osc2013-kb2738001-fullfile-x86-glb.exe

Microsoft Corporation

This is a setup program which is used to install the application. The file has been seen being downloaded from hotfixv4.microsoft.com.
Publisher:
Microsoft Corporation  (signed and verified)

Version:
1.3.2.6557

MD5:
4d652ebc923de6d9be9b3dc90f0b209c

SHA-1:
341b56078aa8e8ff792b334a6e016acf7ec35c76

SHA-256:
fe3d063146bb0ef7900092d76e4dc522a467a41cc8ce9136bf871ec9ba69a5a4

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)
Whitelisted  (by digital signature)

Analysis date:
11/5/2024 3:30:36 PM UTC  (today)

File size:
5.1 MB (5,312,920 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Authority:
Microsoft Corporation

Valid from:
1/24/2013 11:33:39 PM

Valid to:
4/25/2014 12:33:39 AM

Subject:
CN=Microsoft Corporation, OU=MOPR, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Issuer:
CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Serial number:
33000000B011AF0A8BD03B9FDD0001000000B0

File PE Metadata
Compilation timestamp:
11/7/2006 5:28:41 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:z3RZssboNNTGzqD/RfphvV1Ig1r6YSBhqe/TU9jcjVI7CNK7H82zKR:cssNNTHdBhvXxVsRcIjq7Cg7H82za

Entry address:
0xF152

Entry point:
55, 8B, EC, 6A, FF, 68, E8, 53, 41, 00, 68, 70, 09, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 68, 50, 41, 00, 33, D2, 8A, D4, 89, 15, F8, B8, 41, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, F4, B8, 41, 00, C1, E1, 08, 03, CA, 89, 0D, F0, B8, 41, 00, C1, E8, 10, A3, EC, B8, 41, 00, 6A, 01, E8, B6, 03, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C3, 00, 00, 00, 59, E8, 86, 18, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B2, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
80 KB (81,920 bytes)

The file osc2013-kb2738001-fullfile-x86-glb.exe has been seen being distributed by the following URL.