gfiwebmonitor_net_x64.exe

GFI Downloader

GFI Software Development Ltd

Publisher:
GFI Software Development Ltd  (signed and verified)

Product:
GFI Downloader

Description:
Bootstrapper

Version:
1.0.0.4

MD5:
08f2b56c6d75bb3cbe4bb87ec7ccef5e

SHA-1:
67942efcc01718e7aa4b8733856dfa87639a5faf

SHA-256:
2213f9b7eb4317334dae81a4908fa94e2c6c8dd1d3bf86362350a9af80aaa7d4

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/24/2024 2:04:14 PM UTC  (today)

File size:
482.3 KB (493,912 bytes)

Product version:
1.0.0.4

Copyright:
Copyright (C) 2015

Original file name:
GFIDownl.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\gfiwebmonitor_net_x64.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
6/24/2014 8:00:00 PM

Valid to:
6/28/2017 8:00:00 AM

Subject:
CN=GFI Software Development Ltd, O=GFI Software Development Ltd, L=Mriehel, S=Birkirkara, C=MT

Issuer:
CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
011F231CFDAE0BE3D75476BF3D727A30

File PE Metadata
Compilation timestamp:
8/12/2015 11:27:44 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:901eNfAf+HB1daReMNdmXPpFAo8pOzWJu7bu6pOxv///Se/xPntI6P:lWf+h1dueOAXhF6pQt7fpO9///v1I6P

Entry address:
0x31587

Entry point:
E8, B3, 9E, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, B0, 3F, 45, 00, E8, B3, 50, 00, 00, E8, 97, 72, 00, 00, 0F, B7, F0, 6A, 02, E8, 46, 9E, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 2E, 91, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4966

Code size:
279 KB (285,696 bytes)

The file gfiwebmonitor_net_x64.exe has been seen being distributed by the following URL.