Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2023, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
C/ProgramData/Sentinel/AFUCache/d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
C/ProgramData/Sentinel/AFUCache/d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe
Resource
win10v2004-20220812-en
General
-
Target
C/ProgramData/Sentinel/AFUCache/d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe
-
Size
9.3MB
-
MD5
59501f98b000a7bb713950310fabf73b
-
SHA1
0872ab73aa1edde06224a59b9e5f8e8db6418833
-
SHA256
d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff
-
SHA512
0ba73c470e3e6a859ca92444c9e4ff1dedfb39347385f8e28ca6a94fca304daa4dd1c49049af7748fea07e6fca755ac6fb75bfb408588e26e97c897a34f98b02
-
SSDEEP
196608:3yWDJp+GJ4FRT3qboM/PzujcKGJDKulb/hz8JQ8QnFDRfHVB7c:3yI2GJ4S/CjcXeyfnfVB7c
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\TMUSB64.sys Setup.exe File opened for modification C:\Windows\system32\drivers\TMUSB64.sys Setup.exe -
Registers new Print Monitor 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Local Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Microsoft Shared Fax Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\USB Monitor spoolsv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\EPSON TM-T Receipt6 LM\Driver = "EA6LMTMT.DLL" spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint spoolsv.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\EPSON TM Port Monitor\Driver = "EA6PM.dll" spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Appmon\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\IPP spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\WSD Port\Adapters\WSPrint\OfflinePorts spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\EPSON TM Port Monitor spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\EPSON TM Port Monitor\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\Standard TCP/IP Port\Ports spoolsv.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Print\Monitors\EPSON TM-T Receipt6 LM spoolsv.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TMUSB\ImagePath = "System32\\DRIVERS\\TMUSB64.SYS" Setup.exe -
Executes dropped EXE 7 IoCs
pid Process 2112 Setup.exe 3920 APDLog.exe 4044 Setup.exe 4784 Setup.exe 1924 dpinst.exe 2008 DPInst.exe 2708 PrinterReg.exe -
Loads dropped DLL 5 IoCs
pid Process 4500 d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe 856 spoolsv.exe 2112 Setup.exe 856 spoolsv.exe 856 spoolsv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\TMUSB64.SYS DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tmusb64.inf_amd64_a558b956187b0ac0\TMUSB64.SYS DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\STDNAMES.GPD spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_c62e9f8067f98247\Amd64\STDDTYPE.GDL spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\EA6MDLTMT203.GPD spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\TMUSB64.CAT DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\amd64\EA6RDPTM.DLL DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42C6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\EA6Bcd0.dll DrvInst.exe File opened for modification C:\Windows\system32\SET482C.tmp spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\EA6RDPTM.DLL DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\EA6RESTM.DLL DrvInst.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\EA6UIPTMT.dll spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\EA6LMTM.DLL DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET42FA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET42FA.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\amd64\EA6BcdR0.dll DrvInst.exe File created C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4826.tmp spoolsv.exe File created C:\Windows\system32\EA6PM.dll Setup.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\SET3B26.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42D6.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42D7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\SET3B24.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tmusb64.inf_amd64_a558b956187b0ac0\TMUSB64.CAT DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64 DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET482A.tmp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\STDSCHEM.GDL spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4815.tmp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\UNIDRVUI.DLL spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_c62e9f8067f98247\Amd64\STDSCHMX.GDL spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\EA6MDLTMT180.GPD DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_c62e9f8067f98247\Amd64\UNIRES.DLL spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\TTFSUB.GPD spoolsv.exe File created C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\SET3B25.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\amd64\EA6Bcd0.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42D7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET42FB.tmp DrvInst.exe File created C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4827.tmp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET482B.tmp spoolsv.exe File created C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\SET3B26.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET431D.tmp DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4826.tmp spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d1e71fc7-ab6c-b24c-b377-9eb4ea1be30f}\tmusb64.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42E9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET431F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\amd64\EA6UIPTM.dll DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\EA6RESTMT.DLL spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\UNIRES.DLL spoolsv.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET42F9.tmp DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\EA6PIITMT.INI spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET42F9.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\SET430C.tmp DrvInst.exe File created \??\c:\windows\system32\driverstore\filerepository\ea6instmt.inf_amd64_6b4e491944c6fe28\ea6instmt.PNF spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4815.tmp spoolsv.exe File created C:\Windows\SysWOW64\EAPApiData.dll Setup.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\EA6MDLTMT180_1.GPD DrvInst.exe File created C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\SET4828.tmp spoolsv.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\EA6MDLTMT203.GPD spoolsv.exe File created C:\Windows\system32\spool\DRIVERS\x64\3\New\EA6BcdR0.dll spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{190cbedc-5984-2841-b7da-ba5bc3156ab9}\amd64\SET42E9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\ea6instmt.inf_amd64_6b4e491944c6fe28\amd64\EA6LMTM.DLL DrvInst.exe File opened for modification C:\Windows\system32\spool\DRIVERS\x64\{B126F755-4E0F-447D-B5A1-8A3D5999FC0E}\UNIDRV.DLL spoolsv.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\tmusb64.inf_amd64_a558b956187b0ac0\tmusb64.inf DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Driver\TM-T\amd64\EA6RDPTM.DLL Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Setup\Resource\English\LA_EN.TXT Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB710\TMUSBXP\tmusbxp.sys Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\de\UserDefinedPaperPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\th\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\BmpToRaster.dll Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\EAPLogSetup.exe Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\da\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\no\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSBXP\TMUSBXP.sys Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\cs\LogoSettingPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\fr\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\th\BarcodePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\vi\EJPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\zh-cn\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\readme_j.txt Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\ko\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\StatusAPI\win32\EAPApiData.dll Setup.exe File created C:\Program Files (x86)\EPSON\Advanced Printer Tool\SystemFiles\StatusAPI\EAPApiData64.dll Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Driver\TM-T\amd64\EA6UIPTM.DLL Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\Lang\0804.DAT Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\da\EJPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\da\LayoutPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\sl\LogoSettingPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\tr\EJPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Setup\Resource\English\Resource.ini Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB710\TMUSB64\TMUSB64.INF Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\en\LogoSettingPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\fr\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\nl\BarcodePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\tr\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\zh-tw\LogoSettingPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Setup\TM-T82X.ini Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB710\TMUSBXP\licenseE.txt Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\sl\UserDefinedPaperPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\vi\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSBXP\dpinst.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\de\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\nl\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\vi\UserDefinedPaperPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSB64\licenseE.txt Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\Lang\0409.DAT Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\da\BarcodePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\hr\BarcodePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\nl\LogoSettingPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\zh-tw\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Driver\TM-T\EA6PIITMT.INI Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB710\TMUSB64\licenseJ.txt Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\Lang\040C.DAT Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\sv\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\th\EJPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\ru\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\tr\LayoutPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\zh-hk\FontReplacePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\EAPBcd0.dll Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\da\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\es\SendCommandPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\fr\EJPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\vi\2DSymbolPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\zh-tw\BarcodePlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\PrinterReg\NetworkSettingTool\Resources\JA\String.ini Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSBXP\tmusbxp.cat Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\hr\UserDefinedPaperPlugin.xml Setup.exe File created C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Utility\locale\no\UserDefinedPaperPlugin.xml Setup.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log dpinst.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\DPINST.LOG DPInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DPInst.exe File opened for modification C:\Windows\DPINST.LOG dpinst.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log rundll32.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs dpinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DPInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DPInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DPInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0002 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DPInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DPInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID spoolsv.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dpinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spoolsv.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft XPS Document Writer = "winspool,Ne00:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\PrinterPorts spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft XPS Document Writer = "winspool,Ne00:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Microsoft Print to PDF = "winspool,Ne01:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows NT\CurrentVersion\Devices spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\PrinterPorts\Microsoft Print to PDF = "winspool,Ne01:,15,45" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Devices\Fax = "winspool,Ne02:" spoolsv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2112 Setup.exe 2112 Setup.exe 2112 Setup.exe 2112 Setup.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeAuditPrivilege 5080 svchost.exe Token: SeSecurityPrivilege 5080 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 Setup.exe 2112 Setup.exe 2112 Setup.exe 2112 Setup.exe 2708 PrinterReg.exe 2708 PrinterReg.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2112 4500 d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe 80 PID 4500 wrote to memory of 2112 4500 d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe 80 PID 4500 wrote to memory of 2112 4500 d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe 80 PID 2112 wrote to memory of 4924 2112 Setup.exe 81 PID 2112 wrote to memory of 4924 2112 Setup.exe 81 PID 2112 wrote to memory of 4924 2112 Setup.exe 81 PID 2112 wrote to memory of 4044 2112 Setup.exe 95 PID 2112 wrote to memory of 4044 2112 Setup.exe 95 PID 2112 wrote to memory of 4044 2112 Setup.exe 95 PID 4044 wrote to memory of 4784 4044 Setup.exe 96 PID 4044 wrote to memory of 4784 4044 Setup.exe 96 PID 4044 wrote to memory of 4784 4044 Setup.exe 96 PID 4784 wrote to memory of 1924 4784 Setup.exe 97 PID 4784 wrote to memory of 1924 4784 Setup.exe 97 PID 5080 wrote to memory of 4504 5080 svchost.exe 99 PID 5080 wrote to memory of 4504 5080 svchost.exe 99 PID 2112 wrote to memory of 912 2112 Setup.exe 100 PID 2112 wrote to memory of 912 2112 Setup.exe 100 PID 2112 wrote to memory of 912 2112 Setup.exe 100 PID 5080 wrote to memory of 2144 5080 svchost.exe 101 PID 5080 wrote to memory of 2144 5080 svchost.exe 101 PID 2112 wrote to memory of 2008 2112 Setup.exe 102 PID 2112 wrote to memory of 2008 2112 Setup.exe 102 PID 2112 wrote to memory of 2708 2112 Setup.exe 103 PID 2112 wrote to memory of 2708 2112 Setup.exe 103 PID 2112 wrote to memory of 2708 2112 Setup.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\C\ProgramData\Sentinel\AFUCache\d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe"C:\Users\Admin\AppData\Local\Temp\C\ProgramData\Sentinel\AFUCache\d0665e370b2871a328ec8bcf86ade816e696d411430ff6586cf8e3dad1be20ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\APD6\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\APD6\Setup\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\extrac32.exeC:\Windows\system32\extrac32.exe /L "C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\" /E "C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\TPDBase.cab"3⤵PID:4924
-
-
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\Setup.exe"C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\Setup.exe" -s23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\Setup.exe"C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\Setup.exe" -s24⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSB64\dpinst.exeTMUSB64\dpinst.exe /s /se /sw /sa /el5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1924
-
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 printui.dll,PrintUIEntry /ia /f "C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Driver\TM-T\EA6INSTMT.INF" /m "EPSON TM-T(203dpi) Receipt6"3⤵
- Drops file in Windows directory
PID:912
-
-
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSB64\DPInst.exe"C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\TMUSB\TMUSB800\TMUSB64\DPInst.exe" /PATH "C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\Driver\TM-T" /se /sw /sa /el3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2008
-
-
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\PrinterReg\PrinterReg.exe"C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\PrinterReg\PrinterReg.exe" /install /dev=TM-T82X3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708
-
-
-
C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\PrinterReg\APDLog.exe"C:\Program Files (x86)\EPSON\EPSON Advanced Printer Driver 6\DriverPack\PrinterReg\APDLog.exe"1⤵
- Executes dropped EXE
PID:3920
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
- Registers new Print Monitor
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "8" "C:\Users\Admin\AppData\Local\Temp\{365e1aa8-27f2-bf41-989f-d17bc886dfed}\tmusb64.inf" "9" "40bb771fb" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\epson\epson advanced printer driver 6\driverpack\tmusb\tmusb800\tmusb64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4504
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{153085e3-6d93-674e-9965-a50d7774d61a}\ea6instmt.inf" "9" "4713f3a5f" "0000000000000158" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\epson\epson advanced printer driver 6\driverpack\driver\tm-t"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD52ae19a6615bc5139b3b13e4b2f24865d
SHA1a4840e483e8168a17f1ae939ef7be01576e705f7
SHA25696ac2f5a22f6ba2b24339941d4377355b5d7095e72fd7443e9c37599f3d9fb88
SHA5129ebcf21517dc0ac9b14b05484874fba0de71e0cd8b65290148bb5e42734861ca60e5ba26c98d9692390ce25bb59259aaa6c848a2e8bc945a4696c6e820ce202d
-
Filesize
14KB
MD59718c4a09b12da9fd154709e90c84740
SHA1b08d75ee892e182371305962db589a27aa38a6ed
SHA256d52af6d790f7b60eb9138ade47f7df85f37942d67f09ff8e838b1d3d202de93c
SHA512be78fb1a4922f036e6b8fe089f3f814164f360230370affc05b86418c3493052f14472040de878f8c957741d2b5a1d8828026f7cb84cdd1549bca7de193ee7ae
-
Filesize
14KB
MD5534139102dc8f37eb879182630c64c91
SHA1aecefd85a10bf72ec540ebbe3270109054982e1b
SHA256c8c358e40c5fb7866c69f0aabe41dc0671e6aab10dc21bc2268e18d77f6618a8
SHA512a449634b311f2c9dc8d686639938f4443c5dc13d3856605f738c66ad60508c43eacc9ed87418db11d185ca459264a5c517a980990c674d6f7facf8be8dea753b
-
Filesize
14KB
MD5dc9108ed36b49207869b3a0ddb4b2206
SHA1089f8adb592f25984450fe544b714efcc737dc21
SHA256d945f2a9fd89984e5fc25a48df9bfd2c3c21fdc3c09533712c139ed8ae1965ef
SHA512fec7d59bb08b7c3395ec6e28bd3875cba304a95333fe4e238e45a9b79bdb755a0c73776c2208dba789b8ed1e874e8a40b9d73e1d960f2c853b342d6f8dcc0de4
-
Filesize
210B
MD58292f0bb2798935283b8d2b8383379be
SHA1198272dd403ad4cad39b6a1e61622232753b190f
SHA256ac58233dcae8531c3d7071c4e01dabf1e0130495df05488485a252a04773c077
SHA512914017b196fb3bc59c7e2af07fabfebaeb17ba4cb585e54dee667fb1b5584da5db79dce56b7e5c52949e3229d9ff992d2240602c5c86a6f3179007d9f9c615c9
-
Filesize
620KB
MD526cc4d7f80616347f4e8843ac38d3c61
SHA1f31eb78d529d9a58e1fc84e9a2fd626f9b29bbc4
SHA256ad74a6d1d7adc3fbf7b3fc6909d93b5402df47bd225b79b1af226c0f6b9eeed1
SHA51262800223a1310b4cf11eb7e795a5ce8c876df009ba93716137df720cdaa7c3c2f81dd522ab01686e584d4f8c936fb76fa944b5589f202eee690b53376e8496c8
-
Filesize
270KB
MD54269b08f7a99bff6dbb6a547d04ca495
SHA16633c932fe5883e2f87d5afdaa9664324bfb93c3
SHA256475b7dfe59285e22a5cc9929fa18bb05357b25d6e95012e732cf32f9bc8af79e
SHA51209bc943f7c32202a44ed7fe54b6f4ff25bdca112710277d260d5495c324aedbcafabeb8c8a2dff414f451e95a1466a65c3dc236049bd0bc665cca6dfca15357a
-
Filesize
18KB
MD5588fc77dfbf5adabd56b90c653ac39a0
SHA127f0143fb57bc407ff438a808da1ced71161649c
SHA256e5aaea8c5c61752078145aeb474d6a9bbb0d0975c78e181e911d7dc8242a3f18
SHA5127fdf27e11919afaf2b26fb17813ed43f060e9f1f8b431a1922f65665defdaf842fe9561e8848c9f09cdca595afad504e8b0a69f1367303ea6e77cc352bf7c453
-
Filesize
305KB
MD522df1ba2a6a41a0bbf70515f45157f4b
SHA14ddcebda297dcd9748a74e2f0520132a7d5b6706
SHA2563dde7201c6eb91ad297ad750a3fae7a4f756fd4ee7751e396fb8afab818d7acb
SHA51221f7d31a9a1c828cc1ea4a629c815331b48c8a52c9ee14c89f9befd49e6230e1d6942eaf11f2d277693d49fd8df9197eacf063cfe172af0983329953c16e5c81
-
Filesize
1.4MB
MD5329e3321ab586ce3b8595bc7ad8acf7d
SHA151f6323e8f80e7bf9b458c6c327d0cd9144495c4
SHA25613d1855b0e5e337af94e052ad1857de7f8217f7dc9bf40acf64d48cb808bd6bd
SHA512a695fd540eb67a4a1b82c9c92391545a9149daa2484477e9345c5d80c04a8ca9452e798883fc764f1394ebec22b8e74c7a9faa6a3e74ed87b18c635f7a543bab
-
Filesize
1.2MB
MD571e56b73e4f690beea2eec1cce0434cf
SHA11796b7ae75d00d6e7b29ed12c8e35c530db1b39f
SHA25615636cfbe5ed07a3b7f0d75253152d44b073dab88aea17704d9334ff41211edf
SHA5128c2de1470f3a00377dca242111cd7c31828ff1ca7330af4936e6126be0a9b5c5d5a9010389724d699a5d4d70b23f8670451eb3bc2b3fe9604e93ea6254452772
-
Filesize
27KB
MD5bbc14751fd719557c776fc87c0deb000
SHA1111fbe6b40e1dd62373bbe705a8c4e6558c4f6b4
SHA256e0dacb3a803fb8dffa84ab383420ba1595d2435bd3461b27ade82680719277a0
SHA512073b66fb699e6b03484bbd0476c3e8dffb81b0ddf3deca014ac2609a0d87ff91b15c26997c549931444f1fb7ca26bc18b7dd7e5fb99f1953bd13b5cc8dcc30fe
-
Filesize
216KB
MD5af687cf6544e1ed74a0ce08b2e8b3462
SHA12294657f73e141ecd9704f29d90f4a29da73a2a0
SHA25696291cab534d975025e190df36af7edcfe0976a37933233fbd4c211df4d30297
SHA5125cd7026edb54d51b1d8db719257b6f0a030cfcaf4a867a717576dc8e021b0aead1ae22598aea958710f4001969429f39ae40a1e0f168303b11ede9e835609917
-
Filesize
17KB
MD52d6af5cc9ace76ba231f5c993db3e246
SHA16e3287a8bcd69e74bd5a59bc4044f3113d439986
SHA256cd10ca01a8eaf12848d71a6b70b0bac818c87331a12fbf041b0da78966d7ba3f
SHA512d72fcae341fef4b38f4ae2040507025c29cdc2e8ecd215a9e71e9f8658d07e9390f70e818079cbd7ea5ec2b6f233d5c0c880070ce41ae638a21a66e47cf0a0e3
-
Filesize
249KB
MD58f06e52d31b8989044df2aa4035073a8
SHA19c5af8991de560af6fa1b72a6aa3acc829fa8b2a
SHA256ea8c9b2857b36beb9b96e46add3a55a07d5705eb888b1bb56b3ba4d489563bac
SHA512b862560da992f75a1fcc7cc4952c45967365ffc8b34dbf217131120191d91c6a3befd40ac08624e3c4f682679ace81a0be016e0d50757179bac820732dd406df
-
Filesize
1.3MB
MD5fd3c1cbaf0aa9d45d64a3f03ae98615c
SHA1fcc7f169e6821e8f398bf185fd9969ee822c2125
SHA2560958e08b63a64c7ab6bf6c70db735743eeb1f640625f187124a1dde5500f89b3
SHA512267172e6f226e9ec1e1b19d334c88d45e78de2f330ed4b230aa4fb81d0b50addf8ca8c244138b426f42c8dd0a22d63d0fa04cc3f23ee8b2d269a1f61a39e6702
-
Filesize
1.1MB
MD5e8cb638207b9ac43442b01b994207678
SHA1ad6fcb14ae4870b69d8883822a6c9e9196df9b94
SHA25634a9faa9f3ad5976fa818507668b4377c81386205c0adaca67af4f3aeaee2bb0
SHA5126a4c3201f5ffc94c8a70886e30f30175faca8b4ccd7460b3f5e24c955af92c3ca5b22ab41a4848f15b1dea424113745d96b6b79b4c77801309c0cee48ef28e51
-
Filesize
509KB
MD5b09ea6cd201d525854a497145619736c
SHA15b294aef1f6f8bfe2c7e93dedb673fad70f78870
SHA256a32f60af4e21c8d6f4fe942cab09cc72d9fa87070b46bf16d848c7f474403842
SHA512c45f404a19b3a8ba8e533124309f896ac1d233480dc4613e0ca01bfc4436bcb5615d280baab2566e084e35295b052b66899e5acb3c07cd797248df271babdebf
-
Filesize
671KB
MD5f47b352fd7141c132e3e4d7ee83b8cf5
SHA1c25e50056927d6b4f8e5512315bc497c071a93d0
SHA256bea471a636a2ca493dec23fbf8d04ffc5e655c94b1c07b5db107c412cc831f62
SHA512737c45727953309fb634b3846b395e1ced75538f09787821fe1eba7fd212d93b6a060afd33acc5e2e2e455ea10b5296d86bdfea9ed306e8dc62b675a8f252473
-
Filesize
283KB
MD5b11f3265a4f6b0f347f6e4d91692b8ed
SHA1f5e12bbb55c739bdbb4d752038a7ba1e0f3a33ef
SHA2560b40910e3a21f7bb3cdaf312cad1b2e81a2c041a017a0034f8200b4f6e1fded8
SHA512f62b2c4a0931f6be81c72c9b79b96b1d9586e2013c8ba465ec8529f4c89f59109580baf601fd6dcec4a007add58a8b5d8f2133adea4128d33780091a3905b978
-
Filesize
3KB
MD5e4b1bc317f4ff62426b7282504c5f193
SHA10c50e0589a9eca9c5d45da406b8a37ea3fbbb4da
SHA256ec4184ccaabe0abe93c05ece2762f6dea58cd76eba541b9065574d9dca5ff3dd
SHA5128755862b60028e40e47e1519c2700fca13b32ea093fac53d18e81a6e800cac9127abdf7dc001de5706a234b77e64c546e2de3adfbfbb760ce9f7910e62b8a8a9
-
Filesize
852KB
MD5fdecf34e28276600192f032444362367
SHA11cc005b320b973c0f71733a8a0cb014d94c1cad9
SHA256b39ab57cb368d8d907f153f2805c609f38f7ab3e009284d7974ff823f54e2410
SHA512a879d36811994b3a4ad5e2fae0f6e93e061ef74ba7afc0ccbb4d3d7602216f088c39f9cc20114992e9e301407ed7118480c3a3c3bf2735cec219ba707fe0691c
-
Filesize
71KB
MD53bf90d7005d758697cb53b5a1fdd9749
SHA154f8895cb8430e00e73da0801a98d83ab1be2e54
SHA256bffddd78a3481f440dda09bd9d32dd01520b2502a24a9b21184fe76fa792370a
SHA5121a391a2f118641652bdc97c61a42171795ca859341791ac747cd97fb40162b9e4b9f2322493f78da24d9b63ce09b65fe8718f4d2f47b1ce1a4b849b1984f45e5
-
Filesize
19KB
MD54c89ddf7683543614b7a9ac19407e215
SHA1f3a1af5eae06746d7d80516461829076ae9f5e9f
SHA256a86b880c80cf1c81b16a8b270ce51c91190a40f74d199302f065c84953cb6cbe
SHA512ff0d76743b9da71e323281e071071a85a435fa336cf5573e02c90b54c3b9bf5dda294a96b122e034f3e7eeadfd954db04f227e28f6f3b8872a87242af80d3067
-
Filesize
14KB
MD57d2c413af5c774222848c073fb585002
SHA1a2c6e5507a1eca598fcc21217eaa665efcbce6ac
SHA2564975d41d16ae2c19cbad67cca48f9c15dab2b39cc6341dbfcf326658dd560148
SHA512144170ef4cc2b8f057d8464b283b8e028ff8390fb397298176855d1f2d7d8ff2419c03876d31254eaf94de38b5e7b03c5b955f01181d6daee1f7d82aff56031d
-
Filesize
3.2MB
MD562f45ac6d2d6d5342417fb2a7b8da9c7
SHA1adf825cadc3e79ed530dbe8c6893ce35861f8df4
SHA256e2842e9bb02ff1cc48a566238d23a73adf9b5fc404a1c4989540cfe05bdb3c42
SHA51229593e8614e2fc910363eb57b1f44f9e61a367c4281bc74b31add1ce8aab704dd1fd0bb3e5129a3a082bb148719c7b3eb79d45b4429e5678f194be53549173f9
-
Filesize
7KB
MD5b8144c9c999eea732c230d21cee83e77
SHA14b3e80646ee583b844e9b2b58196cf4a5f74d113
SHA256097ab0a24e8b15c0b5aba84b7259bef8ecb5f2e80bce30ccde3724dcd2139016
SHA512c2e7d672dab15991e4bbc59c18a3b7efd9decfb2aba271171b5993ba36371ed55258188071c26650755fccedf171eca9c3158c20f688c5d38f7ba42ab34cbe80
-
Filesize
5KB
MD50fafb4e9d02af77a72c823805288a06a
SHA15f3e78761d1492259066d825399bd7896042b52a
SHA256926a34ff34ce8c2f4c2172a3fd12b2ad0acc26297cd85b1ce82db4000d752275
SHA51201bb831137225d0f035388b375edf3fd68fa223338b374fbea8d1a2954d493696a7b4c346f85aa876b6222c5243973facf96819028e01ad9c7041c9ee6bad2db
-
Filesize
4KB
MD5751fe17772ddf197a6023d76ecce39f9
SHA178aecb77bb360be284ef0ee02ccf7d999becafc9
SHA256c4481c661cfc060cc8772a2449e2e9e6005d784cfd727d8006c5ecec4334397c
SHA5127905c820162bbc3a751a99e7eae6807d91cb6a2822d58f3cf5164beee9eb9915e33607bbd0ea1af72ac520d3e4dc23e05c8cc801e9143331ffa093c7509d97b4
-
Filesize
148KB
MD54beeeac23a3e9100fdeaa098ad63df73
SHA10179c85a7c78be1d23820e9396a3ca7bdf0dff38
SHA25604d621148ae047c43034a217ab7dbcf913f94787a8cf8e7aa9e81ce3a75ffdfd
SHA5124e2a1b065981429f72bc165d61c99f4ae2d48e1f939c99bef6b3520eff4ab5dafc067afa687cc57cf0d146e3c9dcf21336a14225e05867dad757b710a69d3c01
-
Filesize
829KB
MD5fba8adddc1391ef3b27c160e62a38b7a
SHA12b361c917b3356e4831f31994b853b24a35d7f56
SHA25636c8a7a911da1148ffa3257ad6e9f82c59d5325325ab2545d9cc754d7bb43f31
SHA51299df725b645ffb63dfda063fb12d0a7c9109ef32d37e9c28eed24c6267d494daed47c9e8d0ef5e0f874c5e154f0f385b44ff7442018b018e3b6e13e2b1fa8fc3
-
Filesize
829KB
MD5fba8adddc1391ef3b27c160e62a38b7a
SHA12b361c917b3356e4831f31994b853b24a35d7f56
SHA25636c8a7a911da1148ffa3257ad6e9f82c59d5325325ab2545d9cc754d7bb43f31
SHA51299df725b645ffb63dfda063fb12d0a7c9109ef32d37e9c28eed24c6267d494daed47c9e8d0ef5e0f874c5e154f0f385b44ff7442018b018e3b6e13e2b1fa8fc3
-
Filesize
27KB
MD593863cc6ca09a8b348c648e57dd21847
SHA17e1bc827f18644751b38ead6f29d1b04014b645f
SHA256a16aa5def0ce264035432d8ac0d1e93f140003a2829426d839b162fa58622040
SHA5121fd4260a8ad6367adab8af7cd1cd86a88348bb9d0ecede1a032031426725170a8456f625ded38c2fc407aa57e86cb960f8ae2f0799b9dd382f43a942e6bf7f63
-
Filesize
83KB
MD5c6484342d8c3b5d215ead8e6801a2847
SHA187c51c1aa444212574f5ae850d60e2df4981b5bb
SHA25675fea81dac4f52312c84be77c0735194e632ffccdaee2ce8932ba120819add53
SHA512fc7d6e97e1876e8bb81af20c454d3934345daec1459a25154ecc7d4d2455b955d4e83bd266fe1cb7c11f52467e980114d0f0b402ee7997ccfcff255ee932f93b
-
Filesize
51KB
MD5bf42bf5d40ba5b5f5591ba04f8372179
SHA1c9c2b3d3b2f26ef5837603c1189ca4d7224c7628
SHA256b80c677de119d385d077a47279d2cf20953803102e9fc83b11b2888cbab9e767
SHA512fe1af9d4ad10a2bdcdbbc967a6c95989a59641adb378b9ce9134eee836fa0b2f3ebfeba0f30a2042cae9fd73f726b1f54a3cafcafc95925b78806fd7a6642d4c
-
Filesize
79KB
MD571ab5b907347419fa65784ca9e7c3d29
SHA1447fd2e2123d5d32845e8322c3dcc8b35ac33165
SHA2563c34a4302546b2b937725a19f91774fc1dd1f098ef0e3b020fb79721c6349be8
SHA51293da89ed34c2f24873b00e80b34d495d11a47dcbeebabf11ce2ef46dfb271c65395a8feb5665ceaaced99a0d7f937e625894183082bce165725c3160cec1b70d
-
Filesize
825KB
MD57ce61b7c402728ce373fbc0dc9214066
SHA1687e176263e778de37f36d097754fd3b6bdd8e5f
SHA2565b8f31594f208e1bd15ba972b13b3142e7efb78560b8b3674ab6c09e589ece4e
SHA512ec06186912605263138d67b1adb005295f7cb5d88018234b7d86b7755ec7aef0630a38f2d4c04922ae201d01b7ece7d5ee2e2740aea4b89360037c5ed489fb4c
-
Filesize
2KB
MD552f2d7acad4a81127f86b6772ff8cb43
SHA151c1d80b4a9556848791fe74e286238aafac42a8
SHA25667019f22f3a548678e6712b7f0729e07b9cb141213f91e4fa4d0bd76ee7b993c
SHA5121e7beb05bf136014438565906f91aca3b7f71a1b60eb3fd1273249533b3214add881d928c299c4d90a13778d0c4a9d5c808c68c8b6cde9abec1da895932dc056
-
Filesize
1KB
MD5d7fb2496bde13c08e7713e22259d1817
SHA11b1eaae704e507575af32c4187e77c1f060dccc8
SHA25612dbecc696081497040beccb66676f59725777bb7380f2adcc32bf5941ffeec3
SHA5123a59d98bfec45a65a6d33ce536936c3b9db3b11b9ee14e0234fe75af380f9d50d65f7922d43dc51be6e5995b01029c9ba0bcbc967a000186e77c815d4b6ef222
-
Filesize
9KB
MD5b73b9ecd459ade5ddb784c5bb4990663
SHA11480ddce20d9d66a9d7fe928e9ed16ea7ee45983
SHA256ce52c3097e7229861f5ac49adda3c4ec399062a6ece2d9a568b253deade44222
SHA512edc536df6fb59a470514023c09dfefea14dd63f55b98516c880ed9b781f9977c1c0b92b927410a2c27dca3f64ea6afb99f170a3a30fd18a0a1796e0f167335b9
-
Filesize
6KB
MD523c03eab4c58009dc86992a09c8ecd20
SHA1169066a19d739bd3364aaa9f2ad0fa3b69b35dbe
SHA25642f8c76b10ee528201cf15d1947681e2200c13d300122f9880902c2cbd903a99
SHA512ee2a669f654827e688b4b2f57c6fc337de54e336e00442093965a51d5dd7197c510da36f0e33faf7b1dfd096593bb70d515c73d87cbe53d59faffd15c4d24f73
-
Filesize
8KB
MD5b679db2783876dd75c44de0fed6978e2
SHA1f5c3bcb22d84ae386a671976d2fc86005b32b0e4
SHA25694980c82c4ee4b0ef1c4618fab4536e55c024295cdddab9d106a7b888311ff5f
SHA51257d7201433f9eb43e8de31f9d6ef4733c08ec8d68f254619d3d8c3aa0937d8383936ba68e2d5c8edd44e4204448bac3aa4607442134ce720b057b4400548ce92
-
Filesize
65KB
MD5f2ced91d6669e6118854f55974954046
SHA180d670bcf1b483aae56633e3ea0ba4ae8957dbad
SHA256bdce7f7a41adaefb4c0f4dd3f82b308a614b8bcfe299cf1e2c3392cf43d64cf8
SHA51204426588715bb58e9e6c5c5c71d163a1215e6dd6b7f77dd69da3c82aef9a8cb80122b991cda726795a4d5c71b43c1f683748d20991737a4c332a13efb7cd4623
-
Filesize
508KB
MD5be3541bfda8a81c474224eb84e977004
SHA1fa9ca357ba8b16480bf92c22628a82dedbcdd183
SHA2565520c35127fbdc94322966486ca76f8075eb3f64655f000b1af16be635309287
SHA512761ff8cde80ef794eb371de20fa1d95440f090dabecd2c58ecd6f8b6c62d908e3bc3bdbe8a3817f3b53d78cb9e395bce146cfc9e1b9ebd03ee1f3d341b780803
-
Filesize
2KB
MD57b336445b0417d4cba1f317e30c6d56b
SHA19c3bbce1206d05d48e69a58c1260f422e15363eb
SHA2566f551a1d2717e29f43e5b0a50a16a5d507f4bf065e11546fadab650ab1c1071b
SHA51229927774406e5fc12a27d6cb8f4134b96298190db5683d442316105d2ddc75ef711bf623cbe474bb9ebaa3bd789a068cd9dc46b0507af52a0fdeeb92efe3ce8f
-
Filesize
1KB
MD5d7fb2496bde13c08e7713e22259d1817
SHA11b1eaae704e507575af32c4187e77c1f060dccc8
SHA25612dbecc696081497040beccb66676f59725777bb7380f2adcc32bf5941ffeec3
SHA5123a59d98bfec45a65a6d33ce536936c3b9db3b11b9ee14e0234fe75af380f9d50d65f7922d43dc51be6e5995b01029c9ba0bcbc967a000186e77c815d4b6ef222
-
Filesize
9KB
MD5b73b9ecd459ade5ddb784c5bb4990663
SHA11480ddce20d9d66a9d7fe928e9ed16ea7ee45983
SHA256ce52c3097e7229861f5ac49adda3c4ec399062a6ece2d9a568b253deade44222
SHA512edc536df6fb59a470514023c09dfefea14dd63f55b98516c880ed9b781f9977c1c0b92b927410a2c27dca3f64ea6afb99f170a3a30fd18a0a1796e0f167335b9
-
Filesize
6KB
MD523c03eab4c58009dc86992a09c8ecd20
SHA1169066a19d739bd3364aaa9f2ad0fa3b69b35dbe
SHA25642f8c76b10ee528201cf15d1947681e2200c13d300122f9880902c2cbd903a99
SHA512ee2a669f654827e688b4b2f57c6fc337de54e336e00442093965a51d5dd7197c510da36f0e33faf7b1dfd096593bb70d515c73d87cbe53d59faffd15c4d24f73
-
Filesize
8KB
MD5632f2d5aa9461f22291f1d15e859c290
SHA18df31e51c641af58020f9ae7a03bd8019ee3355b
SHA256fc1aa4618b700200af482bc2b37a9374451e38cbe728f7c56300eb2867aaaeee
SHA5120922c92071dd581189482e98fe297722c84afdd0cd9cb4911d4b663c312739add6d68febff03631c08f6a8693d70a76788cb85e994897aaf2ee72899a668db0f
-
Filesize
55KB
MD52731434a1ecae28d15209a9f1be6c80b
SHA1ff02b11f9369d9cf69b921739d5735978e437692
SHA2566a785d053c9e3a353e1cff9c3734b82399d02eb953c7be25e0499d2f233e9350
SHA51209136146b04f70eae30c7965c126b6c52b5e449a8f4728b5af9ec9679a2b509db627f63f3d4d438b10157c1999387d0c434f5bd5c59d24896465638d4c43795d
-
Filesize
9KB
MD52586c9c15c1aeae0fbc7b4246c121b60
SHA1909e75b23e8ae3e312d248a6c644737d2372edd8
SHA25645c6984b9e37ea7c8b7db09e9982f5d963e6ee3670c821f25e88ebfb7b4b8d41
SHA5120dcdf45cb58fd629ae6f56b5f7df879d015cee8f2b1fc76c7be2d01a9bb318f543cd5ed240616057bb18b24f7017f356c4d0fa9e35ee2ce64d7154199e65e4bd
-
Filesize
9KB
MD5a48cd43ad50cbf4fcf3029af2437f228
SHA1eee0970a23f43f1fd51a9dd7e3190e0239a383ed
SHA256069fa98157c1f859a861aacc4f7b1a1303c9b2b46280fd59a0c48362cef64f40
SHA512a871098d8d66662262f27668831989a6d7c06217a8f946854967e31df2e2b6eae7657af383cbf463b3559026485c81c5aa91a06c35513cf473d340651a4bb42e
-
Filesize
79KB
MD5d17902b18a5ad47410831225b9f2f6dd
SHA11633af46390c0296fea98ff0bd87b457d8bc7b08
SHA256bb0247ffe847a52bedecb144a370e1bb741a3c10f6c21d7be26d4f4c467a8659
SHA512f18c184e792487057d3752a529cbd0c451b65267d1e8c9924c4eeeb69950a7be31e65833da2d7c5349762e74d2f4dca642c672e7970dbdd22befc000ef1e3250
-
Filesize
5KB
MD51880432dc26a5a5e0f50684f175acf4d
SHA1f1ad1f5a0642a658420742533558dd4c008209b2
SHA25688cc5ac261598fcaee0dce92f8f9a18e83d58fdb696e8c748971ac84bc9a26ea
SHA5123211bbf288571f93f50be63f73d74908a03b91b3ce0beaabf40cd7123d82a54ca56a6c4a022c8c8292ffb57645bbb3d0b591c8017c523608c31aade7bc92804d
-
Filesize
5KB
MD5535020f852d48cf904c362cb5bcacac7
SHA14f8205a3fa53686416f91ec0b8ac06b715557502
SHA256b708754765c158a3fee392dc438ee78dbf45d5b23fedae69af13b9ec97315561
SHA512b8d7120cca0954dcf3aef18f9d67029aca9dc0a0978fbc55180a69ea772ecfc85356108a8e059e7e8a63a3df3e048c5da4d58d1dc5bae5f53dafd72aadbe0c21
-
Filesize
116KB
MD55513818fcb92467c79c407c4752334f8
SHA115972c6f5d88ec55a8850fa3b5148c48b7624786
SHA2564c0846d86c37f7aff9708a6235e8a06f96acb0ed5b8203b4c91ee86dbb71ad14
SHA512fad8bea8dbb9cacb7ecfd55f4c65b4c3a0f40f68575a78d35cb47bfa176a69f48e225f70f08c625b3af27109e2b66f8d44a6881e8509d9dd05ce769b8d5dfd97
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\English\LA_EN.TXT
Filesize61KB
MD58aad9997e86b2d19143ec9507566e89e
SHA175f6fc3662e83fc600f631b282ff49f9a6f58593
SHA25604429ad279e801436898f553afc9ea94b27312d69dec4c73d4584066b3cb8478
SHA512d0c5bc3cd353972017d4c2f9543b35c14c36e861e9106f7ff863ca6423fd6cc8670ae0b38eea701a63348254ffec139b8f73124be9f49804d3caf7983ce4e6aa
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\English\Resource.ini
Filesize11KB
MD5f8259354af1b2b4ad6472e2b4d150463
SHA18ac9f084c593a6e85d520c3906a708eae55be26d
SHA2564fa0a9ad75baca829fc1170c429e33e3696f054507ee99d72d997c467523a010
SHA512dae5c23d0377d34f2b23fb60d81100ce86deebb9e3e9a7f2f70e681af9f0dbe7fba16b1ee1d56ed17834f26c8bfd7f71f44410469e8c8ddbdf8ddaede82d186d
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\Japanese\LA_JA.TXT
Filesize28KB
MD529a03fd7adf84b1f34b1f2e3b3b0de6a
SHA1f135639e69753b0aa821e855e511fe7233d9f805
SHA256229c345d37a926517b22dd585d491b3392f2a76dbdeebd8702d111f99db3d9f7
SHA512661cb7b70cf761e0467fea1ed12607257c47094eb09c621c8c136bf7a56101eec72b8da215374a8cbbaaf6d90a228733419e5c8f7ffb5dde565c9a8c6f9710e0
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\Japanese\Resource.ini
Filesize8KB
MD5654baecffdfe4142ac259c0932863a70
SHA1f98d5ba3306bedc8727306ad1b49e6fe6b1d8806
SHA256c265ac7cdda7194a42bc24778380c1e73948bdef3439a8a0763b7bbbd58bdd00
SHA5121b97e99347d851be7c70fc97d04ec2c376b0ccdd86e5bbfdee1882e777ac9f2e4c726a4cf1362ced82338f1172d239c704052904ba8d9f2bc819c35ded149d15
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\SimplifiedChinese\LA_CN.txt
Filesize18KB
MD509b89d770c1c130702795d83879bf5da
SHA1c01a6c43243475c7823ffbcc2c3658a9a96b7a51
SHA25649a1562dda7c31974249390b649de4f4fd9f1143fe5a725f25df3bd74d821dac
SHA51261f3d893eabfcb8c87294b8aab468763bc40f8998c8e29d31ef76efcd9218d81d2b13573e2a794c2125ebdb9c7b11662d5b51c18cfcd45f6c4701d4d2feffdd2
-
C:\Users\Admin\AppData\Local\Temp\EPSON_Advanced_Printer_Driver_6_For_TM-T82X\Resource\SimplifiedChinese\Resource.ini
Filesize5KB
MD5a451dcee4701e6bfdc185f9ed4ba0f0b
SHA12dc7b8d08374957f0665e6c47ea2c3b74090506f
SHA256e8e3c4ea56ee9aee0399f0aebc0c3dc0f76590ca1443d64030a63b316c142653
SHA512684e11084f45732ba16da6eb9c6cf30e578a01695e7114d3ffec27e3569a672610cbac183f37c341e943ee5e909e360cb7b3e38e5fb701d57be397e078d23c57
-
Filesize
83KB
MD5c6484342d8c3b5d215ead8e6801a2847
SHA187c51c1aa444212574f5ae850d60e2df4981b5bb
SHA25675fea81dac4f52312c84be77c0735194e632ffccdaee2ce8932ba120819add53
SHA512fc7d6e97e1876e8bb81af20c454d3934345daec1459a25154ecc7d4d2455b955d4e83bd266fe1cb7c11f52467e980114d0f0b402ee7997ccfcff255ee932f93b
-
Filesize
361KB
MD5f3e7046c664a5cbf07a881d61f962136
SHA1f0e249a40188098225f1126675cd1143c60ab700
SHA256c78b0a8ff02cba8bed7055d1939690fab9a324de6ba20dd257a56b2cd0469b2c
SHA512e2dab4a2f8e59fc96ca3ca13647633218409fe071274dfe65df675057593ee482cf894c4e57960ce2d85423702f87bd8b27876c5735748d71e3a48b9ec4a7a06