app_quickset_w7_a03_setup_7pft6_zpe.exe

Dell Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from doc-14-3k-docs.googleusercontent.com.
Publisher:
Dell Inc.  (signed and verified)

Version:
1.3.1.12

MD5:
b1462c058f5e4200ed8900318a74310c

SHA-1:
6f41bebf1ecc5f59385e699c3d760bee0250f0e4

SHA-256:
fab3df074db08eca96184a781230d8e5d43a54ff839c9d72dee42df64602e087

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/25/2024 2:00:54 PM UTC  (today)

File size:
6.1 MB (6,355,376 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\???????? dell-7720\application\dell quickset application\quickset a03 v11.1.17 (20.07.12-29.04.13) w7x32x64\app_quickset_w7_a03_setup_7pft6_zpe.exe

Digital Signature
Signed by:

Authority:
Dell Inc.

Valid from:
5/12/2012 1:26:41 AM

Valid to:
5/12/2014 1:36:41 AM

Subject:
CN=Dell Inc., OU=IS, O=Dell Inc., L=Round Rock, S=TX, C=US

Issuer:
CN=Dell Inc. Enterprise Issuing CA2, O=Dell Inc.

Serial number:
1A9548620001000005F5

File PE Metadata
Compilation timestamp:
10/17/2003 10:35:08 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:covwZajEJ9Ls0l6fEHMG5o2LhU/XZeIEBfnMLeODrBDJmZFl+w6++hUSiiCDdw:Dv7jErBl6TG5CeIEqnGSFuSii4dw

Entry address:
0xEDB2

Entry point:
55, 8B, EC, 6A, FF, 68, B8, 43, 41, 00, 68, F8, 17, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 8C, 41, 41, 00, 33, D2, 8A, D4, 89, 15, B0, 88, 41, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, AC, 88, 41, 00, C1, E1, 08, 03, CA, 89, 0D, A8, 88, 41, 00, C1, E8, 10, A3, A4, 88, 41, 00, 6A, 01, E8, 41, 02, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C3, 00, 00, 00, 59, E8, 49, 0E, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B2, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
76 KB (77,824 bytes)

The file app_quickset_w7_a03_setup_7pft6_zpe.exe has been seen being distributed by the following URL.