20160219-003-i32.exe

Symantec Corporation

This is a setup program which is used to install the application. The file has been seen being downloaded from definitions.symantec.com.
Publisher:
Symantec Corporation  (signed and verified)

MD5:
9bc6d144737868c4630a8bd971971c0c

SHA-1:
481931b4699eac60566624b60d91273aa39d2c0f

SHA-256:
73f1e3cdeb8e9103cac5deaffda78c9d1836903781d0ddae7b160da3acf3e5a5

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/25/2024 1:13:16 PM UTC  (today)

File size:
829.5 MB (869,794,680 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\20160219-003-i32.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/8/2013 5:30:00 AM

Valid to:
1/7/2017 5:29:59 AM

Subject:
CN=Symantec Corporation, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Symantec Corporation, L=Mountain View, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
12DB9E53539B8E248BC77DD2BA611167

File PE Metadata
Compilation timestamp:
5/15/2003 2:13:10 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

CTPH (ssdeep):
25165824:Iw3y/nJWZ664S6ZASbxuhW7szjUUxO2q1mhvJos2qK:IFno66pS6878bO2qmvJn2R

Entry address:
0x207F0

Entry point:
60, BE, 00, 60, 41, 00, 8D, BE, 00, B0, FE, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.9937

Packer / compiler:
UPX 2.90LZMA

Code size:
44 KB (45,056 bytes)

The file 20160219-003-i32.exe has been seen being distributed by the following URL.