l350_x86_150asp_gm.exe

Epson America, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from a1227.g.akamai.net.
Publisher:
Epson America, Inc.  (signed and verified)

MD5:
2fbb4ee809947289b2be51759629bd46

SHA-1:
e52a8adf4ab33d33ea340f825a4ee1b1fd57228a

SHA-256:
8e22966b150aa5b101dfd3587d5f23668c5a4ceee6d1c585cbb74589852ecb05

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
5/10/2024 10:40:42 PM UTC  (today)

File size:
19 MB (19,961,176 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\l350_x86_150asp_gm.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
9/22/2009 7:00:00 AM

Valid to:
10/4/2012 6:59:59 AM

Subject:
CN="Epson America, Inc.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Epson America, Inc.", S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
21AA213B6BC4A0FFF63A0362BEE6BC33

File PE Metadata
Compilation timestamp:
7/24/2007 12:30:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
393216:rF7rzZGLn5Mcd24F3zUA5EQJZezmer48lnGeZcztBhgwSqwKDNF:rF7xun5P24FjU8DJZexd9ZcrCwfwgNF

Entry address:
0x7EB8

Entry point:
E8, 19, 28, 00, 00, E9, 16, FE, FF, FF, 55, 8B, EC, 83, EC, 20, 53, 33, DB, 39, 5D, 10, 75, 20, E8, A4, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 35, 15, 00, 00, 83, C4, 14, 83, C8, FF, E9, 80, 00, 00, 00, 8B, 4D, 0C, 3B, CB, 56, 8B, 75, 08, 74, 21, 3B, F3, 75, 1D, E8, 75, 15, 00, 00, 53, 53, 53, 53, 53, C7, 00, 16, 00, 00, 00, E8, 06, 15, 00, 00, 83, C4, 14, 83, C8, FF, EB, 53, B8, FF, FF, FF, 7F, 3B, C8, 89, 45, E4, 77, 03, 89, 4D, E4, 57, FF, 75, 18, 8D, 45, E0, FF, 75, 14, C7, 45, EC...
 
[+]

Entropy:
7.9984  (probably packed)

Code size:
60 KB (61,440 bytes)

The file l350_x86_150asp_gm.exe has been seen being distributed by the following URL.