s-dcdapp-020013wu-allin-all___.exe

NIKON CORPORATION

The program is a setup application that uses the Self-extracting archive installer. The file has been seen being downloaded from crossgate.nikonimglib.com and multiple other hosts.
Publisher:
NIKON CORPORATION  (signed and verified)

MD5:
a0ee3c166583ec6d3d0d9391deffecf9

SHA-1:
34a7947c0a4838248dfe73106ac55f220cffbcc7

SHA-256:
e0b8f4c6142e8c38baa9660c44a9ec0467ce857a41624083af661e434a0619f0

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
5/4/2024 10:28:26 PM UTC  (today)

File size:
3.1 MB (3,288,008 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\downloads\s-dcdapp-020013wu-allin-all___.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
3/19/2015 12:00:00 AM

Valid to:
4/1/2016 12:59:59 AM

Subject:
CN=NIKON CORPORATION, OU=Development Sector, O=NIKON CORPORATION, L=Minato-ku, S=Tokyo, C=JP

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
24D1F8B2CD957F0041C48C4E7236D5F7

File PE Metadata
Compilation timestamp:
12/1/2013 8:08:23 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:P8r/4rPg6rTd5TYi8IHpITQJ7bBaGtWV7wpKZ:U0Dg63d5vHj7bBaGOhZ

Entry address:
0x1D728

Entry point:
E8, F0, 57, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 05, FD, FF, FF, C7, 06, E4, 81, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, E4, 81, 42, 00, E9, BA, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, E4, 81, 42, 00, E8, A7, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, D1, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Entropy:
7.9825  (probably packed)

Code size:
149.5 KB (153,088 bytes)

The file s-dcdapp-020013wu-allin-all___.exe has been seen being distributed by the following 4 URLs.