setup.exe

Dell Inc

Publisher:
Dell Inc  (signed and verified)

Description:
Setup

Version:
12.0.21005.1 built by: REL

MD5:
77b969f0440fd137d70654a04804a838

SHA-1:
44cbd47028fa55fafeca9c74f49002463e791d75

SHA-256:
a224701da12d09cf7671b6e7ed4e34cdc6b10f25f0fde7f0b7d4df7385bd7e5f

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/16/2024 3:50:09 PM UTC  (today)

File size:
422.2 KB (432,344 bytes)

Product version:
12.0.21005.1

Copyright:
© Microsoft Corporation. All rights reserved.

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/27/2013 8:00:00 PM

Valid to:
11/13/2015 6:59:59 PM

Subject:
CN=Dell Inc, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=OS Cert, O=Dell Inc, L=Round Rock, S=Texas, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1A487B5F3B57E6E27197A80CACD658AD

File PE Metadata
Compilation timestamp:
10/5/2013 12:40:50 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:SDRMxppSSVridF55EGOaJhaQXgFIaUHQWWiNLsqEIvooEE0WgpgtjvHhDGntOTb0:SDGxppI1wQwFXQWiNdj6u41

Entry address:
0x2FAFD

Entry point:
E8, AD, 65, 00, 00, E9, 7F, FE, FF, FF, E9, 06, 32, 00, 00, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, E8, B5, 32, 00, 00, C7, 06, 44, 65, 40, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 44, 65, 40, 00, E9, C0, 32, 00, 00, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 64, 6D, 00, 00, 59, 85, C0, 74, 11, FF, 75, 08, E8, C5, 6C, 00, 00, 59, 85, C0, 74, E6, 8B, E5, 5D, C3, 6A, 01, 8D, 45, FC, C7, 45, FC, 4C, 65, 40, 00, 50, 8D, 4D, F0, E8, 47, 32, 00, 00, 68, 4C, 10, 45, 00, 8D, 45, F0, C7, 45, F0, 44, 65, 40, 00, 50...
 
[+]

Entropy:
6.2492

Code size:
323.5 KB (331,264 bytes)

The file setup.exe has been seen being distributed by the following URL.