fxdc4c2260plw14011nw2k3fja.exe

Fuji Xerox Co., Ltd.

This is a setup program which is used to install the application. The file has been seen being downloaded from download.fujixerox.co.jp.
Publisher:
Fuji Xerox Co., Ltd.  (signed and verified)

MD5:
759147386a0cd58cc8e2b2c85dc7bcab

SHA-1:
bf64cd20e7bcba27e98c6cb9152d8c8cf81c69e9

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/24/2024 5:12:20 PM UTC  (today)

File size:
12.8 MB (13,446,896 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\My documents\downloads\fxdc4c2260plw14011nw2k3fja.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/27/2014 9:00:00 AM

Valid to:
10/28/2015 8:59:59 AM

Subject:
CN="Fuji Xerox Co., Ltd.", OU=Controller Platform Development III, O="Fuji Xerox Co., Ltd.", L="6-1 Minatomirai, Nishi-ku, Yokohama-shi", S=Kanagawa, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
16F09C194C5F3E149386032E68402585

File PE Metadata
Compilation timestamp:
11/3/2009 5:23:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
196608:bBGvHXbh+BfgkXEwztNj1b/V0Vmyw2dglRmtcmbo6qRGPOtnvrk6qXuw9na6O:Ngbh+BokL1LVO6AgqWmrqESjMzn1O

Entry address:
0x14BDF

Entry point:
E8, 32, 67, 00, 00, E9, 17, FE, FF, FF, 3B, 0D, D8, D9, 42, 00, 75, 02, F3, C3, E9, B2, 67, 00, 00, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 58, 4C, 41, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 84, E6, 00, 00, 8B, 45, 0C, 8B, 40, 04, 83...
 
[+]

Entropy:
7.9943  (probably packed)

Code size:
148 KB (151,552 bytes)

The file fxdc4c2260plw14011nw2k3fja.exe has been seen being distributed by the following URL.