glyph 2.exe

Exent Technologies Ltd.

The program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from fa.softoware.net.
Publisher:
Exent Technologies Ltd.  (signed and verified)

MD5:
ae3047c981072b33d5f1b2d9e65d6e37

SHA-1:
2299f73a9f23b12b86e1a0cbb6597219d2aa77ae

SHA-256:
ac51dd5bb10424af2a630d66ad104a3445c30184b239322889782b25425ea9df

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/16/2024 12:56:12 PM UTC  (today)

File size:
717.7 KB (734,936 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\glyph 2.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
8/5/2014 4:30:00 AM

Valid to:
8/6/2015 4:29:59 AM

Subject:
CN=Exent Technologies Ltd., OU=IT, O=Exent Technologies Ltd., L=Petach Tikva, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
4682D777E39325BE9FB51EB2E27D5E37

File PE Metadata
Compilation timestamp:
6/20/1992 2:52:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:OWvp/4twXq7+7MYczzqWPAz20nMIZ54RitUErly6MYyetvY/AkNCvu4cVYa1cWKr:OWvSwXqi7vcMXnMIH4RxKly6YW0NAjcf

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8327

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file glyph 2.exe has been seen being distributed by the following URL.

Scan glyph 2.exe - Powered by Reason Core Security