224406-646555-canon-pixma-mx350-mp.exe

Canon Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from www.canon.com.tw.
Publisher:
Canon Inc.  (signed and verified)

MD5:
958260c537237ab0584aa2a051cdbe2a

SHA-1:
69ee56c1ba01aba0883939abfe0189b6116148ee

SHA-256:
f449317e13e96261f3a9467efd2067781557963a492602af8386309d37258d2f

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/26/2024 1:38:44 PM UTC  (today)

File size:
29.6 MB (31,044,936 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\224406-646555-canon-pixma-mx350-mp.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/18/2009 2:00:00 AM

Valid to:
5/19/2010 1:59:59 AM

Subject:
CN=Canon Inc., OU=Inkjet System Development Center, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Canon Inc., L=Kawasaki-shi, S=Kanagawa, C=JP

Issuer:
CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
442F9C58B61E1D9833719F449E43668A

File PE Metadata
Compilation timestamp:
11/2/2009 9:24:29 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
786432:chhDrXkIZCdZkk1ibEO6uG7YeKhSOBAXbtog7SI//70:EDr5yZ31iYxRKUOBA37D//70

Entry address:
0x1479F

Entry point:
E8, 02, 67, 00, 00, E9, 17, FE, FF, FF, 3B, 0D, D8, C9, 42, 00, 75, 02, F3, C3, E9, 82, 67, 00, 00, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63, FC, FF, E0, 5B, C9, C2, 08, 00, 58, 59, 87, 04, 24, FF, E0, 55, 8B, EC, 51, 51, 53, 56, 57, 64, 8B, 35, 00, 00, 00, 00, 89, 75, FC, C7, 45, F8, 18, 48, 41, 00, 6A, 00, FF, 75, 0C, FF, 75, F8, FF, 75, 08, E8, 54, E6, 00, 00, 8B, 45, 0C, 8B, 40, 04, 83...
 
[+]

Code size:
144 KB (147,456 bytes)

The file 224406-646555-canon-pixma-mx350-mp.exe has been seen being distributed by the following URL.