hpdjz2100serieswx64pcl.exe

Hewlett-Packard Company

This is a setup program which is used to install the application. The file has been seen being downloaded from h20564.www2.hp.com.
Publisher:
Hewlett-Packard Company  (signed and verified)

MD5:
d548ef2b2351355eb5c555ac99d55e7b

SHA-1:
3ec1320ba39a7a47cd740df0e40c77d9d75b5208

SHA-256:
572ec7cf3bc1bd43b69ee24f960fd1200d33f06a354f1ff9fc095d46ca0119f3

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 10:45:08 PM UTC  (today)

File size:
4.1 MB (4,249,912 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\hpdjz2100serieswx64pcl.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/15/2012 12:00:00 AM

Valid to:
11/15/2015 11:59:59 PM

Subject:
CN=Hewlett-Packard Company, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Hewlett-Packard Company, L=Andover, S=Massachusetts, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
10563E7139A32E56345828AE2BC91EA5

File PE Metadata
Compilation timestamp:
9/8/2008 9:08:26 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
98304:mv95Nhe6dc744YV2nIbKfsY4yhzzO60Q4T3cvAcCGP1PbIcy:GjNhe6dcL6uF5O1DodPBbg

Entry address:
0x66D0

Entry point:
E8, 21, 27, 00, 00, E9, 16, FE, FF, FF, 2D, A4, 03, 00, 00, 74, 22, 83, E8, 04, 74, 17, 83, E8, 0D, 74, 0C, 48, 74, 03, 33, C0, C3, B8, 04, 04, 00, 00, C3, B8, 12, 04, 00, 00, C3, B8, 04, 08, 00, 00, C3, B8, 11, 04, 00, 00, C3, 53, 55, 56, 57, BD, 01, 01, 00, 00, 8B, F0, 55, 33, FF, 8D, 5E, 1C, 57, 53, E8, 96, AA, FF, FF, 89, 7E, 04, 89, 7E, 08, 89, 7E, 0C, 33, C0, 8D, 7E, 10, AB, AB, AB, B8, A8, 21, 41, 00, 83, C4, 0C, 2B, C6, 8A, 0C, 18, 88, 0B, 43, 4D, 75, F7, 8D, 8E, 1D, 01, 00, 00, BE, 00, 01, 00, 00...
 
[+]

Entropy:
7.9841  (probably packed)

Code size:
56 KB (57,344 bytes)

The file hpdjz2100serieswx64pcl.exe has been seen being distributed by the following URL.