mspusbdescriptortool-5_00_00_19-windows-installer.exe

MSP USB Descriptor Tool

Texas Instruments

This is a self-extracting archive and installer. The file has been seen being downloaded from downloads.ti.com.
Publisher:
Texas Instruments

Product:
MSP USB Descriptor Tool

Version:
1.0.0.0

MD5:
f6aee0bd0efe132d5a9231567712f7bd

SHA-1:
bed6d9bd4e943dd866485009c314895d4335fa91

SHA-256:
84ebda6740ea8ae9b1a4c74b17eb8878bf27bb5b381cf9df23e244cd16945bb6

Scanner detections:
1 / 68

Status:
Clean  (1 probable false positive detection)

Explanation:
This is mosty likely a false positive detection, the file is probably clean.

Analysis date:
12/27/2024 12:58:07 AM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Adware.Softpulse-218
0.98/21274

File size:
5.6 MB (5,895,130 bytes)

Product version:
5_00_00_19

Copyright:
Copyright Texas Instruments

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\mspusbdescriptortool-5_00_00_19-windows-installer.exe

File PE Metadata
Compilation timestamp:
9/19/2014 1:28:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
98304:YnuLlbc+4UNCRy+mgPYN36B9WGzWPtGkrZQYaphv8ual7FolBot:YiJCReaU3W9x2GSZQYaY7F8ot

Entry address:
0x2C14B0

Entry point:
60, BE, 15, 60, 5E, 00, 8D, BE, EB, AF, E1, FF, C7, 87, A8, B4, 27, 00, A5, 58, 31, EE, 57, 89, E5, 8D, 9C, 24, 80, F1, FC, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 04, F4, 2B, 00, 57, 83, C3, 04, 53, 68, 8C, B4, 0D, 00, 56, 83, C3, 04, 53, 50, C7, 03, 07, 00, 04, 00, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9...
 
[+]

Entropy:
7.9928  (probably packed)

Code size:
884 KB (905,216 bytes)

The file mspusbdescriptortool-5_00_00_19-windows-installer.exe has been seen being distributed by the following URL.