ljp4000_fw_utility_04_260_1.exe

HP Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from h20564.www2.hp.com and multiple other hosts.
Publisher:
HP Inc.  (signed and verified)

MD5:
7ed114e5533fc9f084c47693d4bd10f2

SHA-1:
13d92698419dbf16e93e57756aba3bf2812ba13a

SHA-256:
dd7943e0a8044106bfc8ba1969efa030d0d2507a032d87044fb5b72f58b33740

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/27/2024 7:44:36 PM UTC  (today)

File size:
35.1 MB (36,846,552 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\ljp4000_fw_utility_04_260_1.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
11/3/2015 6:00:00 PM

Valid to:
11/3/2016 5:59:59 PM

Subject:
CN=HP Inc., OU=HP Cyber Security, O=HP Inc., STREET=1501 Page Mill Road, L=Palo Alto, S=CA, PostalCode=94304, C=US

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0928E615DB30DD79F0F7919792FDC7B8

File PE Metadata
Compilation timestamp:
5/11/2007 2:54:37 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
786432:CEDSf6nCNf5r6hkK7X6DfuVmZ3lmKcFyDJWxv2LohKuynD5LciLQgJQ:ACnCNfx6hkyc14WY2LohiD5LcQZQ

Entry address:
0x1290

Entry point:
55, 89, E5, 83, EC, 08, C7, 04, 24, 02, 00, 00, 00, FF, 15, 0C, 33, 41, 00, E8, A8, FE, FF, FF, 90, 8D, B4, 26, 00, 00, 00, 00, 55, 8B, 0D, 28, 33, 41, 00, 89, E5, 5D, FF, E1, 8D, 74, 26, 00, 55, 8B, 0D, 1C, 33, 41, 00, 89, E5, 5D, FF, E1, 90, 90, 90, 90, 55, 89, E5, 83, EC, 08, E8, 35, 5B, 00, 00, C7, 04, 24, AC, CA, 40, 00, B8, 10, E0, 40, 00, 89, 44, 24, 04, E8, 50, 4B, 00, 00, C9, C3, 8D, B4, 26, 00, 00, 00, 00, 8D, BC, 27, 00, 00, 00, 00, 55, 89, E5, 83, EC, 08, C7, 04, 24, AC, CA, 40, 00, E8, FE, 4C...
 
[+]

Entropy:
7.7859

Packer / compiler:
MingWin32

Code size:
31.5 KB (32,256 bytes)

The file ljp4000_fw_utility_04_260_1.exe has been seen being distributed by the following 3 URLs.