WEXTRACT.EXE

Internet Explorer 9

Microsoft Corporation

Publisher:
Microsoft Corporation  (signed and verified)

Product:
Internet Explorer 9

Description:
Win32 Cabinet Self-Extractor

Version:
5.50.4134.600

MD5:
9d93a09957f5437c9f1fb9e83c5d6524

SHA-1:
b8eeda1917b67f47e8bcd642cf3ff3de8f14c51e

SHA-256:
673b6d5a19efef1b914b01d2c81b0e47cc74803b5a5ae5a4cacb31d666bb138c

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)
Whitelisted  (by digital signature)

Analysis date:
12/28/2024 12:06:50 PM UTC  (today)

File size:
36.7 MB (38,487,400 bytes)

Product version:
5.50.4134.600

Copyright:
Copyright (C) Microsoft Corp. 1981-2000

Original file name:
WEXTRACT.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\wextract.exe

Digital Signature
Authority:
Microsoft Corporation

Valid from:
10/10/2011 4:32:25 PM

Valid to:
1/10/2013 3:32:25 PM

Subject:
CN=Microsoft Corporation, OU=MOPR, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Issuer:
CN=Microsoft Code Signing PCA, O=Microsoft Corporation, L=Redmond, S=Washington, C=US

Serial number:
6119CC93000100000066

File PE Metadata
Compilation timestamp:
6/6/2000 4:43:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.12

CTPH (ssdeep):
786432:EMnWJuV/SZQqXbeeHkTLAiWX1LYXc6O9VBL:kQSZTXbefH9c6O9nL

Entry address:
0x2891

Entry point:
55, 8B, EC, 83, EC, 44, 56, FF, 15, DC, 10, 00, 01, 8B, F0, 8A, 06, 3C, 22, 75, 14, 8A, 46, 01, 46, 84, C0, 74, 04, 3C, 22, 75, F4, 80, 3E, 22, 75, 0D, 46, EB, 0A, 3C, 20, 7E, 06, 46, 80, 3E, 20, 7F, FA, 8A, 06, 84, C0, 74, 07, 3C, 20, 7F, 03, 46, EB, F3, 83, 65, E8, 00, 8D, 45, BC, 50, FF, 15, D8, 10, 00, 01, F6, 45, E8, 01, 74, 06, 0F, B7, 45, EC, EB, 03, 6A, 0A, 58, 50, 56, 6A, 00, 6A, 00, FF, 15, 60, 11, 00, 01, 50, E8, 0E, 00, 00, 00, 8B, F0, 56, FF, 15, D0, 10, 00, 01, 8B, C6, 5E, C9, C3, 56, 33, F6...
 
[+]

Entropy:
7.9998  (probably packed)

Code size:
34 KB (34,816 bytes)

The file WEXTRACT.EXE has been seen being distributed by the following 5 URLs.