ssvm_sfx_2_0.exe

Sophos Limited

This is a setup program which is used to install the application. The file has been seen being downloaded from www.sophos.com.
Publisher:
Sophos Limited  (signed and verified)

MD5:
c7953c3c014efd2902e5b97ffb3ebe9e

SHA-1:
99807658484f86577e7bfcb4e6ac89f0e40e5722

SHA-256:
36b6d5ed9f4396e12d82287bcae65dff07bc40513b83fbd99a07b17f21dc4ac6

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 8:49:04 AM UTC  (today)

File size:
266.5 MB (279,407,464 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\ssvm_sfx_2_0.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/24/2013 1:00:00 AM

Valid to:
12/22/2016 11:59:59 PM

Subject:
CN=Sophos Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Sophos Limited, L=Abingdon, S=Oxfordshire, C=GB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2BC0BB54AB4C36B217953FD3032522A8

File PE Metadata
Compilation timestamp:
1/20/2016 6:59:36 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6291456:MzcMkrIk134qlQoTypHscbouarBAs0XXtYtWaYaOXx0nUp69Rv+ucI9Ig:MQ4w4+QoYscbba2BHOtWIK0nUpypcI9N

Entry address:
0x1E64B

Entry point:
E8, DF, 65, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 82, FC, FF, FF, C7, 06, 94, C8, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 94, C8, 42, 00, E9, 37, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, 94, C8, 42, 00, E8, 24, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 6A, CA, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Entropy:
7.9993  (probably packed)

Code size:
166 KB (169,984 bytes)

The file ssvm_sfx_2_0.exe has been seen being distributed by the following URL.