File name:

Mywellness device reader.exe

Full analysis: https://app.any.run/tasks/b89563a8-62b8-4403-a61c-eecdd7ccde9b
Verdict: Malicious activity
Analysis date: August 19, 2019, 20:27:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

822909BF6B376C336DC1F6977AFA4C4D

SHA1:

3199F40316B010967D656FE88E4F43DA8EA08AA6

SHA256:

FEAA2CD6F53F1707799C4B6BF53B637201226106FAEF874D428D172406C67AAA

SSDEEP:

196608:kQFrwU4RFMr7gJqIiCF7FBlJP6YtiPzLZmN8BH0dqO9q6j+uEgCGVjrFMgZSAoOS:Wkr8qrOXJj8fOkk+uzJVjrFMgI62Kar

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • CDM21206_Setup.exe (PID: 776)
      • CDM21206_Setup.exe (PID: 2560)
      • dpinst-x86.exe (PID: 3636)
      • dp-chooser.exe (PID: 2268)
      • dpinst-x86.exe (PID: 1776)
      • InstallMywellnessCert.exe (PID: 3948)
      • MywellnessDeviceReader.exe (PID: 3172)
      • USBXpressInstaller.exe (PID: 3756)
      • dp-chooser.exe (PID: 2664)
    • Changes the autorun value in the registry

      • CDM21206_Setup.exe (PID: 776)
      • CDM21206_Setup.exe (PID: 2560)
    • Writes to a start menu file

      • msiexec.exe (PID: 3452)
    • Loads dropped or rewritten executable

      • MywellnessDeviceReader.exe (PID: 3172)
    • Changes settings of System certificates

      • InstallMywellnessCert.exe (PID: 3948)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MSIEXEC.EXE (PID: 408)
      • MsiExec.exe (PID: 3240)
      • CDM21206_Setup.exe (PID: 776)
      • MsiExec.exe (PID: 2868)
      • msiexec.exe (PID: 3452)
      • cmd.exe (PID: 2924)
      • dpinst-x86.exe (PID: 3636)
      • CDM21206_Setup.exe (PID: 2560)
      • cmd.exe (PID: 2148)
      • USBXpressInstaller.exe (PID: 3756)
    • Starts Microsoft Installer

      • Mywellness device reader.exe (PID: 2788)
    • Executed as Windows Service

      • vssvc.exe (PID: 3980)
    • Executed via COM

      • DrvInst.exe (PID: 2572)
      • DrvInst.exe (PID: 2740)
      • DrvInst.exe (PID: 304)
    • Starts CMD.EXE for commands execution

      • CDM21206_Setup.exe (PID: 776)
      • CDM21206_Setup.exe (PID: 2560)
    • Creates files in the Windows directory

      • dpinst-x86.exe (PID: 3636)
      • DrvInst.exe (PID: 2740)
      • DrvInst.exe (PID: 304)
      • USBXpressInstaller.exe (PID: 3756)
    • Creates files in the program directory

      • dpinst-x86.exe (PID: 3636)
      • dpinst-x86.exe (PID: 1776)
      • USBXpressInstaller.exe (PID: 3756)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2740)
      • DrvInst.exe (PID: 304)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2740)
      • DrvInst.exe (PID: 304)
    • Creates a software uninstall entry

      • USBXpressInstaller.exe (PID: 3756)
    • Adds / modifies Windows certificates

      • InstallMywellnessCert.exe (PID: 3948)
    • Creates files in the user directory

      • MywellnessDeviceReader.exe (PID: 3172)
    • Reads Environment values

      • MywellnessDeviceReader.exe (PID: 3172)
  • INFO

    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3980)
    • Searches for installed software

      • msiexec.exe (PID: 3452)
    • Application launched itself

      • msiexec.exe (PID: 3452)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 3240)
      • MsiExec.exe (PID: 2868)
    • Creates files in the program directory

      • MsiExec.exe (PID: 2868)
      • msiexec.exe (PID: 3452)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3452)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:02:28 23:03:46+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 258048
InitializedDataSize: 102400
UninitializedDataSize: -
EntryPoint: 0x339c7
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 12.0.0.58851
ProductVersionNumber: 12.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Technogym SpA
FileDescription: Mywellness device reader
FileVersion: 1.4.5
InternalName: Setup
LegalCopyright: Copyright © 2018 Technogym S.p.A. All rights reserved.
OriginalFileName: Setup.exe
ProductName: Mywellness device reader
ProductVersion: 1.4.5
OLESelfRegister: -

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 28-Feb-2007 22:03:46
Detected languages:
  • English - United States
CompanyName: Technogym SpA
FileDescription: Mywellness device reader
FileVersion: 1.4.5
InternalName: Setup
LegalCopyright: Copyright © 2018 Technogym S.p.A. All rights reserved.
OriginalFilename: Setup.exe
ProductName: Mywellness device reader
ProductVersion: 1.4.5
OLESelfRegister: -

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000F8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 28-Feb-2007 22:03:46
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0003EDA2
0x0003F000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.53857
.rdata
0x00040000
0x000078C2
0x00008000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.62646
.data
0x00048000
0x0000A404
0x00006000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.41742
.rsrc
0x00053000
0x0000A678
0x0000B000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.53637

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.02144
899
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
6.39652
1384
Latin 1 / Western European
English - United States
RT_ICON
3
3.9625
744
Latin 1 / Western European
English - United States
RT_ICON
4
6.7616
2216
Latin 1 / Western European
English - United States
RT_ICON
5
2.48972
308
Latin 1 / Western European
English - United States
RT_CURSOR
69
2.56821
124
Latin 1 / Western European
English - United States
RT_STRING
72
2.32551
110
Latin 1 / Western European
English - United States
RT_STRING
73
2.76648
204
Latin 1 / Western European
English - United States
RT_STRING
100
2.64576
62
Latin 1 / Western European
English - United States
RT_GROUP_ICON
104
2.01924
20
Latin 1 / Western European
English - United States
RT_GROUP_CURSOR

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
RPCRT4.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
21
Malicious processes
7
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start mywellness device reader.exe msiexec.exe msiexec.exe msiexec.exe vssvc.exe no specs drvinst.exe no specs msiexec.exe cdm21206_setup.exe cmd.exe dp-chooser.exe no specs dpinst-x86.exe drvinst.exe no specs cdm21206_setup.exe cmd.exe dp-chooser.exe no specs dpinst-x86.exe no specs usbxpressinstaller.exe drvinst.exe no specs installmywellnesscert.exe no specs mywellnessdevicereader.exe mywellness device reader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{0e28e148-1c8d-52c2-f859-56484a6c2106}\SiUSBXp.inf" "0" "6e5697ad3" "000003E8" "WinSta0\Default" "000005A0" "208" "C:\Program Files\Mywellness\Mywellness device reader\USBXpress"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
408MSIEXEC.EXE /i "C:\Users\admin\AppData\Local\Temp\{68B43B3E-DC50-4683-AEC2-52BC1DAD683A}\Mywellness device reader.msi" SETUPEXEDIR="C:\Users\admin\Desktop"C:\Windows\system32\MSIEXEC.EXE
Mywellness device reader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
776C:\Users\admin\AppData\Local\Temp\{1D7B968F-E113-4AEB-BDA9-8D2EB7D7322D}\CDM21206_Setup.exe C:\Users\admin\AppData\Local\Temp\{1D7B968F-E113-4AEB-BDA9-8D2EB7D7322D}\CDM21206_Setup.exe
MsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.9600.16384 (winblue_rtm.130821-1623)
Modules
Images
c:\users\admin\appdata\local\temp\{1d7b968f-e113-4aeb-bda9-8d2eb7d7322d}\cdm21206_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1776C:\Users\admin\AppData\Local\Temp\IXP000.TMP\dpinst-x86.exe /saC:\Users\admin\AppData\Local\Temp\IXP000.TMP\dpinst-x86.exedp-chooser.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Driver Package Installer
Exit code:
2147549440
Version:
2.1
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\dpinst-x86.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2148cmd /c C:\Users\admin\AppData\Local\Temp\IXP000.TMP\install.cmdC:\Windows\system32\cmd.exe
CDM21206_Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2268dp-chooser.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\dp-chooser.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\dp-chooser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2560C:\Users\admin\AppData\Local\Temp\{1D7B968F-E113-4AEB-BDA9-8D2EB7D7322D}\CDM21206_Setup.exe C:\Users\admin\AppData\Local\Temp\{1D7B968F-E113-4AEB-BDA9-8D2EB7D7322D}\CDM21206_Setup.exe
MsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.9600.16384 (winblue_rtm.130821-1623)
Modules
Images
c:\users\admin\appdata\local\temp\{1d7b968f-e113-4aeb-bda9-8d2eb7d7322d}\cdm21206_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2572DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot22" "" "" "695c3f483" "00000000" "000004B8" "000005B8"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2664dp-chooser.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\dp-chooser.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\dp-chooser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2740DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{586ec3c8-ea1b-48e1-c8c3-6e581beae148}\ftdiport.inf" "0" "6f15e8b4f" "000005B8" "WinSta0\Default" "000004B8" "208" "c:\users\admin\appdata\local\temp\ixp000.tmp"C:\Windows\system32\DrvInst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
1 157
Read events
681
Write events
461
Delete events
15

Modification events

(PID) Process:(3452) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000CD5601AECC56D5017C0D0000B80E0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3452) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4000000000000000CD5601AECC56D5017C0D0000B80E0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3452) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
24
(PID) Process:(3452) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000000DA24DAECC56D5017C0D0000B80E0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3452) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000000DA24DAECC56D5017C0D0000B00D0000E8030000010000000000000000000000EFEF7EADA84DC8489CEAB150AD9B51980000000000000000
(PID) Process:(3980) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000083525EAECC56D5018C0F000004070000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3980) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000083525EAECC56D5018C0F0000080E0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3980) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000083525EAECC56D5018C0F0000280E0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3980) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000083525EAECC56D5018C0F00004C0E0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3980) vssvc.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
4000000000000000371763AECC56D5018C0F0000080E0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
Executable files
156
Suspicious files
30
Text files
227
Unknown types
548

Dropped files

PID
Process
Filename
Type
2788Mywellness device reader.exeC:\Users\admin\AppData\Local\Temp\~ECC6.tmp
MD5:
SHA256:
2788Mywellness device reader.exeC:\Users\admin\AppData\Local\Temp\{68B43B3E-DC50-4683-AEC2-52BC1DAD683A}\Mywellness device reader.msi
MD5:
SHA256:
408MSIEXEC.EXEC:\Users\admin\AppData\Local\Temp\MSIFE4B.tmp
MD5:
SHA256:
3452msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
3452msiexec.exeC:\Windows\Installer\17595b.msi
MD5:
SHA256:
3452msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{ad7eefef-4da8-48c8-9cea-b150ad9b5198}_OnDiskSnapshotPropbinary
MD5:
SHA256:
3240MsiExec.exeC:\Users\admin\AppData\Local\Temp\{1D7B968F-E113-4AEB-BDA9-8D2EB7D7322D}\CDM21206_Setup.exeexecutable
MD5:
SHA256:
2788Mywellness device reader.exeC:\Users\admin\AppData\Local\Temp\{68B43B3E-DC50-4683-AEC2-52BC1DAD683A}\WIC x64 Windows Imaging Component (Web Installation).prqxml
MD5:
SHA256:
2788Mywellness device reader.exeC:\Users\admin\AppData\Local\Temp\{68B43B3E-DC50-4683-AEC2-52BC1DAD683A}\_ISMSIDEL.INItext
MD5:
SHA256:
2788Mywellness device reader.exeC:\Users\admin\AppData\Local\Temp\{68B43B3E-DC50-4683-AEC2-52BC1DAD683A}\WIC x86 Windows Imaging Component (Web Installation).prqxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
2
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3172
MywellnessDeviceReader.exe
POST
403
18.200.155.123:80
http://services.mywellness.com/Biometrics/Application/69295ed5-a53c-434b-8518-f2e0b5f05b28/BiometricMeasurementDevices
US
html
134 b
unknown
3172
MywellnessDeviceReader.exe
POST
403
18.200.155.123:80
http://services.mywellness.com///Application/69295ed5-a53c-434b-8518-f2e0b5f05b28/CheckLatestVersionAppContent
US
html
134 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3172
MywellnessDeviceReader.exe
18.200.155.123:80
services.mywellness.com
US
unknown

DNS requests

Domain
IP
Reputation
services.mywellness.com
  • 18.200.155.123
unknown

Threats

No threats detected
No debug info