Analysis
-
max time kernel
123s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-05-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
sketchupmake-2017-2-2555-90782-en-x64.exe
Resource
win11-20240419-en
General
-
Target
sketchupmake-2017-2-2555-90782-en-x64.exe
-
Size
148.0MB
-
MD5
5c98d5afc594cdac0bcc0e5bf8c37f73
-
SHA1
c077886fd56b0aa30f81502af1f753f107be8448
-
SHA256
9841792f170d803ae95a2741c44cce38e618660f98a1a3816335e9bf1b45a337
-
SHA512
46ab86ec40d081f23933c960db27cbae3297d6ab26fcb324ed2863b8a68d73c54623207d55bc1622d116b6547e075ea365b66f0ebe765a6fbe7d6e2a0bfebc43
-
SSDEEP
3145728:lVIwla4wBqh5QbZk9GpWu7+gFOpvwU6MDAoc3H5mErZ2jDQ+V+KDfyLhDA3o4bj:lGEEk9kr+86w5MDAocX5m9DQ+5fyLe
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 5 4072 msiexec.exe 6 4072 msiexec.exe 7 4072 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MSI8ABA.tmpMSI8AA8.tmpMSI8AA9.tmpdescription ioc process File opened for modification \??\PhysicalDrive0 MSI8ABA.tmp File opened for modification \??\PhysicalDrive0 MSI8AA8.tmp File opened for modification \??\PhysicalDrive0 MSI8AA9.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rubygems\source\vendor.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\cursor_openhand.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\dlg_superscript.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\fileutils.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\platform_specific\digest\md5.so msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\minus.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\tb_phototextures.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\cursor_nnw.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rubygems\commands\contents_command.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\dlg_style_face_textures.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Style Builder\libcef.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\cef\locales\nl.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\cef\locales\ta.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rss\xml.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\cgi\session.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\tb_freehand.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\text_anchor_bottom.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\optparse.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\cursor_rotateno.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\cef\locales\ru.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_dynamiccomponents\js\functions.js msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_trimble_connect\tc_common\client\js\templates-de.js msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\cef\locales\hr.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\tb_previousview.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\tb_rightview.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\tb_sharemodel.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\json\add\bigdecimal.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rake\cpu_counter.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\dlg_expansion_down_gray.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Style Builder\cef\locales\it.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ifcplugin\TKBO680.DLL msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\platform_specific\libgdbm-3.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\pdflib.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rexml\undefinednamespaceexception.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rexml\validation\validationexception.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Style Builder\cef\locales\te.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\platform_specific\io\console.so msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\cef\locales\es.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_trimble_connect\tc_common\client\images\dlg_filehistory.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Resources\en-US\helpcontent\tool\23006\index.html msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\pdflib.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\net\http\proxy_delta.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\psych\class_loader.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\icudtl.dat msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rubygems\commands\push_command.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_dynamiccomponents\skps\(highlightsoft).skp msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\cef\locales\pl.pak msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\platform_specific\rbconfig\sizeof.so msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\cursor_arc3pointpie3.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\dlg_soi_gridstyle_inside.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\English.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Images\tb_radiusanglearc.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rss\2.0.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\BugSplatDotNet.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\optparse\date.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_sandbox\images\cursor_drape_0.pdf msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\ShippedExtensions\su_trimble_connect\tc_common\client\images\tb_sort_user_acending.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\login_inactive.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\platform_specific\enc\trans\gbk.so msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\lib3ds_dll.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Tools\RubyStdLib\rake\loaders\makefile.rb msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\dlg_nav_filtered_closed_group_icon.svg msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\LayOut\Infragistics4.Win.UltraWinTabbedMdi.v14.2.dll msiexec.exe File created C:\Program Files\SketchUp\SketchUp 2017\Images\cursor_eyedropper.svg msiexec.exe -
Drops file in Windows directory 23 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI52DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8AA8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8ABA.tmp msiexec.exe File created C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\SketchUpIcon.4DD56CCB_C07E_4F8C_8A3B_C8CEA6E58259 msiexec.exe File opened for modification C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\SketchUpIcon.4DD56CCB_C07E_4F8C_8A3B_C8CEA6E58259 msiexec.exe File opened for modification C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\StyleBuilderIcon.DDFD9CAA_5ECD_445C_AC6B_F4B5A782DB8F msiexec.exe File opened for modification C:\Windows\Installer\e58459f.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8AA9.tmp msiexec.exe File opened for modification C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\LayOutIcon.5ABB1236_4DBB_4EA9_8152_4C72153AB7D6 msiexec.exe File created C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\StyleBuilderIcon.DDFD9CAA_5ECD_445C_AC6B_F4B5A782DB8F msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DFF373E61D7F0BC217.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF1F364803D7B98987.TMP msiexec.exe File opened for modification C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\SketchUpARPIcon msiexec.exe File created C:\Windows\Installer\e5845a1.msi msiexec.exe File created C:\Windows\SystemTemp\~DF404E59932DC046B7.TMP msiexec.exe File created C:\Windows\SystemTemp\~DFD51E002B257D1997.TMP msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{E59BD84C-169B-4F3F-AC5D-85127CF67051} msiexec.exe File created C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\SketchUpARPIcon msiexec.exe File created C:\Windows\Installer\{E59BD84C-169B-4F3F-AC5D-85127CF67051}\LayOutIcon.5ABB1236_4DBB_4EA9_8152_4C72153AB7D6 msiexec.exe File created C:\Windows\Installer\e58459f.msi msiexec.exe -
Executes dropped EXE 8 IoCs
Processes:
presetup.exesetup.exevcredist_x64.exevcredist_x64.exeMSI8AA8.tmpMSI8AA9.tmpMSI8ABA.tmpSketchUp.exepid process 772 presetup.exe 4388 setup.exe 1004 vcredist_x64.exe 3736 vcredist_x64.exe 392 MSI8AA8.tmp 2092 MSI8AA9.tmp 4656 MSI8ABA.tmp 3528 SketchUp.exe -
Loads dropped DLL 22 IoCs
Processes:
vcredist_x64.exeMsiExec.exeSketchUp.exepid process 3736 vcredist_x64.exe 1032 MsiExec.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe 3528 SketchUp.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
MsiExec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D2C64DE6-305A-4961-A385-E6328DB6D669}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D2C64DE6-305A-4961-A385-E6328DB6D669}\InprocServer32\ = "C:\\Program Files\\SketchUp\\SketchUp 2017\\ThumbsUp.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D2C64DE6-305A-4961-A385-E6328DB6D669}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Processes:
msiexec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\sketchup.exe = "11000" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\sketchup.exe = "11000" msiexec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION msiexec.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exeMsiExec.exeMSI8AA8.tmpMSI8ABA.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.skp\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\style.Document\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{D2C64DE6-305A-4961-A385-E6328DB6D669}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C48DB95EB961F3F4CAD55821C76F0715\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sketchup_install\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\style.Document msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{31C5EF54-CFB2-4AD3-93C0-ABBDF772F504}\1.0\FLAGS msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D2C64DE6-305A-4961-A385-E6328DB6D669}\InprocServer32\ = "C:\\Program Files\\SketchUp\\SketchUp 2017\\ThumbsUp.dll" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C48DB95EB961F3F4CAD55821C76F0715\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\Style Builder.exe\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D9765657-24BA-4FE6-B341-80E0633EC98A} MSI8AA8.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document\ = "LayOut Document" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SketchUp.exe\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\LayOut.exe\SupportedTypes msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.skm\shellex\{e357fccd-a995-4576-b01f-234630154e96} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\style.Document\shellex MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SketchUp.Document\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31C5EF54-CFB2-4AD3-93C0-ABBDF772F504}\1.0\ = "Layout server with typeLib" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SketchUp.exe\shell\open\FriendlyAppName = "SketchUp 2017" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.layout msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SketchUp.Document MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C48DB95EB961F3F4CAD55821C76F0715\LicenseFile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C48DB95EB961F3F4CAD55821C76F0715\LicenseFileEW msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C48DB95EB961F3F4CAD55821C76F0715\ProductName = "SketchUp 2017" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{16139342-26EE-4A37-8989-D2677E28E47A} MSI8ABA.tmp Key created \REGISTRY\MACHINE\Software\Classes\Interface\{F3660360-35C0-4DD9-A3DE-55B6752B5412} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31C5EF54-CFB2-4AD3-93C0-ABBDF772F504}\1.0 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.style msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C48DB95EB961F3F4CAD55821C76F0715\LayOutModule msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C48DB95EB961F3F4CAD55821C76F0715 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\LayOut.exe\shell\open\FriendlyAppName = "LayOut 2017" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C48DB95EB961F3F4CAD55821C76F0715\ColladaModule msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\.style msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\layout.Document\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.skp\shell\open.SketchUp 2017 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.skb\shellex MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document\shellex\{e357fccd-a995-4576-b01f-234630154e96} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D9765657-24BA-4FE6-B341-80E0633EC98A}\Version = "17ef0875-a1ff-41e7-bd99-177c335d9622" MSI8AA8.tmp Key created \REGISTRY\MACHINE\Software\Classes\.layout msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\style.Document\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3660360-35C0-4DD9-A3DE-55B6752B5412}\TypeLib\Version = "1.0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{31C5EF54-CFB2-4AD3-93C0-ABBDF772F504}\1.0\0\win64\ = "C:\\Program Files\\SketchUp\\SketchUp 2017\\LayOut\\layoutapp.tlb" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SketchUp.exe\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D2C64DE6-305A-4961-A385-E6328DB6D669}\ = "SketchUp Thumbnail Provider Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SketchUp.Document\shellex\{e357fccd-a995-4576-b01f-234630154e96} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MSI8AA8.tmp Key created \REGISTRY\MACHINE\Software\Classes\style.Document msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.skm\shellex MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C48DB95EB961F3F4CAD55821C76F0715\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D9765657-24BA-4FE6-B341-80E0633EC98A}\Version = "c4080c04-8eb8-4b4e-bce5-56294937e64f" MSI8ABA.tmp Key created \REGISTRY\MACHINE\Software\Classes\layout.Document msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.skp\shell\open.SketchUp 2017\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.skb\shellex\{e357fccd-a995-4576-b01f-234630154e96} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\layout.Document\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{D2C64DE6-305A-4961-A385-E6328DB6D669}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.skm MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MSI8ABA.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{34FCEF24-CB1B-4CC5-8234-FEBE52CFD363} MSI8ABA.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\LayOut.exe msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\LayOut.exe\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\LayOut.exe\shell msiexec.exe -
NTFS ADS 1 IoCs
Processes:
MSI8ABA.tmpdescription ioc process File created C:\ProgramData\Reprise\:wupeogjxlctlfudivq`qsp`28hfm MSI8ABA.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msiexec.exepid process 4604 msiexec.exe 4604 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exesrtasks.exedescription pid process Token: SeShutdownPrivilege 4072 msiexec.exe Token: SeIncreaseQuotaPrivilege 4072 msiexec.exe Token: SeSecurityPrivilege 4604 msiexec.exe Token: SeCreateTokenPrivilege 4072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4072 msiexec.exe Token: SeLockMemoryPrivilege 4072 msiexec.exe Token: SeIncreaseQuotaPrivilege 4072 msiexec.exe Token: SeMachineAccountPrivilege 4072 msiexec.exe Token: SeTcbPrivilege 4072 msiexec.exe Token: SeSecurityPrivilege 4072 msiexec.exe Token: SeTakeOwnershipPrivilege 4072 msiexec.exe Token: SeLoadDriverPrivilege 4072 msiexec.exe Token: SeSystemProfilePrivilege 4072 msiexec.exe Token: SeSystemtimePrivilege 4072 msiexec.exe Token: SeProfSingleProcessPrivilege 4072 msiexec.exe Token: SeIncBasePriorityPrivilege 4072 msiexec.exe Token: SeCreatePagefilePrivilege 4072 msiexec.exe Token: SeCreatePermanentPrivilege 4072 msiexec.exe Token: SeBackupPrivilege 4072 msiexec.exe Token: SeRestorePrivilege 4072 msiexec.exe Token: SeShutdownPrivilege 4072 msiexec.exe Token: SeDebugPrivilege 4072 msiexec.exe Token: SeAuditPrivilege 4072 msiexec.exe Token: SeSystemEnvironmentPrivilege 4072 msiexec.exe Token: SeChangeNotifyPrivilege 4072 msiexec.exe Token: SeRemoteShutdownPrivilege 4072 msiexec.exe Token: SeUndockPrivilege 4072 msiexec.exe Token: SeSyncAgentPrivilege 4072 msiexec.exe Token: SeEnableDelegationPrivilege 4072 msiexec.exe Token: SeManageVolumePrivilege 4072 msiexec.exe Token: SeImpersonatePrivilege 4072 msiexec.exe Token: SeCreateGlobalPrivilege 4072 msiexec.exe Token: SeBackupPrivilege 1816 vssvc.exe Token: SeRestorePrivilege 1816 vssvc.exe Token: SeAuditPrivilege 1816 vssvc.exe Token: SeBackupPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeBackupPrivilege 576 srtasks.exe Token: SeRestorePrivilege 576 srtasks.exe Token: SeSecurityPrivilege 576 srtasks.exe Token: SeTakeOwnershipPrivilege 576 srtasks.exe Token: SeBackupPrivilege 576 srtasks.exe Token: SeRestorePrivilege 576 srtasks.exe Token: SeSecurityPrivilege 576 srtasks.exe Token: SeTakeOwnershipPrivilege 576 srtasks.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe Token: SeTakeOwnershipPrivilege 4604 msiexec.exe Token: SeRestorePrivilege 4604 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 4072 msiexec.exe 4072 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SketchUp.exepid process 3528 SketchUp.exe 3528 SketchUp.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
sketchupmake-2017-2-2555-90782-en-x64.exepresetup.exesetup.exevcredist_x64.exemsiexec.exedescription pid process target process PID 1100 wrote to memory of 772 1100 sketchupmake-2017-2-2555-90782-en-x64.exe presetup.exe PID 1100 wrote to memory of 772 1100 sketchupmake-2017-2-2555-90782-en-x64.exe presetup.exe PID 1100 wrote to memory of 772 1100 sketchupmake-2017-2-2555-90782-en-x64.exe presetup.exe PID 772 wrote to memory of 4388 772 presetup.exe setup.exe PID 772 wrote to memory of 4388 772 presetup.exe setup.exe PID 772 wrote to memory of 4388 772 presetup.exe setup.exe PID 4388 wrote to memory of 1004 4388 setup.exe vcredist_x64.exe PID 4388 wrote to memory of 1004 4388 setup.exe vcredist_x64.exe PID 4388 wrote to memory of 1004 4388 setup.exe vcredist_x64.exe PID 1004 wrote to memory of 3736 1004 vcredist_x64.exe vcredist_x64.exe PID 1004 wrote to memory of 3736 1004 vcredist_x64.exe vcredist_x64.exe PID 1004 wrote to memory of 3736 1004 vcredist_x64.exe vcredist_x64.exe PID 4388 wrote to memory of 4072 4388 setup.exe msiexec.exe PID 4388 wrote to memory of 4072 4388 setup.exe msiexec.exe PID 4388 wrote to memory of 4072 4388 setup.exe msiexec.exe PID 4604 wrote to memory of 576 4604 msiexec.exe srtasks.exe PID 4604 wrote to memory of 576 4604 msiexec.exe srtasks.exe PID 4604 wrote to memory of 2092 4604 msiexec.exe MSI8AA9.tmp PID 4604 wrote to memory of 2092 4604 msiexec.exe MSI8AA9.tmp PID 4604 wrote to memory of 392 4604 msiexec.exe MSI8AA8.tmp PID 4604 wrote to memory of 392 4604 msiexec.exe MSI8AA8.tmp PID 4604 wrote to memory of 4656 4604 msiexec.exe MSI8ABA.tmp PID 4604 wrote to memory of 4656 4604 msiexec.exe MSI8ABA.tmp PID 4604 wrote to memory of 1032 4604 msiexec.exe MsiExec.exe PID 4604 wrote to memory of 1032 4604 msiexec.exe MsiExec.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sketchupmake-2017-2-2555-90782-en-x64.exe"C:\Users\Admin\AppData\Local\Temp\sketchupmake-2017-2-2555-90782-en-x64.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\presetup.exe.\presetup.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sketchup_install\setup.exeC:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\..\sketchup_install\setup.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\VSD7196.tmp\vcredist_x64\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VSD7196.tmp\vcredist_x64\vcredist_x64.exe" /quiet /q:a /norestart4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\VSD7196.tmp\vcredist_x64\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\VSD7196.tmp\vcredist_x64\vcredist_x64.exe" /quiet /q:a /norestart -burn.unelevated BurnPipe.{162C9E6D-947C-4C77-B9DA-4368B8F99197} {6295573E-246B-4FC1-AF30-9EF15FDCF394} 10045⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe" -I "C:\Users\Admin\AppData\Local\Temp\sketchup_install\SketchUp2017-x64.msi"4⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Installer\MSI8AA8.tmp"C:\Windows\Installer\MSI8AA8.tmp"2⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\Installer\MSI8AA9.tmp"C:\Windows\Installer\MSI8AA9.tmp"2⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
-
C:\Windows\Installer\MSI8ABA.tmp"C:\Windows\Installer\MSI8ABA.tmp"2⤵
- Writes to the Master Boot Record (MBR)
- Executes dropped EXE
- Modifies registry class
- NTFS ADS
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\SketchUp\SketchUp 2017\ThumbsUp.dll"2⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\SketchUp\SketchUp 2017\SketchUp.exe"C:\Program Files\SketchUp\SketchUp 2017\SketchUp.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Pre-OS Boot
1Bootkit
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\e5845a0.rbsFilesize
774KB
MD5b0892d62ef7e1f04057b3f65a850e2af
SHA193153282f5f8131153b7cf0f2d67904dc5ab6ca7
SHA256272b454c2a85efa20cbac3e7a5cbacadb7422401ae47faeb378016df03c5d393
SHA512ca0bc8260cc25257dac5aef20e0e2370a2df82222fabb3343fba4186367dcd574d1d112d31c31fd0e5d99e33da4cb4166252413caf91c8e635b281fb3e2948b4
-
C:\Program Files\SketchUp\SketchUp 2017\BugSplat64.dllFilesize
276KB
MD54bf451157a42c5328efb487af239e908
SHA17ac0044a632ccc62eb71f6862274ec0417a982a3
SHA256a2cef7aa3d95e5bc601aa2c40c0ca76d98a427c4e710d58b27c26b148cb991a0
SHA5126982343acab171f4403e576e0649d5fce966a478f72339e95166f7580a617de7ef84f1ac2f34dfe7402e61c32edee167d08a0e63f046f9f4e368fed4dae3094d
-
C:\Program Files\SketchUp\SketchUp 2017\LayOut\LayOut.exeFilesize
14.1MB
MD5755d2b738be21277bb023c65c34c5c0a
SHA1f8fe5c9d47e08a9e744602d6ec65327bb0eb4ff7
SHA2569cc5c2bc70b755517cd4ae83f11620b2de7a600567881e4e5553d2d27d889450
SHA51207c9464b0ac4d3cf1251c1822de1b9ef8e4aeeac722ec7eae7f5135106d7cd1f7dc066ab60a909624aa0c0217f10c0b33b8962bb8349bbfd5e4d81df887f8bf6
-
C:\Program Files\SketchUp\SketchUp 2017\SketchUp.exeFilesize
20.5MB
MD5dab601d71c953e8e0c6f106448f86755
SHA1803f7366768829a3f211158d48f417da9d71df1a
SHA256646ae5a908aa5b74048da0d8596d5d7dc97076c5b43e5d86f78d7ac84389564a
SHA512bccd37182d518181bd90dee40712b1b39ba69c1416d5a3b9e76a3950cfcb12d531a5356c6ea82d49accd990853fc49fc960d7f9f38ce3d4eb73d125c1e7ad054
-
C:\Program Files\SketchUp\SketchUp 2017\Style Builder\Style Builder.exeFilesize
6.5MB
MD549582b6052e1d6508c17228603dfa37f
SHA14695d36d7b34daf8d90c9bf3ad5b12216f46b76f
SHA2565fb393c6809416c852b6d118a8e9a567bffe05f8524ec47d557d41de43293f90
SHA5121f9b8d679a5780f914da2b4f3809bbf96e51640241beb6d58cea5bb20b2b8fd6ce90fa29611a33fdb7b82669c090a61e6ae8dd96decde07b69adb28ec0d105c8
-
C:\Program Files\SketchUp\SketchUp 2017\TD_Alloc_4.01_14.dllFilesize
17KB
MD5e3b7aae584addbf16552e1ba49a926ed
SHA17660d9b5d729bce7fb66639a86fd749118a1a908
SHA2564405642454d64d54262eab2f11d4328240fdce3be20840f54bc97e1765c8aeff
SHA512d56425d5290225afd4e1704d76da08befcd069d288d4d2b57f72834c2b617287b194cbe7959080530d7779184e3be65c31195eda3403697d6b1b02a4519862b3
-
C:\Program Files\SketchUp\SketchUp 2017\TD_DbRoot_4.01_14.dllFilesize
473KB
MD5a0102b1ba2e4a0425ced54a34b13195e
SHA11f807d04cae5ad39c1f9e5c9fa2a1f1e6e8485c1
SHA256d5c6c84db1ca432930296d24d5105e3ea0022d71211415ca333f823272d9db2a
SHA5124e195862c6242282961abf956adbbe2aa1bc225cf4a691908f8b3e4160923d0cb468476e8fdd80f517925b742285891e16ad8f3e95dbbf841514355ba3514089
-
C:\Program Files\SketchUp\SketchUp 2017\TD_Db_4.01_14.dllFilesize
12.1MB
MD5ca24bae9e1406de1a3a473b317d0dea1
SHA15463b23ece8b1561bee8645492a66c28a5c7264f
SHA256c9dcf5cab55ea837a6a078072c1e88a1d97ed5f9fe4ae11931762c857845591e
SHA512091067623ab5389c1709e6afee71b9bbdd6480e5c88c167b2a7114b31e954eb359d31ce425870602ec6ab62734f81d924932fd2376aa4b800b1ea1f2d85232ff
-
C:\Program Files\SketchUp\SketchUp 2017\TD_Ge_4.01_14.dllFilesize
1.3MB
MD58adf3c637e93059b7d5cb8d5abc53fc7
SHA1880795e1650457aaa5be37f63c84469b24492731
SHA25642f928e3269934a68693a1436887e579051d8448ef496d7dba5637b84bcfcf89
SHA512e789b54588a02316c657f2851bbd3781f25d4d38e359d95cf9796205132f85dc05af2634c0d9955e3946eff811bf367ac075717cac5e19d610128bccd185874e
-
C:\Program Files\SketchUp\SketchUp 2017\TD_Gi_4.01_14.dllFilesize
1.7MB
MD5347b39f215de3107133ece5e4a1c7d41
SHA137bc7db5315f3ca339fde2adfd0110ae294202ce
SHA256d549c643ecf42e78a1558832880602e9f10a7c2fb186e311eb26d7e5c9503b53
SHA512a2a20c70ce821b641c1baa07e848d3a6fac2a48b5ca93378d4bc8b5ba0eebc7deb62b589734726e993f745fb8fac442f46021f6d24d461c5f4f95cb6606219b8
-
C:\Program Files\SketchUp\SketchUp 2017\TD_Root_4.01_14.dllFilesize
881KB
MD5507b4444c23c09288a792828d9ba8b31
SHA175aeccf33155dcbcf821a476b1568d532723484b
SHA256c6ec145957fcfe3bd869ef6fdef25b9645f20d254f7339d8b726752a16c67a57
SHA512989ede3813c76aa8bb4f21e436b1ad10d9056ef0cfbb33bd5eaf7855009bba769707b5fadafcc433b63aa24db653aa0371627d6841d63efe744e9afc65a5ad53
-
C:\Program Files\SketchUp\SketchUp 2017\ThumbsUp.dllFilesize
7.4MB
MD58bd015301c2d4cc82898c171f822ded5
SHA13609b3d232f162ff4a2994a94137b4dc908c9764
SHA2562c6f72dc5fbf60605673c73975db6605a67697508c046bfba0480bcc9a7ae556
SHA51221d117557d344f7524d4e9d7d914e0bfbd15fbaa226ab17578bdf866ca2ba9de965e2e7a057e27e9e0193b5be8a3d1d34ea3ae3e60b73216e51221aea897e15c
-
C:\Program Files\SketchUp\SketchUp 2017\avcodec-55.dllFilesize
9.4MB
MD546dd6527e989f191c762fa28f006d32a
SHA17bd7a1743468e478286d16f91ccb0a635171d52c
SHA25672fdb129c0a445072b904b5e4cd13f65fbdad97e76f67f2523bbdf3044bf24b0
SHA512b35eb7dc37a42501b83635e057c6aa7c587fd00f3bdb57a007d19e9aa39c4b2b17eb92e4a30255b467606688c5c8e2624d16f66cc2b2bbc0d1db471308552e4e
-
C:\Program Files\SketchUp\SketchUp 2017\avformat-55.dllFilesize
1.3MB
MD5e76701ce2bd9e4ca1833cd0ad6cc65cd
SHA1e447453683baf423c5d429f88b6ae3a86ec57dc3
SHA2561b1c215f79e74023727c391f78e57f81a0dfb63b88d95e7b823d060738ebe38d
SHA512c28c6ca3b052ee4449f7669dac58c5eaaf620fec7d86dee24d59da017882b7d664a65a78376d6fefa74c78a67f736b764c8912661bab122b9b7f6900315002c0
-
C:\Program Files\SketchUp\SketchUp 2017\avutil-52.dllFilesize
266KB
MD55ce124ae43931bd59aaa388c3098e79f
SHA105ec0fc7ca8e639a48973f72707986d4a5642863
SHA256b6b79f6e6a36f474bdb82d16c15bc78e2535768313f26c12d9f1036e92b1b475
SHA512b8b874516eb179f574cd1f3563d76d220d9583f4ca52003adab3c06beebf539ea0e3ac40221dcd587252274151574b3bcff67250d85c63cdc7af95a32fc55b95
-
C:\Program Files\SketchUp\SketchUp 2017\common_application.dllFilesize
46KB
MD57b686632e66ad726df5ace64dc16870f
SHA1acb1ad32e5cf1ae604f06a58b5fc1b2c659d689a
SHA256d8a989c821d32e155032f73caf4f806147a6c2fdcd28b020255167de17da03b1
SHA512b20c97acd749065d8d176e82a95da12a6b686b6bd024364ed5641076dcaa610002caf11b847c821d4f89df89b612714ec7bb387faeb12eb64999070ff7917b12
-
C:\Program Files\SketchUp\SketchUp 2017\gdal16.dllFilesize
3.2MB
MD5d1b62f34188c831d0d61d2386d45891e
SHA13718fd22d6d4a63cb14517abc6c080fbf7f7239f
SHA2568cb7dca3a4008116b6622593896122c3f44c8e44ae4108e72c9314143be862c8
SHA5127dfdb6ceb064b7910f9bc5d1411c149cba9ae26158f57390a741118aef369708059c434a3648afc306daeefec246133a4a9bef6ae18b14eb8bb295a956021748
-
C:\Program Files\SketchUp\SketchUp 2017\swscale-2.dllFilesize
391KB
MD5718308a14270a936307c19e0ec787dcd
SHA12227a3f6bcde94591912a300c0d22ef2005b3d62
SHA256fb02bf8ec6c74b5736808295119cf9d3f5d2df737aa66f34deec8de32fb6c368
SHA512f4d675ab4cb3f0c2b07c4b932d4f76e6f43a5b78b9f35073e807349c064387c37a5c4201ee30d0a2c4ad696b64ef2d0e619a6734106890219223f78d60d34cda
-
C:\Program Files\SketchUp\SketchUp 2017\x64-msvcrt-ruby220.dllFilesize
2.6MB
MD5a6827f0e840ea71645356838206173a9
SHA168d7644c04a48efa7747fe0b553c841270c05622
SHA256b983ef73f72b1f2507f8511a4dd458836fad979b7f3b74bebc23808c6f27d10c
SHA512441e4f6e7e2b79f1588529d77141884804729ea21fd06a02314773bf73d3ec991ae90945aec4df5c9e43ba191204d7ecadcfe22c41e038b6bcec28964d62b6c7
-
C:\ProgramData\Reprise\wupeogjxlctlfudivq`qsp`28hfmFilesize
166B
MD5096d1d1dce5704362b15ef33b273b5f2
SHA133a67a7c24058744a37e7e601d856386628a3c48
SHA256d239d27ecec73da05ae2cd280684874b1ab919c92b09adb91a0a2a7a03570d3e
SHA51253b63e5666647cc4464ad7ba3d2156eccb82b3dd10d34c9e9e30ddc841d3131096f6580d0260934231b2093cc0a678743557dfca119d93bb795f9e1ff4cb08c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\40C68D5626484A90937F0752C8B950ABFilesize
834B
MD5cbed24fd2b55aea95367efca5ee889de
SHA1946f48b5c344fd57113845cd483fed5fb9fa3e54
SHA2561dc8a0fcbe260b77adfe5ad9aaac543239b2a0d9f4e1f3c2657beee4376ffee4
SHA512c504a11ea576f8ce14de26a0617e22e71e14db0f1dadefc187ce94e4a35a83743c743824e3629899c262aae4772bb86a0ee5bb643db20645483f0c376215ec6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CEFilesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_76C32E6068D68CA23325CD74A0613DCAFilesize
1KB
MD5e406f764df23208a2ca042214a7ed4ff
SHA1c114594f055766de705a247a4151f969e242880d
SHA2564ae6d7aadb05ad8df2ca2a8e6fc0f9d941ad5ef8794f9fcf187b3d23f496183d
SHA512f06b37a3c10b87e714b840baa6dc8789d43211d3368ca44c48babddf5beba2cc3e1c052d2d658994c57287f5e75847ab71411ae8dcb6172f978e096446075b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\40C68D5626484A90937F0752C8B950ABFilesize
180B
MD53f1be4ff68ba5c228285639fc79405e4
SHA1468ad31a434f1bc6873866c5e58bb6b0db923793
SHA256cd52f0decf56f328307f659c282beb74e378c8460e77c57a796f316164d38409
SHA512063feac87060ed08b30b7cf431301d4c91d1a302001e5c29d44b0021e6e670e55a0446adc05405f9faa6574e146cc357ac4cc19fdc5c526fe07d1617832f5527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CEFilesize
398B
MD550a5038719112a6b51a95e44f77b27c1
SHA1f1808c855b545b3bb30e048b2460a32c6032bf41
SHA2565b112adba9399ba3c8094a24f53f395b90cb2215db38dddbb01353e7d76a9b18
SHA5126fd1a604353e202e5fc77ad45bf9f217572cd055750364cba496e5faeddbdfcdf7b8f08aec21033a048edb3ffb0c169bf325ff87b44c6e675d174b593c7fded1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EA618097E393409AFA316F0F87E2C202_76C32E6068D68CA23325CD74A0613DCAFilesize
398B
MD57a405f231d6f9a46c85c3ec0ede08198
SHA1b996b3e573f90eccdd5892d1b04c27a671929621
SHA2563063b9e66d1214ddd9b6e5f507e21aa206f968e5514621e6205631cf5f653828
SHA5129d8da48552208be6d9c1dc587266056dc6d2ba96950cfa205bef991d154ab62af145fe902b8488a8818b11216dc7756efa2e73b1a9902bc9c53fe60a1696b994
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\SketchUpPrerequisites\InstallPrerequisites.exeFilesize
100KB
MD5ddcef619412a49ca748d3c2cf30f7287
SHA1c511ecf5f983e0a6153d379687dcc0d6e0dbc77f
SHA25643a028c7ae3cbbd3c41f36586477bcc44f1523d571810bf6da5340bf2ed26e71
SHA512cc40b1065a97a63163955986d5a883b9637b0e92ca394b0119d12f343621f3e3eb450e55f48eee585a9cffb8a25f64f80ca76c942b31ca67cd420550c77ed512
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\SketchUpPrerequisites\Windows6.1-KB2999226-x64.msuFilesize
1010KB
MD5ad7f5c851f6387e424ab206effb21354
SHA154050a5f8ae7f0c56e553f0090146c17a1d2bf8d
SHA25643234d2986ca9b0de75d5183977964d161a8395c3396279ddfc9b20698e5bc34
SHA5123ab0a5eb48c7e5aec55640171acec4e3449dd5e5e90345a39c214be16858d5e66892b01fb4a792405c9fcef9a6286c85e5411c79d38d49930d9edfa40e535093
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\SketchUpPrerequisites\Windows8-RT-KB2999226-x64.msuFilesize
1.3MB
MD5c511bb7f1b2c0e20860a7e653035a43c
SHA1b5943b2700b56f5f8dc307a9e237f23fca5d8b70
SHA25650cae25da33fa950222d1a803e42567291eb7feb087fa119b1c97fe9d41cd9f8
SHA512832188ee8a9f98ab349e0dc078a91f995774470bfb5b33fa2b782bd02a1cc14f91a7546f889192cf0b0270521c22791581b17ae973569c69b81a0ac481089ec6
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\SketchUpPrerequisites\Windows8.1-KB2999226-x64.msuFilesize
981KB
MD5d0728878f9c6799046b43aeece4f3aca
SHA13acbf3890fc9c8a6f3d2155ecf106028e5f55164
SHA2569f707096c7d279ed4bc2a40ba695efac69c20406e0ca97e2b3e08443c6381d15
SHA512e5cecaca86779a281bf5c396d7fa3a5f322bc6423e2250d617a6fab229e86d2c9d3b784c1fa3fa2be5513fcd3ba87695b3934d13802ee15cabae62f84c2c3668
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\presetup.exeFilesize
194KB
MD56cac29c3afa703aacf7979f03a802c9d
SHA1a0abce2c47745fbb31ecaae877c01742e43bdb7d
SHA256686a053fe67f24f60e7aee0daf12e5fe6fc399797c0966fe55c1d8d4b45bed8e
SHA512241c3b20b84b746d441820a79f3aacb62e93a66c380deaa6d15c1f9a3b5eaad49e4b8b07961a0701310a2d7ab636c02d9b513af570d09b07ce940d8a005e3e18
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\setup.exeFilesize
707KB
MD59d727bb20404e81a6f9cefc1e0ab6331
SHA185395639268c90efb9398af8d18000cfd4f4cab4
SHA25602d07c75acec11fccd2dcfb33725c562662cde6ca703ca0ae6d781c4827c2aec
SHA512e5a212fdfc34f4763915a226b6abafda03f6fbf763a55cfd1344337ad7a7e7bd5e62efd98e356783becfd5a6024c39bcc2c401e556424bcbc06cfbd22599edbe
-
C:\Users\Admin\AppData\Local\Temp\7zS52B4.tmp\vcredist_x64\vcredist_x64.exeFilesize
14.6MB
MD545b47f4214ddc9f4782363a38504c9d2
SHA110b1683ea3ff5f36f225769244bf7e7813d54ad0
SHA256da66717784c192f1004e856bbcf7b3e13b7bf3ea45932c48e4c9b9a50ca80965
SHA512c87955c5542e39fbb44c6edf9ea0c6671693e7cd93b2bbb3988bd51c4e0bfc4c46fbd968ba9bc6327b21f2e52dd1dfe8d0d077aa27a8619bcf61edc3f58b246a
-
C:\Users\Admin\AppData\Local\Temp\SketchUpLog-2024-05-03-17_14_47.logFilesize
2KB
MD50fa6860d48e6b9c99fe33d3f9c5d1bbd
SHA10e1f4164ca6cbb747667f260ed190bc18504a841
SHA256d54daebf64f35030843ffc17f8a4cedf206d4a2015f5c7edc25f22bd3637bcac
SHA5129573b7939541e8798fbfc18390c2359bf1ea2dedd8cb26e94efb75adaa1e076803b5bf65c499a871acb898a41a42dcdb3af8fb1185c6407f3475335fbd25d139
-
C:\Users\Admin\AppData\Local\Temp\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\.ba1\logo.pngFilesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
C:\Users\Admin\AppData\Local\Temp\{d992c12e-cab2-426f-bde3-fb8c53950b0d}\.ba1\wixstdba.dllFilesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
C:\Windows\Installer\MSI8AA8.tmpFilesize
518KB
MD5861c335fc3604ac3c09d5ebadcf5b41c
SHA15c373548d942bfbf29751e09af5633a9c0caa8ba
SHA256710fcdf539a35bfa9ac50b374b34118dde24ff84ac48c710a2ff8c042f88eb91
SHA512d0c0f659f545e8b814ab5b27b8c741b26d1070e488f39027f7eb2d19a6636bed540289e164f71ff7c6c9ab1b498fe184711789cad03dc4369d1f649c855752ed
-
\??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2Filesize
24.6MB
MD5a423a283a41d1bfab6632f5503beb27b
SHA1747168d3771fb88022a4cc620420f0dbb11c9829
SHA25608eee2b9486886cff5cb44391162b5e04c234e9c502df322380aac61f57bc2fc
SHA512c31514484660cbfa614166e210bcc9826bce20bbb806c6053d22d8a19200b0bd8223ea7198eeff0ad48881b35c79cfbefa41dea2bd741c8919b1a8720165f132
-
\??\Volume{98b71625-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1d0616df-28ef-40b7-89e4-3b422c3f8edb}_OnDiskSnapshotPropFilesize
6KB
MD59fe0fb11e46e2c3de94d65ebf68bd4ed
SHA154e06bdb2473296d08a46f5d34033b0072df1a92
SHA256eadc2fc5ca30d7c6b663d82f3ef02a405599b1ca7c9b73628a31c738280dec09
SHA5123f49c56a07bf388c9c937c2844d8d3e0bb095686aea70db8f6964049dd347e3bb0122e1b8fe993543e69b5f6c270fafe2ec28f61f45d8e4e8218e4b5f9817aac
-
memory/3528-3351-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3328-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3360-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3361-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3359-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3358-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3356-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3355-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3354-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3353-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3352-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3362-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3350-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3349-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3348-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3347-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3346-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3345-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3344-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3343-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3342-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3341-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3340-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3337-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3336-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3335-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3333-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3332-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3331-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3330-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3329-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3309-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3327-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3326-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3325-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3324-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3323-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3322-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3321-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3320-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3319-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3318-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3317-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3316-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3315-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3314-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3291-0x00007FF63B740000-0x00007FF63CBD7000-memory.dmpFilesize
20.6MB
-
memory/3528-3310-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3304-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3308-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3307-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3305-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3299-0x0000000075720000-0x00000000766B6000-memory.dmpFilesize
15.6MB
-
memory/3528-3292-0x00007FF63B740000-0x00007FF63CBD7000-memory.dmpFilesize
20.6MB
-
memory/3528-3357-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3339-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3338-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3334-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3313-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3312-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3311-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3306-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3303-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB
-
memory/3528-3302-0x00000000766C0000-0x000000007681F000-memory.dmpFilesize
1.4MB