mpnexlide100win200ea23-2.exe

Canon Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from files.canon-europe.com.
Publisher:
Canon Inc.  (signed and verified)

MD5:
b6be225b8118c7f0fc715ff59dda7c29

SHA-1:
d4b925a81fed6244253914d6369427c7a0720e2d

SHA-256:
6d017cf04dab40fa82aba6d59bb591ac6c2229b301ad3e0082e5beacf7dfacd2

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/27/2024 2:35:59 AM UTC  (today)

File size:
46.4 MB (48,604,496 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\mpnexlide100win200ea23-2.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/12/2008 2:00:00 AM

Valid to:
5/13/2009 1:59:59 AM

Subject:
CN=Canon Inc., OU=Inkjet System Development Center, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Canon Inc., L=Kawasaki-shi, S=Kanagawa, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
23A236072B8752F7971ADEAC99BB8C45

File PE Metadata
Compilation timestamp:
7/23/2007 7:30:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
786432:NwocQw0W6F3jQdPug+7vSIr9Qmo7mxyjbxyw4pqA1Z6NagpZhth0YJsWxb:s4WG3jQdIvZ9N1x2yw4n0NagpZzh0YJ/

Entry address:
0x7EB8

Entry point:
E8, 19, 28, 00, 00, E9, 16, FE, FF, FF, 55, 8B, EC, 83, EC, 20, 53, 33, DB, 39, 5D, 10, 75, 20, E8, A4, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 35, 15, 00, 00, 83, C4, 14, 83, C8, FF, E9, 80, 00, 00, 00, 8B, 4D, 0C, 3B, CB, 56, 8B, 75, 08, 74, 21, 3B, F3, 75, 1D, E8, 75, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 06, 15, 00, 00, 83, C4, 14, 83, C8, FF, EB, 53, B8, FF, FF, FF, 7F, 3B, C8, 89, 45, E4, 77, 03, 89, 4D, E4, 57, FF, 75, 18, 8D, 45, E0, FF, 75, 14, C7, 45, EC...
 
[+]

Code size:
60 KB (61,440 bytes)

The file mpnexlide100win200ea23-2.exe has been seen being distributed by the following URL.