URL:

ftp.epson.com/drivers/WFM5194_Lite_NA.exe

Full analysis: https://app.any.run/tasks/a4ff181f-34b2-45d6-acf4-1125c44a1936
Verdict: Malicious activity
Analysis date: July 22, 2024, 11:50:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MD5:

847B933F81AB5163EC37CD53F7FDDFF5

SHA1:

0D90BABFFA453B5B10A1A070243D5510A6235E63

SHA256:

422DAEC5D74B56FF9FEC90964F3D9C8FB114634698F2A88379EA63B68104B049

SSDEEP:

3:Hs8aXsJUcHDCNn:M8EaD2n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WFM5194_Lite_NA.exe (PID: 6168)
      • WFM5194_Lite_NA.exe (PID: 1596)
      • WFM5194_Lite_NA.tmp (PID: 7072)
      • Setup.exe (PID: 5320)
      • msiexec.exe (PID: 7788)
      • msiexec.exe (PID: 7600)
      • SETUP64.EXE (PID: 3128)
      • setup.exe (PID: 7420)
      • Setup.tmp (PID: 7164)
      • drvinst.exe (PID: 2020)
    • Scans artifacts that could help determine the target

      • Setup.exe (PID: 5320)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 7600)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WFM5194_Lite_NA.exe (PID: 6168)
      • WFM5194_Lite_NA.exe (PID: 1596)
      • WFM5194_Lite_NA.tmp (PID: 7072)
      • SETUP64.EXE (PID: 3128)
      • Setup.exe (PID: 5320)
      • drvinst.exe (PID: 2020)
      • setup.exe (PID: 7420)
      • Setup.tmp (PID: 7164)
    • Reads security settings of Internet Explorer

      • WFM5194_Lite_NA.tmp (PID: 6992)
      • Setup.exe (PID: 5320)
      • SETUP64.EXE (PID: 3128)
      • ENP.exe (PID: 2356)
      • Setup.exe (PID: 5528)
      • Setup.exe (PID: 2472)
      • msiexec.exe (PID: 6864)
    • Reads the date of Windows installation

      • WFM5194_Lite_NA.tmp (PID: 6992)
      • Setup.exe (PID: 5320)
      • ENP.exe (PID: 2356)
      • Setup.exe (PID: 2472)
      • Setup.exe (PID: 5528)
    • Reads the Windows owner or organization settings

      • WFM5194_Lite_NA.tmp (PID: 7072)
      • msiexec.exe (PID: 7788)
      • Setup.tmp (PID: 7164)
    • Process drops legitimate windows executable

      • WFM5194_Lite_NA.tmp (PID: 7072)
      • Setup.exe (PID: 5320)
      • SETUP64.EXE (PID: 3128)
      • drvinst.exe (PID: 2020)
      • msiexec.exe (PID: 7788)
      • Setup.tmp (PID: 7164)
    • Checks Windows Trust Settings

      • Setup.exe (PID: 5320)
      • drvinst.exe (PID: 2020)
      • msiexec.exe (PID: 7788)
      • SETUP64.EXE (PID: 3128)
    • The process drops C-runtime libraries

      • Setup.exe (PID: 5320)
      • msiexec.exe (PID: 7788)
    • Creates files in the driver directory

      • drvinst.exe (PID: 2020)
    • Sets XML DOM element text (SCRIPT)

      • msiexec.exe (PID: 6864)
    • Executes as Windows Service

      • EPCP.exe (PID: 5252)
    • Starts CMD.EXE for commands execution

      • WFM5194_Lite_NA.tmp (PID: 7072)
  • INFO

    • The process uses the downloaded file

      • chrome.exe (PID: 1668)
      • chrome.exe (PID: 6344)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 1668)
    • Create files in a temporary directory

      • WFM5194_Lite_NA.exe (PID: 6168)
      • WFM5194_Lite_NA.exe (PID: 1596)
      • WFM5194_Lite_NA.tmp (PID: 7072)
      • Setup.exe (PID: 5320)
      • SETUP64.EXE (PID: 3128)
      • msiexec.exe (PID: 6864)
      • setup.exe (PID: 7420)
      • Setup.tmp (PID: 7164)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 1668)
      • msiexec.exe (PID: 7788)
      • msiexec.exe (PID: 7600)
    • Checks supported languages

      • WFM5194_Lite_NA.exe (PID: 6168)
      • WFM5194_Lite_NA.tmp (PID: 6992)
      • WFM5194_Lite_NA.exe (PID: 1596)
      • WFM5194_Lite_NA.tmp (PID: 7072)
      • Setup.exe (PID: 5320)
      • Splash.exe (PID: 3544)
      • SETUP64.EXE (PID: 3128)
      • msiexec.exe (PID: 7788)
      • ENP.exe (PID: 2356)
      • drvinst.exe (PID: 2020)
      • msiexec.exe (PID: 4428)
      • msiexec.exe (PID: 7500)
      • Setup.exe (PID: 5528)
      • msiexec.exe (PID: 7600)
      • Setup.exe (PID: 2472)
      • msiexec.exe (PID: 6864)
      • EPCP.exe (PID: 7612)
      • msiexec.exe (PID: 5940)
      • EPCP.exe (PID: 5252)
      • setup.exe (PID: 7420)
      • Setup.tmp (PID: 7164)
      • EPAUDFLG.exe (PID: 7956)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 1668)
    • Process checks computer location settings

      • WFM5194_Lite_NA.tmp (PID: 6992)
      • Setup.exe (PID: 5320)
      • Setup.exe (PID: 5528)
      • Setup.exe (PID: 2472)
      • msiexec.exe (PID: 6864)
      • ENP.exe (PID: 2356)
    • Reads the computer name

      • WFM5194_Lite_NA.tmp (PID: 6992)
      • WFM5194_Lite_NA.tmp (PID: 7072)
      • Setup.exe (PID: 5320)
      • Splash.exe (PID: 3544)
      • SETUP64.EXE (PID: 3128)
      • drvinst.exe (PID: 2020)
      • ENP.exe (PID: 2356)
      • msiexec.exe (PID: 7788)
      • Setup.exe (PID: 5528)
      • msiexec.exe (PID: 4428)
      • msiexec.exe (PID: 7500)
      • msiexec.exe (PID: 7600)
      • msiexec.exe (PID: 6864)
      • EPCP.exe (PID: 7612)
      • msiexec.exe (PID: 5940)
      • EPCP.exe (PID: 5252)
      • Setup.tmp (PID: 7164)
      • Setup.exe (PID: 2472)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 5320)
    • Checks proxy server information

      • Setup.exe (PID: 5320)
    • Reads the software policy settings

      • Setup.exe (PID: 5320)
      • SETUP64.EXE (PID: 3128)
      • drvinst.exe (PID: 2020)
      • msiexec.exe (PID: 7788)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 5320)
      • SETUP64.EXE (PID: 3128)
      • drvinst.exe (PID: 2020)
      • msiexec.exe (PID: 7788)
    • Reads product name

      • SETUP64.EXE (PID: 3128)
    • Creates files in the program directory

      • SETUP64.EXE (PID: 3128)
      • Setup.tmp (PID: 7164)
    • Application launched itself

      • chrome.exe (PID: 1668)
      • msiexec.exe (PID: 7788)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7788)
      • Setup.tmp (PID: 7164)
    • Reads Environment values

      • msiexec.exe (PID: 6864)
      • SETUP64.EXE (PID: 3128)
    • Creates or modifies Windows services

      • msiexec.exe (PID: 5940)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
205
Monitored processes
53
Malicious processes
10
Suspicious processes
2

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe no specs wfm5194_lite_na.exe wfm5194_lite_na.tmp no specs wfm5194_lite_na.exe wfm5194_lite_na.tmp setup.exe splash.exe no specs chrome.exe no specs chrome.exe no specs setup64.exe drvinst.exe enp.exe no specs msiexec.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe no specs setup.exe no specs msiexec.exe no specs msiexec.exe setup.exe no specs msiexec.exe no specs msiexec.exe epcp.exe no specs msiexec.exe no specs epcp.exe no specs setup.exe setup.tmp rundll32.exe no specs epaudflg.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs Shell Security Editor no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
884"C:\WINDOWS\system32\cmd.exe" /C rd /S /Q "C:\Users\admin\AppData\Local\Temp\WF-M5194"C:\Windows\SysWOW64\cmd.exeWFM5194_Lite_NA.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1300"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4768 --field-trial-handle=1848,i,5684948883003884783,11810056789566533461,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1504"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6084 --field-trial-handle=1848,i,5684948883003884783,11810056789566533461,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1596"C:\Users\admin\Downloads\WFM5194_Lite_NA.exe" /SPAWNWND=$402EA /NOTIFYWND=$702B0 C:\Users\admin\Downloads\WFM5194_Lite_NA.exe
WFM5194_Lite_NA.tmp
User:
admin
Company:
Epson America, Inc.
Integrity Level:
HIGH
Description:
EPSON Driver Package Setup
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\downloads\wfm5194_lite_na.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1668"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking --disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints "ftp.epson.com/drivers/WFM5194_Lite_NA.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2020DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{d25b21c5-8772-5f43-bab1-e74c5708d69e}\E_WF1MLE.INF" "9" "4cb17c8e7" "00000000000001C8" "WinSta0\Default" "00000000000001EC" "208" "C:\Users\admin\AppData\Local\Temp\EPSON WF-M5190 Series\Driver\Printer\Driver\WINX64\SETUP\WINX64"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
2252"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2224 --field-trial-handle=1848,i,5684948883003884783,11810056789566533461,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2356"C:\Users\admin\AppData\Local\Temp\EPSON WF-M5190 Series\Network\EpsonNetPrint\English\Data\ENP.exe" /sC:\Users\admin\AppData\Local\Temp\EPSON WF-M5190 Series\Network\EpsonNetPrint\English\Data\ENP.exeSetup.exe
User:
admin
Company:
SEIKO EPSON CORPORATION
Integrity Level:
HIGH
Description:
EpsonNet Print
Exit code:
0
Version:
3.1.4.1
Modules
Images
c:\users\admin\appdata\local\temp\epson wf-m5190 series\network\epsonnetprint\english\data\enp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
2472"C:\Users\admin\AppData\Local\Temp\EPSON WF-M5190 Series\Usage Panel EAI\Setup.exe" DEVICEID="WF-M5190 Series"C:\Users\admin\AppData\Local\Temp\EPSON WF-M5190 Series\Usage Panel EAI\Setup.exeSetup.exe
User:
admin
Integrity Level:
HIGH
Description:
Epson Customer Research Participation Installer Launcher
Exit code:
0
Version:
2.1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\epson wf-m5190 series\usage panel eai\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2788"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5972 --field-trial-handle=1848,i,5684948883003884783,11810056789566533461,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
49 904
Read events
49 329
Write events
536
Delete events
39

Modification events

(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1668) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1668) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
379
Suspicious files
474
Text files
868
Unknown types
70

Dropped files

PID
Process
Filename
Type
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF429a4b.TMP
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF429a4b.TMP
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
1668chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF429a3b.TMPtext
MD5:8F45965291AB2DA10EEB049FB6E917C6
SHA256:8A0DE526945B27CDBBD87357C85FDDD37B572370F894CB0A5AC533FD465D2166
1668chrome.exeC:\USERS\ADMIN\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\LAST VERSIONtext
MD5:FCE53E052E5CF7C20819320F374DEA88
SHA256:CD95DE277E746E92CC2C53D9FC92A8F6F0C3EDFB7F1AD9A4E9259F927065BC89
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
48
TCP/UDP connections
64
DNS requests
39
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1668
chrome.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
whitelisted
1668
chrome.exe
GET
200
192.229.221.95:80
http://s1.symcb.com/pca3-g5.crl
unknown
whitelisted
1668
chrome.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
whitelisted
1668
chrome.exe
GET
200
152.199.19.74:80
http://sv.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQe6LNDJdqx%2BJOp7hVgTeaGFJ%2FCQgQUljtT8Hkzl699g%2B8uK8zKt4YecmYCEB44jborBFAXuEE0iVnSStU%3D
unknown
whitelisted
3400
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
5320
Setup.exe
GET
200
184.30.20.97:80
http://download.ebz.epson.net/dsc/f/01/00/02/11/00/43abdddddaf3ca7223aa0d65324a4dfe3d4c713f/UsagePanelInfo.txt?LGW=0x409&CNW=0xF4&OSV=WIN64_10.0&EXE=Setup&VER=00000014
unknown
whitelisted
5320
Setup.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA0HeCoTP8b5pXKW4TH%2F0Xk%3D
unknown
whitelisted
5320
Setup.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
3400
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
5320
Setup.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4716
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5620
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7856
svchost.exe
4.209.32.198:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
1668
chrome.exe
239.255.255.250:1900
whitelisted
7144
chrome.exe
108.177.15.84:443
accounts.google.com
GOOGLE
US
unknown
7144
chrome.exe
45.60.47.158:443
ftp.epson.com
INCAPSULA
US
unknown
7144
chrome.exe
45.60.47.158:80
ftp.epson.com
INCAPSULA
US
unknown

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.159.75
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.23
  • 40.126.31.73
  • 20.190.159.68
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 216.58.212.174
whitelisted
ftp.epson.com
  • 45.60.47.158
whitelisted
accounts.google.com
  • 108.177.15.84
whitelisted
www.google.com
  • 216.58.206.68
whitelisted
sb-ssl.google.com
  • 142.250.186.78
whitelisted
s2.symcb.com
  • 152.199.19.74
whitelisted
s1.symcb.com
  • 192.229.221.95
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info