mp280sosmwin100fr.exe

Canon Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from pdisp01.c-wss.com.
Publisher:
Canon Inc.  (signed and verified)

MD5:
98559876ad75361b20248646b46cfc5b

SHA-1:
721bc4bee15db7279b4140794d7b4e506c337a1e

SHA-256:
148ba924aaee2b8f710764493e5c17ba6b88bb8361133c32cddfe16bf93c5b14

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/23/2024 7:49:28 PM UTC  (today)

File size:
12.2 MB (12,776,856 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\mp280sosmwin100fr.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/9/2010 8:00:00 PM

Valid to:
5/10/2011 7:59:59 PM

Subject:
CN=Canon Inc., OU=Inkjet System Development Center, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Canon Inc., L=Kawasaki-shi, S=Kanagawa, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
15C98A3198BD4CBAEEC5A7E74A14A8F6

File PE Metadata
Compilation timestamp:
11/2/2009 3:24:29 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
196608:LN9AD/lrEosyv5gUCBISSFJgEVTKkLpPP/NfSOSxO5uYab/AjXc7usYtzQ9pHEhr:RGBrEobbFeobV/NfSOSo4AjIKCpkhr

Entry address:
0x1479F

Entry point:
E8, 02, 67, 00, 00, E9, 17, FE, FF, FF, 3B, 0D, D8, C9, 42, 00, 75, 02, F3, C3, E9, 82, 67, 00, 00, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 18, 48, 41, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 54, E6, 00, 00, 8B, 45, 0C, 8B, 40, 04, 83...
 
[+]

Code size:
144 KB (147,456 bytes)

The file mp280sosmwin100fr.exe has been seen being distributed by the following URL.