NPE.exe

Norton Power Eraser

Symantec Corporation

Publisher:
Symantec Corporation  (signed and verified)

Product:
Norton Power Eraser

Version:
5.0.0.31

MD5:
ead98a350fbc1249be29a947d45945fc

SHA-1:
fea2dc26caa0dfb4c4170a99ee4823780e486421

SHA-256:
8d1d78cc778f12ffb75337a050cb99c9af82ae970e9f65f84b99d31c31a9f59e

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/19/2024 12:09:46 PM UTC  (today)

File size:
9.6 MB (10,093,544 bytes)

Product version:
5.0

Copyright:
Copyright (c) 1997-2015 Symantec Corporation

Original file name:
NPE.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\npe.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/8/2013 2:00:00 AM

Valid to:
1/7/2017 12:59:59 AM

Subject:
CN=Symantec Corporation, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Symantec Corporation, L=Mountain View, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
12DB9E53539B8E248BC77DD2BA611167

File PE Metadata
Compilation timestamp:
6/7/2015 6:58:35 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
196608:CCZPwx+2gitGBdgWxZesfgvmdrAld1/i+vKrqN163cmp:zYTgitkd9fgvrxi+vKrqNENp

Entry address:
0x21432A

Entry point:
E8, 7D, 5D, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 45, 0C, 83, EC, 20, 56, 57, 6A, 08, 59, BE, 70, BD, 9E, 00, 8D, 7D, E0, F3, A5, 8B, 4D, 08, 5F, 5E, 85, C0, 74, 0D, F6, 00, 10, 74, 08, 8B, 01, 8B, 40, FC, 8B, 40, 18, 89, 4D, F8, 89, 45, FC, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 8C, 31, 9D, 00, C9, C2, 08, 00, 55, 8B, EC, 56, FC, 8B, 75, 0C, 8B, 4E, 08, 33, CE, E8, 13, A5, FF, FF, 6A, 00, 56, FF, 76, 14, FF, 76, 0C...
 
[+]

Entropy:
6.6469

Code size:
5.8 MB (6,099,968 bytes)

The file NPE.exe has been seen being distributed by the following URL.