desjet3d-v110-4144-64bit.exe

Hewlett-Packard Company

This is a setup program which is used to install the application. The file has been seen being downloaded from h20565.www2.hp.com.
Publisher:
Hewlett-Packard Company  (signed and verified)

MD5:
23aee393e243823a22247e3f8694300d

SHA-1:
c76793ce94369132b4dba73df8e562f0af9d79cd

SHA-256:
8ba42458331c0e38378e178c748743c1ee84192b89280a4f5cc098f6bccd7ae1

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 5:41:51 PM UTC  (today)

File size:
306.5 MB (321,350,968 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\desjet3d-v110-4144-64bit.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/15/2012 1:00:00 AM

Valid to:
11/16/2015 12:59:59 AM

Subject:
CN=Hewlett-Packard Company, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Hewlett-Packard Company, L=Andover, S=Massachusetts, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
10563E7139A32E56345828AE2BC91EA5

File PE Metadata
Compilation timestamp:
12/1/2010 4:25:47 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6291456:Wpl7ntxHhJxPyFgwoOgQEOlLgqijkHIQVoKigycAn4eHI7DefNFThO:6JtlJgxgQEOlEqiYHPogpADo7DqPI

Entry address:
0x6791

Entry point:
E8, B9, 27, 00, 00, E9, 89, FE, FF, FF, 2D, A4, 03, 00, 00, 74, 22, 83, E8, 04, 74, 17, 83, E8, 0D, 74, 0C, 48, 74, 03, 33, C0, C3, B8, 04, 04, 00, 00, C3, B8, 12, 04, 00, 00, C3, B8, 04, 08, 00, 00, C3, B8, 11, 04, 00, 00, C3, 8B, FF, 56, 57, 8B, F0, 68, 01, 01, 00, 00, 33, FF, 8D, 46, 1C, 57, 50, E8, D6, A9, FF, FF, 33, C0, 0F, B7, C8, 8B, C1, 89, 7E, 04, 89, 7E, 08, 89, 7E, 0C, C1, E1, 10, 0B, C1, 8D, 7E, 10, AB, AB, AB, B9, A8, 11, 41, 00, 83, C4, 0C, 8D, 46, 1C, 2B, CE, BF, 01, 01, 00, 00, 8A, 14, 01...
 
[+]

Code size:
51.5 KB (52,736 bytes)

The file desjet3d-v110-4144-64bit.exe has been seen being distributed by the following URL.