File: 2f658964ef72818e690514a7dab84b87

Metadata
File name:N/A
File type:PE32 executable (GUI) Intel 80386, for MS Windows
File size:1043936
Analysis date:N/A
MD5:2f658964ef72818e690514a7dab84b87
SHA1:c7409391843edd81b7ddb893680262c4cd01fb9e
SHA256:780664249e204f5ac1872114b90c5c0af453a1d30d6bd5a389dcbb94666dd256
SHA512:N/A
SSDEEP:N/A
IMPHASH:N/A
Authentihash:N/A
Related resources
PE TypePE32
Internal NameSFXCAB.EXE
File Size1019 kB
Machine TypeIntel 386 or later, and compatibles
File OSWindows NT 32-bit
Installer Version6.3.13.0
Code Size31232
OS Version5.2
Entry Point0x1e000
File Flags Mask0x003f
Linker Version7.10
File SubtypeN/A
Uninitialized Data SizeN/A
File Version1
Initialized Data Size6656
File DescriptionSecurity Update
Product Version Number6.2.29.0
Installation TypeFull
Package TypeSecurity Update
Product NameWindows XP Family
Company NameMicrosoft Corporation
MIME Typeapplication/octet-stream
Character SetUnicode
Installer Engineupdate.exe
Language CodeChinese (Simplified)
File Version Number1.0.0.0
File TypeWin32 EXE
Proc Architecturex86
Original FilenameSFXCAB.EXE
KB Article Number2510581
Legal Copyright© Microsoft Corporation. All rights reserved.
SubsystemWindows GUI
Build Date2011/03/04
Self-Extractor VersionSFXCAB v6.2.29.0
AppliestoWindows XP Service Pack 3
Object File TypeExecutable application
Image Version5.2
WarningPossibly corrupt Version resource
File Flags(none)
Subsystem Version4.0
Product Version6.2.0029.0
Source:
APTNotes
Cyber threat intelligence reports associated with 2f658964ef72818e690514a7dab84b87.
Loading...
Domains
Domains the malware sample communicates with.
Hosts
Hosts the malware sample communicates with.
HTTP Requests
HTTP requests the malware sample makes.
AV Detections
AV detection names associated with the malware sample.
Mutants
Mutants created by the malware sample.
Registry keys
Registry keys created by the malware sample.
Comments
User comments about 2f658964ef72818e690514a7dab84b87.
NOTICE: We have updated our privacy terms and conditions in accordance to GDPR. By using our site, you acknowledge that you have read and understand our Privacy Policy. Your use of ThreatMiner’s Products and Services is subject to these policies and terms.