hpdjz5400serieswumgl.exe

Hewlett-Packard Company

This is a setup program which is used to install the application. The file has been seen being downloaded from h20564.www2.hp.com.
Publisher:
Hewlett-Packard Company  (signed and verified)

MD5:
a34e85b7aae4c6ce6bb7d80195f1e2a5

SHA-1:
6ea68fd874a6186e17b34fc5d7519f53144e8c0c

SHA-256:
de0210746bdfbb530f800d5eb83db7983dfa2272874fc7b3573afa744c81002b

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/18/2024 3:01:02 PM UTC  (today)

File size:
3.6 MB (3,782,968 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\hpdjz5400serieswumgl.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/15/2012 5:30:00 AM

Valid to:
11/16/2015 5:29:59 AM

Subject:
CN=Hewlett-Packard Company, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Hewlett-Packard Company, L=Andover, S=Massachusetts, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
10563E7139A32E56345828AE2BC91EA5

File PE Metadata
Compilation timestamp:
9/9/2008 1:38:26 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
98304:waC54YbuJAdgjl3zpiRfamxUDZxVUZj9W664ua:mfcltkam+aB9Ws

Entry address:
0x66D0

Entry point:
E8, 21, 27, 00, 00, E9, 16, FE, FF, FF, 2D, A4, 03, 00, 00, 74, 22, 83, E8, 04, 74, 17, 83, E8, 0D, 74, 0C, 48, 74, 03, 33, C0, C3, B8, 04, 04, 00, 00, C3, B8, 12, 04, 00, 00, C3, B8, 04, 08, 00, 00, C3, B8, 11, 04, 00, 00, C3, 53, 55, 56, 57, BD, 01, 01, 00, 00, 8B, F0, 55, 33, FF, 8D, 5E, 1C, 57, 53, E8, 96, AA, FF, FF, 89, 7E, 04, 89, 7E, 08, 89, 7E, 0C, 33, C0, 8D, 7E, 10, AB, AB, AB, B8, A8, 21, 41, 00, 83, C4, 0C, 2B, C6, 8A, 0C, 18, 88, 0B, 43, 4D, 75, F7, 8D, 8E, 1D, 01, 00, 00, BE, 00, 01, 00, 00...
 
[+]

Entropy:
7.9803  (probably packed)

Code size:
56 KB (57,344 bytes)

The file hpdjz5400serieswumgl.exe has been seen being distributed by the following URL.