File name:

epm_free_installer.17145678618828b292.exe

Full analysis: https://app.any.run/tasks/db464b07-e00a-45cd-9d82-e06fba21e119
Verdict: Malicious activity
Analysis date: May 01, 2024, 13:01:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

D33BDE2AC7340BC96E5920A7307E363B

SHA1:

4E1C33B945A1453636287739CCD6D21BC660AD6B

SHA256:

3F18740138451CBB4116270120B4F7EEAC62F80923F5CDF6614D42977CE074E2

SSDEEP:

98304:nnCTzRnymY2wmc0OLwFRdXfSV7JHIuh6xR+vSUQiRLQFr+Uf33vOYnb8iise+Eak:eoRd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • epm_free_installer.17145678618828b292.exe (PID: 4084)
      • epm_free_support_16.5.exe (PID: 2020)
      • DrvSetup.exe (PID: 3448)
      • EnsUtils.exe (PID: 3684)
      • epm_free_support_16.5.tmp (PID: 2624)
    • Actions looks like stealing of personal data

      • epm_free_support_16.5.tmp (PID: 2624)
    • Creates a writable file in the system directory

      • epm_free_support_16.5.tmp (PID: 2624)
      • msdtc.exe (PID: 2804)
      • DrvSetup.exe (PID: 3448)
    • Starts NET.EXE for service management

      • net.exe (PID: 2396)
      • net.exe (PID: 920)
      • cmd.exe (PID: 2712)
      • net.exe (PID: 2412)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 2712)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • epm_free_installer.17145678618828b292.exe (PID: 4084)
      • epm_free_support_16.5.exe (PID: 2020)
      • epm_free_support_16.5.tmp (PID: 2624)
      • DrvSetup.exe (PID: 3448)
      • EnsUtils.exe (PID: 3684)
    • Reads the Internet Settings

      • AliyunWrapExe.Exe (PID: 748)
      • WMIC.exe (PID: 1652)
      • AliyunWrapExe.Exe (PID: 3576)
      • epm_free_support_16.5.tmp (PID: 2624)
      • AliyunWrapExe.Exe (PID: 1292)
    • Reads security settings of Internet Explorer

      • AliyunWrapExe.Exe (PID: 748)
      • AliyunWrapExe.Exe (PID: 3576)
      • AliyunWrapExe.Exe (PID: 3928)
      • epm_free_support_16.5.tmp (PID: 2624)
      • ensserver.exe (PID: 3516)
      • AliyunWrapExe.Exe (PID: 1292)
    • Uses WMIC.EXE to obtain computer system information

      • EDownloader.exe (PID: 1020)
    • Reads the Windows owner or organization settings

      • epm_free_support_16.5.tmp (PID: 2624)
    • Drops a system driver (possible attempt to evade defenses)

      • epm_free_support_16.5.tmp (PID: 2624)
      • DrvSetup.exe (PID: 3448)
    • Creates files in the driver directory

      • epm_free_support_16.5.tmp (PID: 2624)
      • DrvSetup.exe (PID: 3448)
    • Process checks presence of unattended files

      • epm_free_support_16.5.tmp (PID: 2624)
    • Drops 7-zip archiver for unpacking

      • epm_free_support_16.5.tmp (PID: 2624)
    • Executing commands from ".cmd" file

      • epm_free_support_16.5.tmp (PID: 2624)
    • Changes Internet Explorer settings (feature browser emulation)

      • epm_free_support_16.5.tmp (PID: 2624)
      • EUinApp.exe (PID: 1116)
    • Starts CMD.EXE for commands execution

      • epm_free_support_16.5.tmp (PID: 2624)
    • Process drops legitimate windows executable

      • epm_free_support_16.5.tmp (PID: 2624)
      • EnsUtils.exe (PID: 3684)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2712)
    • The process drops C-runtime libraries

      • epm_free_support_16.5.tmp (PID: 2624)
      • EnsUtils.exe (PID: 3684)
    • Executes as Windows Service

      • dllhost.exe (PID: 2740)
      • msdtc.exe (PID: 2804)
      • VSSVC.exe (PID: 3000)
      • ensserver.exe (PID: 3516)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • cscript.exe (PID: 2956)
    • The process executes VB scripts

      • cmd.exe (PID: 2712)
    • Executes WMI query (SCRIPT)

      • cscript.exe (PID: 2956)
    • Creates or modifies Windows services

      • DrvSetup.exe (PID: 3448)
      • setupepmdrv.exe (PID: 3492)
    • Checks Windows Trust Settings

      • ensserver.exe (PID: 3516)
  • INFO

    • Checks supported languages

      • epm_free_installer.17145678618828b292.exe (PID: 4084)
      • EDownloader.exe (PID: 1020)
      • InfoForSetup.exe (PID: 2108)
      • InfoForSetup.exe (PID: 1116)
      • AliyunWrapExe.Exe (PID: 748)
      • InfoForSetup.exe (PID: 1580)
      • wmpnscfg.exe (PID: 524)
      • InfoForSetup.exe (PID: 2060)
      • InfoForSetup.exe (PID: 2336)
      • epm_free_support_16.5.tmp (PID: 2624)
      • InfoForSetup.exe (PID: 2524)
      • InfoForSetup.exe (PID: 2512)
      • epm_free_support_16.5.exe (PID: 2020)
      • InfoForSetup.exe (PID: 1368)
      • InfoForSetup.exe (PID: 1132)
      • EnsUtils.exe (PID: 3684)
      • setupepmdrv.exe (PID: 3492)
      • AliyunWrapExe.Exe (PID: 3576)
      • DrvSetup.exe (PID: 3448)
      • ensserver.exe (PID: 3516)
      • AliyunWrapExe.Exe (PID: 1292)
      • SetupUE.exe (PID: 3920)
      • InfoForSetup.exe (PID: 3804)
      • AliyunWrapExe.Exe (PID: 3928)
      • InfoForSetup.exe (PID: 3972)
      • InfoForSetup.exe (PID: 1768)
      • InfoForSetup.exe (PID: 1756)
      • EUinApp.exe (PID: 1116)
    • Reads the computer name

      • epm_free_installer.17145678618828b292.exe (PID: 4084)
      • EDownloader.exe (PID: 1020)
      • AliyunWrapExe.Exe (PID: 748)
      • wmpnscfg.exe (PID: 524)
      • epm_free_support_16.5.tmp (PID: 2624)
      • DrvSetup.exe (PID: 3448)
      • setupepmdrv.exe (PID: 3492)
      • EnsUtils.exe (PID: 3684)
      • AliyunWrapExe.Exe (PID: 3576)
      • ensserver.exe (PID: 3516)
      • AliyunWrapExe.Exe (PID: 3928)
      • AliyunWrapExe.Exe (PID: 1292)
    • Create files in a temporary directory

      • epm_free_installer.17145678618828b292.exe (PID: 4084)
      • EDownloader.exe (PID: 1020)
      • InfoForSetup.exe (PID: 1116)
      • AliyunWrapExe.Exe (PID: 748)
      • epm_free_support_16.5.exe (PID: 2020)
      • epm_free_support_16.5.tmp (PID: 2624)
    • Checks proxy server information

      • AliyunWrapExe.Exe (PID: 748)
      • AliyunWrapExe.Exe (PID: 3576)
      • ensserver.exe (PID: 3516)
      • AliyunWrapExe.Exe (PID: 3928)
      • AliyunWrapExe.Exe (PID: 1292)
    • Creates files or folders in the user directory

      • AliyunWrapExe.Exe (PID: 748)
      • epm_free_support_16.5.tmp (PID: 2624)
    • Reads the machine GUID from the registry

      • AliyunWrapExe.Exe (PID: 748)
      • EnsUtils.exe (PID: 3684)
      • AliyunWrapExe.Exe (PID: 3576)
      • ensserver.exe (PID: 3516)
      • AliyunWrapExe.Exe (PID: 3928)
      • AliyunWrapExe.Exe (PID: 1292)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 524)
    • Creates files in the program directory

      • epm_free_support_16.5.tmp (PID: 2624)
      • EnsUtils.exe (PID: 3684)
      • DrvSetup.exe (PID: 3448)
      • ensserver.exe (PID: 3516)
    • Creates a software uninstall entry

      • epm_free_support_16.5.tmp (PID: 2624)
    • Checks transactions between databases Windows and Oracle

      • msdtc.exe (PID: 2804)
      • dllhost.exe (PID: 2740)
      • cscript.exe (PID: 952)
      • cscript.exe (PID: 2956)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 2956)
      • cscript.exe (PID: 952)
    • Application launched itself

      • msedge.exe (PID: 864)
    • Reads the software policy settings

      • ensserver.exe (PID: 3516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:30 03:57:48+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 186368
UninitializedDataSize: 2048
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
98
Monitored processes
53
Malicious processes
9
Suspicious processes
4

Behavior graph

Click at the process to see the details
start epm_free_installer.17145678618828b292.exe edownloader.exe infoforsetup.exe no specs infoforsetup.exe no specs aliyunwrapexe.exe infoforsetup.exe no specs wmpnscfg.exe no specs infoforsetup.exe no specs wmic.exe no specs infoforsetup.exe no specs infoforsetup.exe no specs PhotoViewer.dll no specs infoforsetup.exe no specs infoforsetup.exe no specs infoforsetup.exe no specs epm_free_support_16.5.exe epm_free_support_16.5.tmp cmd.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs reg.exe no specs cscript.exe no specs dllhost.exe no specs msdtc.exe no specs regsvr32.exe no specs vssvc.exe no specs cscript.exe no specs rundll32.exe no specs rundll32.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs drvsetup.exe setupepmdrv.exe no specs ensutils.exe aliyunwrapexe.exe ensserver.exe setupue.exe no specs infoforsetup.exe no specs aliyunwrapexe.exe infoforsetup.exe no specs msedge.exe no specs euinapp.exe no specs aliyunwrapexe.exe infoforsetup.exe no specs msedge.exe no specs infoforsetup.exe no specs epm_free_installer.17145678618828b292.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
524"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
748C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\aliyun\AliyunWrapExe.ExeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\aliyun\AliyunWrapExe.Exe
InfoForSetup.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\downloader_easeus\2.2.0\5free\aliyun\aliyunwrapexe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\temp\downloader_easeus\2.2.0\5free\aliyun\aliyunwrap.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
864"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.easeus.com/thankyou/install-partition-master-free.htmC:\Program Files\Microsoft\Edge\Application\msedge.exeepm_free_support_16.5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
920net stop swprvC:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
924C:\Windows\system32\net1 stop swprvC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
952cscript "C:\Program Files\EaseUS\EaseUS Partition Master\DC\bin\\register_app.vbs" -unregister "EPMVssEaseusProvider"C:\Windows\System32\cscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1020"C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\EDownloader.exe" EXEDIR=C:\Users\admin\AppData\Local\Temp ||| EXENAME=epm_free_installer.17145678618828b292.exe ||| DOWNLOAD_VERSION=free ||| PRODUCT_VERSION=2.2.0 ||| INSTALL_TYPE=0C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\EDownloader.exe
epm_free_installer.17145678618828b292.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\downloader_easeus\2.2.0\5free\edownloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1116 /SendInfo Window "Web_Installer" Activity "Result_Run_Installer" Attribute "{\"Country\":\"United States\",\"Pageid\":\"17145678618828b292\",\"Timezone\":\"GMT-00:00\"}"C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\aliyun\InfoForSetup.exeEDownloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\downloader_easeus\2.2.0\5free\aliyun\infoforsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1116"C:\Program Files\EaseUS\EaseUS Partition Master\bin\EUinApp.exe" Main.exeC:\Program Files\EaseUS\EaseUS Partition Master\bin\EUinApp.exeepm_free_support_16.5.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\easeus\easeus partition master\bin\euinapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1132 /SendInfo Window "Downloading" Activity "Info_Start_Download_Program" Attribute "{\"Downloadfrom\":\"https://d1.easeus.com/epm/free/epm_free_support_16.5.exe\",\"Pageid\":\"17145678618828b292\",\"Testid\":\"\",\"Version\":\"Free\",\"Versionnumber\":\"18.5\"}"C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\aliyun\InfoForSetup.exeEDownloader.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\downloader_easeus\2.2.0\5free\aliyun\infoforsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
15 450
Read events
15 180
Write events
208
Delete events
62

Modification events

(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(748) AliyunWrapExe.ExeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
1 260
Suspicious files
194
Text files
2 212
Unknown types
16

Dropped files

PID
Process
Filename
Type
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\ChineseTrad.initext
MD5:EE9F9E88AAD4014304D5557962D07B48
SHA256:0F66AA4B69A8988C63AD09977762734283519D696F100278C42D1B974C6AC69F
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\Arabic.initext
MD5:222D1DAF8C455F3EC75E43D62EB42C3C
SHA256:337E36B65069C3E00FF69299D6EDDF61F89B3441BB1E2B19B5F987E74D4E74AC
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\EDownloader.exeexecutable
MD5:53C0827201258E09E71BAC8838B90C92
SHA256:877CC70DD9B075BD34A76FD18956AC54B271BB1DAC11159FA253F6318527ECB4
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\InitConfigure.iniini
MD5:D5A1BDAA9A7D406CD36FEBC0A49DEF1F
SHA256:18DB7EF980A52A9B43CAD34AB2BB854CFE66444740ABF807C8EFF7091A2328D9
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\skin.zipcompressed
MD5:85D86B4A38D993082B1F6C5DCD4AAF39
SHA256:6047DE478C219AD42EA91D461D81886966C653DA9DB1F28107880FA991075732
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\Danish.initext
MD5:EB86F54C30CF78DCBDB6917A03C1ECD4
SHA256:624384BE61561AB4455F6AFC4FB49BFAEAC1B6DABBAE76D9BF5CAF4EF1B17401
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\French.initext
MD5:25EA7511C5F3C88EBE6F329B6BEBB69F
SHA256:92E4741A9C9ED34FD1760CFB236437ED60A724FD36485D721E64FA28FC0175AA
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\Korean.initext
MD5:DA99A47B4A3F7E3770201403E6F0233E
SHA256:55D20E3FDA64806BDE92BEAA15941103692BF7F59DBD6375FAEE14BCF77881A9
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\Dutch.initext
MD5:32E8AB5BD9243CA333C007DD5274FC6E
SHA256:9E6F6A6FE0CA269D68F3B0D9C4116AA6914291A783959CD6E8A2D5A6ED22C6DF
4084epm_free_installer.17145678618828b292.exeC:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\German.initext
MD5:BEFDB0294BB4D7ECF66BC8FA82185364
SHA256:BD3DF746CE443B93733933C73C3D3C44E0D2CE6D22AED536F83B92A304AB1EB3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
25
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1020
EDownloader.exe
POST
200
18.172.112.123:80
http://download.easeus.com/api2/index.php/Apicp/Drwdl202004/index/
unknown
748
AliyunWrapExe.Exe
GET
200
163.171.128.150:80
http://track.easeus.com/product/index.php?c=main&a=getstatus&pid=19
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.9:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
POST
200
47.252.97.9:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.9:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.9:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.9:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.11:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
748
AliyunWrapExe.Exe
POST
200
47.252.97.11:80
http://easeusinfo.us-east-1.log.aliyuncs.com/logstores/logstore_epm_downloader/shards/lb
unknown
3576
AliyunWrapExe.Exe
GET
163.171.128.150:80
http://track.easeus.com/product/index.php?c=main&a=getstatus&pid=0
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1020
EDownloader.exe
18.172.112.123:80
download.easeus.com
US
unknown
748
AliyunWrapExe.Exe
163.171.128.150:80
track.easeus.com
QUANTILNETWORKS
DE
unknown
4
System
192.168.100.255:138
unknown
748
AliyunWrapExe.Exe
47.252.97.9:80
easeusinfo.us-east-1.log.aliyuncs.com
Alibaba US Technology Co., Ltd.
US
unknown
4
System
192.168.100.255:137
unknown
1020
EDownloader.exe
18.66.112.111:443
d1.easeus.com
AMAZON-02
US
unknown
748
AliyunWrapExe.Exe
47.252.97.11:80
easeusinfo.us-east-1.log.aliyuncs.com
Alibaba US Technology Co., Ltd.
US
unknown
3576
AliyunWrapExe.Exe
163.171.128.150:80
track.easeus.com
QUANTILNETWORKS
DE
unknown
3928
AliyunWrapExe.Exe
163.171.128.150:80
track.easeus.com
QUANTILNETWORKS
DE
unknown
1292
AliyunWrapExe.Exe
163.171.128.150:80
track.easeus.com
QUANTILNETWORKS
DE
unknown

DNS requests

Domain
IP
Reputation
download.easeus.com
  • 18.172.112.123
  • 18.172.112.32
  • 18.172.112.26
  • 18.172.112.107
unknown
track.easeus.com
  • 163.171.128.150
  • 163.171.156.15
unknown
easeusinfo.us-east-1.log.aliyuncs.com
  • 47.252.97.9
  • 47.252.97.11
  • 47.252.97.14
  • 47.252.97.15
  • 47.252.97.10
  • 47.252.97.8
  • 47.252.97.13
  • 47.252.97.12
  • 47.252.97.212
unknown
d1.easeus.com
  • 18.66.112.111
  • 18.66.112.125
  • 18.66.112.6
  • 18.66.112.38
unknown
update.easeus.com
unknown

Threats

No threats detected
Process
Message
EDownloader.exe
[928]-14:01:27:087 ParseCmdLine param=EXEDIR=C:\Users\admin\AppData\Local\Temp ||| EXENAME=epm_free_installer.17145678618828b292.exe ||| DOWNLOAD_VERSION=free ||| PRODUCT_VERSION=2.2.0 ||| INSTALL_TYPE=0
EDownloader.exe
[928]-14:01:27:087 CTools::loadIni configPath=C:\Users\admin\AppData\Local\Temp\downloader_easeus\2.2.0\5free\InitConfigure.ini
EDownloader.exe
[1872]-14:01:27:946 Json parse Data Start
EDownloader.exe
[1872]-14:01:27:946 PostData Start download url=http://download.easeus.com/api2/index.php/Apicp/Drwdl202004/index/?exeNumber=17145678618828b292&lang=English&pcVersion=home&pid=5&tid=1&version=free
EDownloader.exe
[1872]-14:01:27:946 Json url: http://download.easeus.com/api2/index.php/Apicp/Drwdl202004/index/?exeNumber=17145678618828b292&lang=English&pcVersion=home&pid=5&tid=1&version=free
EDownloader.exe
[1872]-14:01:37:274 Json parse Data end(code=0)
EDownloader.exe
[1872]-14:01:37:274 PostData end
EDownloader.exe
[1872]-14:01:37:274 StartPost Error parse tuijian
EDownloader.exe
[1872]-14:01:37:274 Json response: {"check":1,"msg":"\u6210\u529f","data":{"pid":"5","download":"https:\/\/d1.easeus.com\/epm\/free\/epm18.5_free.exe","download2":"https:\/\/d2.easeus.com\/epm\/free\/epm18.5_free.exe","download3":"https:\/\/d3.easeus.com\/epm\/free\/epm18.5_free.exe","version":"free","curNum":"18.5","testid":"","url":["https:\/\/d1.easeus.com\/epm\/free\/epm_free_support_16.5.exe"],"md5":"052A86B300616D09DCB41BE5CA52A517","tj_download":"test","referNumber":"1000000","killSwitch":"true","WriteLogSwitch":"false","configid":""},"time":1714568489}
EDownloader.exe
[928]-14:01:37:290 CHttpHelper::GetDownloadInfo 56 download info code:0