patch_pf597.exe

Kaspersky Lab

This is a setup program which is used to install the application.
Publisher:
Kaspersky Lab ZAO  (signed by Kaspersky Lab)

Description:
pf597

Version:
1,1,240,5500

MD5:
70c642c596f3e71e0525872fd99789d3

SHA-1:
13af7eb9362a628dcd7c4da69eac0403a9349524

SHA-256:
304f98f9cd5a469fdcdacfb27876d5c6207e760b5fb8d71587367809f1efd0ec

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
7/7/2025 4:23:37 AM UTC  (today)

File size:
1.6 MB (1,627,336 bytes)

Product version:
0,2,1,23

Copyright:
© 2012 Kaspersky Lab ZAO.

Trademarks:
Registered trademarks and service marks are the property of their respective owners

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\patch_pf597.exe

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
2/21/2013 6:00:00 PM

Valid to:
4/28/2015 7:00:00 AM

Subject:
CN=Kaspersky Lab, O=Kaspersky Lab, L=Moscow, C=RU

Issuer:
CN=DigiCert High Assurance Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0226E6BDA76DAE711E3DB2321E3B5308

File PE Metadata
Compilation timestamp:
11/20/2014 2:53:07 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:IJHl8gdbyUvpkLwR4ZOQKdbUdgvq8bY6YuwuKdbUdgvq8bY6YuwoD0ZnD0Z:IxdyUvpkLwR55M/MO0ZD0Z

Entry address:
0x2EB8A

Entry point:
E8, 24, 75, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 56, 8B, F1, C6, 46, 0C, 00, 85, C0, 75, 63, E8, 25, 72, 00, 00, 89, 46, 08, 8B, 48, 6C, 89, 0E, 8B, 48, 68, 89, 4E, 04, 8B, 0E, 3B, 0D, 90, 9C, 45, 00, 74, 12, 8B, 0D, 48, 9A, 45, 00, 85, 48, 70, 75, 07, E8, 1E, 7F, 00, 00, 89, 06, 8B, 46, 04, 3B, 05, 50, 99, 45, 00, 74, 16, 8B, 46, 08, 8B, 0D, 48, 9A, 45, 00, 85, 48, 70, 75, 08, E8, 7D, 77, 00, 00, 89, 46, 04, 8B, 46, 08, F6, 40, 70, 02, 75, 14, 83, 48, 70, 02, C6, 46, 0C, 01, EB, 0A...
 
[+]

Entropy:
7.6138

Code size:
279.5 KB (286,208 bytes)

The file patch_pf597.exe has been seen being distributed by the following URL.