samsung-s2-us-cell_usb_driver_for_mobile_phones_v1.5.14.0.exe

SAMSUNG USB Driver for Mobile Phones

SAMSUNG Electronics Co., Ltd.

The program is a setup application that uses the Nullsoft Scriptable Install System installer. The file has been seen being downloaded from www.mobileusbdriver.com.
Publisher:
SAMSUNG Electronics Co., Ltd.

Product:
SAMSUNG USB Driver for Mobile Phones

Description:
SAMSUNG USB Driver for Mobile Phones

Version:
1.5.14.0

MD5:
79bc0fede2f9149e8157edfb0fe00cbf

SHA-1:
283885fe69b317afec2ad7554858a40b03d4dc2c

SHA-256:
801f9826b833bf527949e26af574f4582f540543bb4420439a866dd51a371255

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/19/2024 7:46:06 PM UTC  (today)

File size:
23.1 MB (24,260,096 bytes)

Copyright:
SAMSUNG Electronics Co., Ltd. All Rights Reserved

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Scriptable Install System

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\samsung-s2-us-cell_usb_driver_for_mobile_phones_v1.5.14.0.exe

File PE Metadata
Compilation timestamp:
12/6/2009 9:50:41 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:vac6IrsKMwwzgH/q667HPyT9WwkztIfkBJ5iurNcDiCSLZmsVgqL3n2EcKfTE:icnp/wcH/qnHaupIfEHHxcCYsVgqL3no

Entry address:
0x30CB

Entry point:
80, F4, 40, 88, DF, 0F, B6, C3, FF, CA, C6, C3, A3, 8A, E6, 86, CF, B1, 89, 4B, 43, FF, CF, 81, C2, BE, E6, 00, 00, EB, 04, F3, 0F, AF, EA, 81, EA, 0C, 08, 00, 00, EB, 07, 3C, 25, 15, 14, FC, E2, 9D, B3, EA, 0F, AF, F7, 8A, ED, 01, D1, 0F, AF, F9, E8, 00, 00, 00, 00, B1, 60, 89, F5, 87, C1, 86, C0, 74, 04, 8A, CB, 85, F8, 8D, 5D, 00, 8B, F7, 49, 69, F2, 74, 37, A3, 62, 8D, 3D, 32, D3, E8, 65, 8D, 05, 16, EA, 0C, F3, 2B, D3, C6, C0, 2D, F3, 58, FE, CF, 49, 45, 55, 56, F6, C3, ED, 46, B3, 90, F2, 8D, 0D, A9...
 
[+]

Entropy:
7.9999  (probably packed)

Code size:
22.5 KB (23,040 bytes)

The file samsung-s2-us-cell_usb_driver_for_mobile_phones_v1.5.14.0.exe has been seen being distributed by the following URL.