.0.10.2620.exe
Eraser 6.exe
Eraser 6_0_10_2620_exe
Eraser 2014 oficial - 6.0.10.2620.exe
eraser%206.0.10.2620[1].exe
Eraser 6.0.10.2620(non portatile)scaricato dal sito ufficiale.exe
eraser_6.0.10.2620.exe
Не подтвержден 707107.crdownload
Eraser 6.0.10.2620 (2).exe
output.10274401.txt
MEv56IBB.exe.part
Eraser_6.0.10.2620_2.exe
Eraser 6.0.10.2620.exe
Setup_product_14671.exe
HTTP-F04J4w3zUURkR1iERf.exe
Eraser-6.0.10.2620.exe
Software collections
website http://oldapps.com/eraser.php?old_eraser=7707
oldapps http://oldapps.com/eraser.php?old_eraser=7707?download
product Eraser 6.0.10
developer Heidi Computers Ltd.
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!