Analysis
-
max time kernel
592s -
max time network
618s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
ViviSetup.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ViviSetup.exe
Resource
win10v2004-20220812-en
General
-
Target
ViviSetup.exe
-
Size
113.1MB
-
MD5
913b1ade3be9997e30b3dfeab8f733c4
-
SHA1
c5046c370170b2b565f1341e192a7406238fb949
-
SHA256
6baa99b3494c8c8f8f0d2a76be07a4d602e81e412b8ecc5dfa49564a7bb30eda
-
SHA512
6e5d7700b5329dd7c963dfd31ec56fd78bf7c04136023455b751294affe9e2dea42edbcbe22e1024dea8420570b22331955cd1332a707d461a01f49f7218d477
-
SSDEEP
3145728:RifO83mHhj4NXbxNndXjNLYymIRJDe0/3rF:1AmB8NrrndJuEJDe0PrF
Malware Config
Extracted
C:\Program Files\Vivi Corporation\Vivi\LICENSES.chromium.html
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
[email protected])"
[email protected])"
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
"[email protected]"
<[email protected]>
https://www.apache.org/licenses/
https://www.apache.org/licenses/LICENSE-2.0
http://www.apache.org/licenses/
http://www.apache.org/licenses/LICENSE-2.0
http://code.google.com/p/y2038
http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2
http://mozilla.org/MPL/2.0/
http://www.torchmobile.com/
https://cla.developers.google.com/clas
http://www.openssl.org/)"
https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS
http://www.opensource.apple.com/apsl/
https://github.com/typetools/jdk
https://github.com/typetools/stubparser
https://github.com/typetools/annotation-tools
https://github.com/plume-lib/
http://www.mozilla.org/MPL/
http://source.android.com/
http://source.android.com/compatibility
http://www.apple.com/legal/guidelinesfor3rdparties.html
https://github.com/easylist
https://easylist.to/)"
https://creativecommons.org/compatiblelicenses
https://creativecommons.org/
http://developer.intel.com/vtune/cbts/strmsimd/922down.htm
http://skal.planet-d.net/coding/dct.html
http://developer.intel.com/vtune/cbts/strmsimd/appnotes.htm
http://www.elecard.com/peter/idct.html
http://www.linuxvideo.org/mpeg2dec/
http://www.opensource.org/licenses/bsd-license.php
https://www.freetype.org
http://www.mozilla.org/MPL/2.0/
http://www.mozilla.org/MPL/2.0/FAQ.html
http://freetype.sourceforge.net/license.html
http://www.freetype.org
http://source.icu-project.org/repos/icu/icu/trunk/license.html
http://icu-project.org/userguide/icufaq.html
http://www.unicode.org/copyright.html
http://www.unicode.org/Public/
http://www.unicode.org/reports/
http://www.unicode.org/cldr/data/
http://jquery.com/
https://github.com/jquery/jquery/blob/master/MIT-LICENSE.txt
https://github.com/jquery/sizzle/blob/master/LICENSE
http://ctrio.sourceforge.net/
http://www.cisl.ucar.edu/css/software/fftpack5/ftpk.html
http://www.opensource.org/licenses/mit-license.php
http://www.tex-tipografia.com/spanish_hyphen.html
https://opensource.org/licenses/BSD-3-Clause
https://www.unicode.org/copyright.html
http://opensource.org/licenses/bsd-license.php
https://sourceforge.net/project/?group_id=1519
http://chasen.aist-nara.ac.jp/chasen/distribution.html
http://casper.beckman.uiuc.edu/~c-tsai4
https://github.com/rober42539/lao-dictionary
https://github.com/rober42539/lao-dictionary/laodict.txt
https://github.com/rober42539/lao-dictionary/LICENSE.txt
http://oss.sgi.com/projects/FreeB/
https://www.khronos.org/registry/
https://llvm.org/docs/DeveloperPolicy.html#legacy
http://llvm.org
http://www.unicode.org/Public/zipped/9.0.0/UCD.zip
https://github.com/chjj/
http://daringfireball.net/
http://modp.com/release/base64
http://sourceware.org/newlib/docs.html
http://sourceware.org/ml/newlib/
https://datatracker.ietf.org/ipr/1524/
https://datatracker.ietf.org/ipr/1914/
https://datatracker.ietf.org/ipr/1526/
http://code.google.com/p/lao-dictionary/
http://lao-dictionary.googlecode.com/git/Lao-Dictionary.txt
http://lao-dictionary.googlecode.com/git/Lao-Dictionary-LICENSE.txt
https://creativecommons.org/licenses/by/3.0/
https://sites.google.com/site/gaviotachessengine/Home/endgame-tablebases-1
http://www.ploscompbiol.org/static/license
http://www.gutenberg.org/ebooks/53
http://www.suitable.com
http://www.nongnu.org/freebangfont/downloads.html#mukti
https://dejavu-fonts.github.io/Download.html">homepage</a></span>
http://scripts.sil.org/OFL
https://code.google.com/p/sctp-refimpl/source/browse/trunk/COPYRIGHT
http://cgit.freedesktop.org/xorg/xserver/tree/COPYING
http://src.chromium.org/viewvc/chrome/trunk/deps/third_party/xz/COPYING
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\UMDF\ViviDisplayDriver1_2.dll DrvInst.exe File opened for modification C:\Windows\System32\drivers\vhusb3hc.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\UMDF\SET2F6E.tmp DrvInst.exe File created C:\Windows\System32\drivers\UMDF\SET2F6E.tmp DrvInst.exe -
Executes dropped EXE 13 IoCs
pid Process 4524 MSI442A.tmp 1584 MSI49D9.tmp 4848 MSI4B41.tmp 3212 ViviDisplaySetup64.exe 1320 viviusb64.exe 4196 viviusb64.exe 3060 viviusb64.exe 3480 Vivi.exe 4548 Vivi.exe 1720 Vivi.exe 4620 Vivi.exe 224 Vivi.exe 1848 Vivi.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 5092 netsh.exe -
resource yara_rule behavioral2/memory/1320-211-0x0000000140000000-0x000000014153D000-memory.dmp upx behavioral2/memory/1320-215-0x0000000140000000-0x000000014153D000-memory.dmp upx behavioral2/memory/4196-217-0x0000000140000000-0x000000014153D000-memory.dmp upx behavioral2/memory/3060-218-0x0000000140000000-0x000000014153D000-memory.dmp upx behavioral2/memory/4196-219-0x0000000140000000-0x000000014153D000-memory.dmp upx behavioral2/memory/3060-220-0x0000000140000000-0x000000014153D000-memory.dmp upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation MSI442A.tmp Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation MSI49D9.tmp Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation MSI4B41.tmp Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Vivi.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Vivi.exe -
Loads dropped DLL 64 IoCs
pid Process 760 ViviSetup.exe 760 ViviSetup.exe 1796 MsiExec.exe 1796 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 3124 MsiExec.exe 3124 MsiExec.exe 3124 MsiExec.exe 3124 MsiExec.exe 3124 MsiExec.exe 3124 MsiExec.exe 760 ViviSetup.exe 5020 MsiExec.exe 5020 MsiExec.exe 5020 MsiExec.exe 3480 Vivi.exe 5020 MsiExec.exe 4548 Vivi.exe 1720 Vivi.exe 4548 Vivi.exe 4548 Vivi.exe 4548 Vivi.exe 4620 Vivi.exe 224 Vivi.exe 224 Vivi.exe 224 Vivi.exe 224 Vivi.exe 1848 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe 4620 Vivi.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run Vivi.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\electron.app.Vivi = "C:\\Program Files\\Vivi Corporation\\Vivi\\Vivi.exe --was-opened-at-login" Vivi.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: ViviSetup.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: ViviSetup.exe File opened (read-only) \??\M: ViviSetup.exe File opened (read-only) \??\R: ViviSetup.exe File opened (read-only) \??\U: ViviSetup.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: ViviSetup.exe File opened (read-only) \??\Z: ViviSetup.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: ViviSetup.exe File opened (read-only) \??\G: ViviSetup.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: ViviSetup.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\H: ViviSetup.exe File opened (read-only) \??\I: ViviSetup.exe File opened (read-only) \??\S: ViviSetup.exe File opened (read-only) \??\X: ViviSetup.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\F: ViviSetup.exe File opened (read-only) \??\J: ViviSetup.exe File opened (read-only) \??\W: ViviSetup.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: ViviSetup.exe File opened (read-only) \??\V: ViviSetup.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: ViviSetup.exe File opened (read-only) \??\N: ViviSetup.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Drops file in System32 directory 37 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\FileRepository\vhusb3hc.inf_amd64_b04a55889f4a7423\vhusb3hc.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\SETCE14.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\ViviDisplay.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET3809.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\vhusb3hc.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vividisplay.inf_amd64_10a5fb5d92739d28\amd64\ViviDisplayDriver1_2.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET3809.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\vhusb3hc.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET381A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\SETCE26.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\ViviDisplayDriver1_2.dll DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vividisplay.inf_amd64_10a5fb5d92739d28\amd64\ViviDisplayDriver1_0.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET382A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\SETCE25.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\ViviDisplay.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vividisplay.inf_amd64_10a5fb5d92739d28\ViviDisplay.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\vhusb3hc.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\SETCE14.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\SETCE25.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\SETCE27.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vividisplay.inf_amd64_10a5fb5d92739d28\ViviDisplay.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET382A.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\vvu4A2A.tmp viviusb64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\SETCE26.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a}\SET381A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\ViviDisplayDriver1_0.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vhusb3hc.inf_amd64_b04a55889f4a7423\vhusb3hc.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{addd4833-5a2b-5d4e-8738-b7b92dcfd11a} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64\SETCE27.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{67955849-0594-5241-8dba-439355240cfa}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vhusb3hc.inf_amd64_b04a55889f4a7423\vhusb3hc.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vhusb3hc.inf_amd64_b04a55889f4a7423\vhusb3hc.inf DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\broadcast.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\libgcc_s_sjlj-1.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\node_modules\usb\prebuilds\win32-ia32\node.napi.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\ar.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\extend\amd64\ViviDisplayDriver1_0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\extend\amd64\ViviDisplayDriver1_2.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\sw.pak msiexec.exe File opened for modification C:\Program Files\Vivi Corporation\Vivi\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\nb.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\ffi-7.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\pixman-1-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\z-1.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\ffmpeg.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\LICENSES.chromium.html msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\he.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\sk.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\extend.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\harfbuzz.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\libEGL.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\bg.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\kn.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gsttag-1.0-0.dll msiexec.exe File opened for modification C:\Program Files\Vivi Corporation\Vivi\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\en-US.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\ro.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gstaudio-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\node_modules\@abandonware\noble\build\Release\noble.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\ml.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\chrome_200_percent.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\robot.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\mr.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gstvideo-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\pango-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\streamer.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\am.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\hi.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\lv.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gdk_pixbuf-2.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\nl.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\pl.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\v8_context_snapshot.bin msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gstpbutils-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gstrtp-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\libpng16-16.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\Vivi.exe msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\ta.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gstnet-1.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\snapshot_blob.bin msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\fi.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\extend\ViviDisplaySetup64.exe msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\gmodule-2.0-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\icudtl.dat msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\da.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\et.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\ko.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\fribidi-0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\util.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\node_modules\@abandonware\bluetooth-hci-socket\lib\binding\bluetooth_hci_socket.node msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\id.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\tr.pak msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\extend\x86\ViviDisplayDriver1_0.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\extend\ViviDisplaySetup32.exe msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\resources\app.asar.unpacked\build\Release\librsvg-2-2.dll msiexec.exe File created C:\Program Files\Vivi Corporation\Vivi\locales\cs.pak msiexec.exe -
Drops file in Windows directory 31 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSIE71F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{D26B5D86-EEF5-417D-A1C8-012A72C62C40} msiexec.exe File opened for modification C:\Windows\Installer\{D26B5D86-EEF5-417D-A1C8-012A72C62C40}\icon.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\e58e683.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE81A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE906.tmp msiexec.exe File created C:\Windows\Installer\e58e685.msi msiexec.exe File created C:\Windows\INF\c_display.PNF ViviDisplaySetup64.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI413B.tmp msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log pnputil.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI442A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4B41.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE898.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI49D9.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log ViviDisplaySetup64.exe File created C:\Windows\Installer\e58e683.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIE9B3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEA22.tmp msiexec.exe File created C:\Windows\Installer\{D26B5D86-EEF5-417D-A1C8-012A72C62C40}\icon.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs ViviDisplaySetup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID ViviDisplaySetup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom ViviDisplaySetup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs ViviDisplaySetup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom ViviDisplaySetup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs pnputil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 ViviDisplaySetup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom pnputil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID pnputil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 pnputil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 ViviDisplaySetup64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom pnputil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom pnputil.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 pnputil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID ViviDisplaySetup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ViviDisplaySetup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom ViviDisplaySetup64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 pnputil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" viviusb64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" viviusb64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" viviusb64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\ProductIcon = "C:\\Windows\\Installer\\{D26B5D86-EEF5-417D-A1C8-012A72C62C40}\\icon.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2629973501-4017243118-3254762364-1000\{77F3A91D-3D59-4E99-9EF5-FA043A475DFB} Vivi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\shell msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\vivi\shell\open msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\vivi\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\24A02147101AFB741AB52686001D5225 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\68D5B62D5FEED7141A8C10A2276CC204\A918597FE054CCCB65ABDBA0AD8F63C msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\PackageName = "ViviSetup.x64.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\URL Protocol msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\shell\open\command\ = "C:\\Program Files\\Vivi Corporation\\Vivi\\Vivi.exe %1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\Vivi Corporation\\Vivi 3.3.2\\install\\2C62C40\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\ProductName = "Vivi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\68D5B62D5FEED7141A8C10A2276CC204\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\PackageCode = "1984F8A087F69A44BBE4394BA2A2ED1E" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\24A02147101AFB741AB52686001D5225\68D5B62D5FEED7141A8C10A2276CC204 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\vivi msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vivi msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\Vivi Corporation\\Vivi 3.3.2\\install\\2C62C40\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\68D5B62D5FEED7141A8C10A2276CC204\Version = "50528258" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vivi\ = "URL:Vivi Protocol" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\vivi\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\68D5B62D5FEED7141A8C10A2276CC204 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 MsiExec.exe 5020 MsiExec.exe 4356 msiexec.exe 4356 msiexec.exe 4072 powershell.exe 4072 powershell.exe 3092 powershell.exe 3092 powershell.exe 1908 powershell.exe 1908 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid 4 4 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4356 msiexec.exe Token: SeCreateTokenPrivilege 760 ViviSetup.exe Token: SeAssignPrimaryTokenPrivilege 760 ViviSetup.exe Token: SeLockMemoryPrivilege 760 ViviSetup.exe Token: SeIncreaseQuotaPrivilege 760 ViviSetup.exe Token: SeMachineAccountPrivilege 760 ViviSetup.exe Token: SeTcbPrivilege 760 ViviSetup.exe Token: SeSecurityPrivilege 760 ViviSetup.exe Token: SeTakeOwnershipPrivilege 760 ViviSetup.exe Token: SeLoadDriverPrivilege 760 ViviSetup.exe Token: SeSystemProfilePrivilege 760 ViviSetup.exe Token: SeSystemtimePrivilege 760 ViviSetup.exe Token: SeProfSingleProcessPrivilege 760 ViviSetup.exe Token: SeIncBasePriorityPrivilege 760 ViviSetup.exe Token: SeCreatePagefilePrivilege 760 ViviSetup.exe Token: SeCreatePermanentPrivilege 760 ViviSetup.exe Token: SeBackupPrivilege 760 ViviSetup.exe Token: SeRestorePrivilege 760 ViviSetup.exe Token: SeShutdownPrivilege 760 ViviSetup.exe Token: SeDebugPrivilege 760 ViviSetup.exe Token: SeAuditPrivilege 760 ViviSetup.exe Token: SeSystemEnvironmentPrivilege 760 ViviSetup.exe Token: SeChangeNotifyPrivilege 760 ViviSetup.exe Token: SeRemoteShutdownPrivilege 760 ViviSetup.exe Token: SeUndockPrivilege 760 ViviSetup.exe Token: SeSyncAgentPrivilege 760 ViviSetup.exe Token: SeEnableDelegationPrivilege 760 ViviSetup.exe Token: SeManageVolumePrivilege 760 ViviSetup.exe Token: SeImpersonatePrivilege 760 ViviSetup.exe Token: SeCreateGlobalPrivilege 760 ViviSetup.exe Token: SeCreateTokenPrivilege 760 ViviSetup.exe Token: SeAssignPrimaryTokenPrivilege 760 ViviSetup.exe Token: SeLockMemoryPrivilege 760 ViviSetup.exe Token: SeIncreaseQuotaPrivilege 760 ViviSetup.exe Token: SeMachineAccountPrivilege 760 ViviSetup.exe Token: SeTcbPrivilege 760 ViviSetup.exe Token: SeSecurityPrivilege 760 ViviSetup.exe Token: SeTakeOwnershipPrivilege 760 ViviSetup.exe Token: SeLoadDriverPrivilege 760 ViviSetup.exe Token: SeSystemProfilePrivilege 760 ViviSetup.exe Token: SeSystemtimePrivilege 760 ViviSetup.exe Token: SeProfSingleProcessPrivilege 760 ViviSetup.exe Token: SeIncBasePriorityPrivilege 760 ViviSetup.exe Token: SeCreatePagefilePrivilege 760 ViviSetup.exe Token: SeCreatePermanentPrivilege 760 ViviSetup.exe Token: SeBackupPrivilege 760 ViviSetup.exe Token: SeRestorePrivilege 760 ViviSetup.exe Token: SeShutdownPrivilege 760 ViviSetup.exe Token: SeDebugPrivilege 760 ViviSetup.exe Token: SeAuditPrivilege 760 ViviSetup.exe Token: SeSystemEnvironmentPrivilege 760 ViviSetup.exe Token: SeChangeNotifyPrivilege 760 ViviSetup.exe Token: SeRemoteShutdownPrivilege 760 ViviSetup.exe Token: SeUndockPrivilege 760 ViviSetup.exe Token: SeSyncAgentPrivilege 760 ViviSetup.exe Token: SeEnableDelegationPrivilege 760 ViviSetup.exe Token: SeManageVolumePrivilege 760 ViviSetup.exe Token: SeImpersonatePrivilege 760 ViviSetup.exe Token: SeCreateGlobalPrivilege 760 ViviSetup.exe Token: SeCreateTokenPrivilege 760 ViviSetup.exe Token: SeAssignPrimaryTokenPrivilege 760 ViviSetup.exe Token: SeLockMemoryPrivilege 760 ViviSetup.exe Token: SeIncreaseQuotaPrivilege 760 ViviSetup.exe Token: SeMachineAccountPrivilege 760 ViviSetup.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 760 ViviSetup.exe 3044 msiexec.exe 3044 msiexec.exe 3480 Vivi.exe 3480 Vivi.exe 3480 Vivi.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3480 Vivi.exe 3480 Vivi.exe 3480 Vivi.exe 3480 Vivi.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1320 viviusb64.exe 1320 viviusb64.exe 4196 viviusb64.exe 4196 viviusb64.exe 3060 viviusb64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 1796 4356 msiexec.exe 87 PID 4356 wrote to memory of 1796 4356 msiexec.exe 87 PID 4356 wrote to memory of 1796 4356 msiexec.exe 87 PID 760 wrote to memory of 3044 760 ViviSetup.exe 88 PID 760 wrote to memory of 3044 760 ViviSetup.exe 88 PID 760 wrote to memory of 3044 760 ViviSetup.exe 88 PID 4356 wrote to memory of 5020 4356 msiexec.exe 89 PID 4356 wrote to memory of 5020 4356 msiexec.exe 89 PID 4356 wrote to memory of 5020 4356 msiexec.exe 89 PID 4356 wrote to memory of 4536 4356 msiexec.exe 99 PID 4356 wrote to memory of 4536 4356 msiexec.exe 99 PID 4356 wrote to memory of 3124 4356 msiexec.exe 101 PID 4356 wrote to memory of 3124 4356 msiexec.exe 101 PID 4356 wrote to memory of 3124 4356 msiexec.exe 101 PID 4356 wrote to memory of 4524 4356 msiexec.exe 102 PID 4356 wrote to memory of 4524 4356 msiexec.exe 102 PID 4356 wrote to memory of 4524 4356 msiexec.exe 102 PID 4524 wrote to memory of 5092 4524 MSI442A.tmp 103 PID 4524 wrote to memory of 5092 4524 MSI442A.tmp 103 PID 4524 wrote to memory of 5092 4524 MSI442A.tmp 103 PID 4356 wrote to memory of 1584 4356 msiexec.exe 105 PID 4356 wrote to memory of 1584 4356 msiexec.exe 105 PID 4356 wrote to memory of 1584 4356 msiexec.exe 105 PID 1584 wrote to memory of 2036 1584 MSI49D9.tmp 106 PID 1584 wrote to memory of 2036 1584 MSI49D9.tmp 106 PID 1584 wrote to memory of 2036 1584 MSI49D9.tmp 106 PID 4356 wrote to memory of 4848 4356 msiexec.exe 108 PID 4356 wrote to memory of 4848 4356 msiexec.exe 108 PID 4356 wrote to memory of 4848 4356 msiexec.exe 108 PID 4848 wrote to memory of 3836 4848 MSI4B41.tmp 109 PID 4848 wrote to memory of 3836 4848 MSI4B41.tmp 109 PID 4848 wrote to memory of 3836 4848 MSI4B41.tmp 109 PID 4356 wrote to memory of 3212 4356 msiexec.exe 111 PID 4356 wrote to memory of 3212 4356 msiexec.exe 111 PID 3828 wrote to memory of 3480 3828 svchost.exe 114 PID 3828 wrote to memory of 3480 3828 svchost.exe 114 PID 3828 wrote to memory of 1736 3828 svchost.exe 115 PID 3828 wrote to memory of 1736 3828 svchost.exe 115 PID 4356 wrote to memory of 1320 4356 msiexec.exe 117 PID 4356 wrote to memory of 1320 4356 msiexec.exe 117 PID 1320 wrote to memory of 1000 1320 viviusb64.exe 118 PID 1320 wrote to memory of 1000 1320 viviusb64.exe 118 PID 3828 wrote to memory of 968 3828 svchost.exe 120 PID 3828 wrote to memory of 968 3828 svchost.exe 120 PID 3828 wrote to memory of 2688 3828 svchost.exe 121 PID 3828 wrote to memory of 2688 3828 svchost.exe 121 PID 4356 wrote to memory of 4196 4356 msiexec.exe 122 PID 4356 wrote to memory of 4196 4356 msiexec.exe 122 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131 PID 3480 wrote to memory of 4548 3480 Vivi.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\ViviSetup.exe"C:\Users\Admin\AppData\Local\Temp\ViviSetup.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\ViviSetup.x64.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\ViviSetup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1664590968 "2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3044
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DA49A7BF8EAAF01754F74C5500A985EF C2⤵
- Loads dropped DLL
PID:1796
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 18109D829CBFC8991CB32048B18D933B C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4536
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E3BFA0A55DCB463801CD0927960948862⤵
- Loads dropped DLL
PID:3124
-
-
C:\Windows\Installer\MSI442A.tmp"C:\Windows\Installer\MSI442A.tmp" /RunAsAdmin /HideWindow C:\Windows\System32\netsh.exe advfirewall firewall add rule name="Vivi" program="C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" enable=yes dir=in action=allow2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Vivi" program="C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" enable=yes dir=in action=allow3⤵
- Modifies Windows Firewall
PID:5092
-
-
-
C:\Windows\Installer\MSI49D9.tmp"C:\Windows\Installer\MSI49D9.tmp" /RunAsAdmin /HideWindow C:\Windows\System32\certutil.exe -f -delstore root b031f460609536ff63d97d0f2a0a56857c83cbdd2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\System32\certutil.exe" -f -delstore root b031f460609536ff63d97d0f2a0a56857c83cbdd3⤵PID:2036
-
-
-
C:\Windows\Installer\MSI4B41.tmp"C:\Windows\Installer\MSI4B41.tmp" /RunAsAdmin /HideWindow C:\Windows\System32\certutil.exe -f -delstore root baca91c082eebcd0f90e96313fbf2ae55802557d2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\System32\certutil.exe" -f -delstore root baca91c082eebcd0f90e96313fbf2ae55802557d3⤵PID:3836
-
-
-
C:\Program Files\Vivi Corporation\Vivi\extend\ViviDisplaySetup64.exe"C:\Program Files\Vivi Corporation\Vivi\extend\ViviDisplaySetup64.exe" install2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3212
-
-
C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe"C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe" --install-drivers2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\System32\pnputil.exe"C:\Windows\System32\pnputil.exe" -a "C:\Users\Admin\AppData\Local\Temp\vhusb3hc.inf" -i3⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1000
-
-
-
C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe"C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe" --install-service-na --redirect=NUL2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4196
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0a5ef606-8be9-cf43-8f82-206c37f58f44}\ViviDisplay.inf" "9" "410b4358f" "0000000000000150" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\Vivi Corporation\Vivi\extend"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3480
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "1" "ROOT\DISPLAY\0000" "C:\Windows\System32\DriverStore\FileRepository\vividisplay.inf_amd64_10a5fb5d92739d28\vividisplay.inf" "oem2.inf:*:*:1.1.236.96:Root\VID_VIVI_VIRTUAL_DISPLAY_0001," "410b4358f" "0000000000000150"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1736
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{fed58055-234a-ff40-ba52-3d3f4f440273}\vhusb3hc.inf" "9" "46d584de7" "0000000000000164" "WinSta0\Default" "0000000000000174" "208" "C:\Users\Admin\AppData\Local\Temp"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:968
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "1" "ROOT\USB\0000" "C:\Windows\System32\DriverStore\FileRepository\vhusb3hc.inf_amd64_b04a55889f4a7423\vhusb3hc.inf" "oem3.inf:*:*:23.34.20.754:ROOT\VHUSB3HC," "46d584de7" "0000000000000164"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2688
-
-
C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe"C:\Program Files\Vivi Corporation\Vivi\usb\viviusb64.exe" -n -e1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3060
-
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Vivi" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1552 --field-trial-handle=1728,i,2399082794489994486,7391059767691710294,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4548
-
-
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\Vivi" --mojo-platform-channel-handle=2072 --field-trial-handle=1728,i,2399082794489994486,7391059767691710294,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720
-
-
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\Vivi" --app-user-model-id=electron.app.Vivi --app-path="C:\Program Files\Vivi Corporation\Vivi\resources\app.asar" --no-sandbox --no-zygote --touch-events=enabled --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --mojo-platform-channel-handle=1864 --field-trial-handle=1728,i,2399082794489994486,7391059767691710294,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
PID:4620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\windows\sysnative\reg QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid"3⤵PID:4192
-
C:\windows\system32\reg.exeC:\windows\sysnative\reg QUERY HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography /v MachineGuid4⤵PID:2836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Get-CimInstance -Class CIM_Processor | Select-Object -Property AddressWidth,MaxClockSpeed,Name,NumberOfCores | Format-List"3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Get-CimInstance -Class Win32_PhysicalMemoryArray | Select-Object -Property MaxCapacity | Format-List"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -c "Get-CimInstance -Class CIM_OperatingSystem | Select-Object -Property Caption,Organization,OSArchitecture,Version | Format-List"3⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "ver"3⤵PID:3112
-
-
-
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Vivi" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2356 --field-trial-handle=1728,i,2399082794489994486,7391059767691710294,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:224
-
-
C:\Program Files\Vivi Corporation\Vivi\Vivi.exe"C:\Program Files\Vivi Corporation\Vivi\Vivi.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\Vivi" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2592 --field-trial-handle=1728,i,2399082794489994486,7391059767691710294,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
929KB
MD57b28f3f2c070210ee4b1059a6fc6a3a4
SHA1a22cfe1e151e02dbfeb4ce532999e0f70f7ba7a5
SHA256c3151770c17340ee8e5281db2c3f7fc218733781dab474094a31ed046a923f3f
SHA51236ddcc74a254bdb922b9f130d21c83dcc8a1ab2324223a1eab9839b846c8d5abf1bad69498be396b0f6a9a04621e1e6562787144df38901140a6a9c3c89f0ae2
-
Filesize
929KB
MD57b28f3f2c070210ee4b1059a6fc6a3a4
SHA1a22cfe1e151e02dbfeb4ce532999e0f70f7ba7a5
SHA256c3151770c17340ee8e5281db2c3f7fc218733781dab474094a31ed046a923f3f
SHA51236ddcc74a254bdb922b9f130d21c83dcc8a1ab2324223a1eab9839b846c8d5abf1bad69498be396b0f6a9a04621e1e6562787144df38901140a6a9c3c89f0ae2
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
929KB
MD57b28f3f2c070210ee4b1059a6fc6a3a4
SHA1a22cfe1e151e02dbfeb4ce532999e0f70f7ba7a5
SHA256c3151770c17340ee8e5281db2c3f7fc218733781dab474094a31ed046a923f3f
SHA51236ddcc74a254bdb922b9f130d21c83dcc8a1ab2324223a1eab9839b846c8d5abf1bad69498be396b0f6a9a04621e1e6562787144df38901140a6a9c3c89f0ae2
-
Filesize
929KB
MD57b28f3f2c070210ee4b1059a6fc6a3a4
SHA1a22cfe1e151e02dbfeb4ce532999e0f70f7ba7a5
SHA256c3151770c17340ee8e5281db2c3f7fc218733781dab474094a31ed046a923f3f
SHA51236ddcc74a254bdb922b9f130d21c83dcc8a1ab2324223a1eab9839b846c8d5abf1bad69498be396b0f6a9a04621e1e6562787144df38901140a6a9c3c89f0ae2
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
122.5MB
MD5270115cb8571601ccff3b5eccecb066a
SHA1a831b89de23b57d220f103c0cab568ae9efd4f56
SHA256c5a0b0e07c06bfe803b88b734cfdbe7f3b69926eaab0b0e546ede801370db617
SHA5122d9997c69c0ab85a489f22fc76c7513cd138a87fdab1868acd9492019f72c7eb2851914ec425d54a0f1af956e9b931fe0584c63c567eee1617d5ad65b86ef175
-
Filesize
4.1MB
MD57110ace6bca530005253b57499cc237d
SHA1bfbe93e43843d970639928bde7d15fa02fba6fac
SHA256625ba209ffac90cb578f890245f36d4007fa161d630011c15b078650d2a5426c
SHA512c1d2b6e3cfba7a9b6b1ab078ccadee58cfb3c3e267afce075bd674d553930727c074f1f60d68c500350e3a9a551914776836ad861d33f8ecee8c2f5d43a5bae3
-
Filesize
3.5MB
MD52f2e363c9a9baa0a9626db374cc4e8a4
SHA117f405e81e5fce4c5a02ca049f7bd48b31674c8f
SHA2562630f4188bd2ea5451ca61d83869bf7068a4f0440401c949a9feb9fb476e15df
SHA512e668a5d1f5e6f821ebfa0913e201f0dfd8da2f96605701f8db18d14ea4fdeac73aeb9b4fe1f22eaeffcdd1c0f73a6701763727d5b09775666f82b678404e4924
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\ViviDisplaySetup32.exe
Filesize150KB
MD566ed99c775f95b6da38db150a52c5fe7
SHA1079d566595e2326056cebfcf9e8084d5369e6154
SHA2560494e8965126e8937e199ada453ac209dffec346770492a224900e9ceb47facb
SHA5127e346a31d04161b281a91c646263d387fe6a4a4da9f06cb0a396d03f4ca2e7f5f72532be0c09de7c86b9a75f85e97ec2c711ae6dfc8b909e2b33811c847b0fb5
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\ViviDisplaySetup64.exe
Filesize174KB
MD5493daf56a3043be90d465883b0c41086
SHA1542c56d99344c42e25758bd7e4b984da2ec1e4d6
SHA256f47bf1528f5f80df0f5cdaf4bd5bd0da622fb43fea1b6dc9faf222afc5f1fdda
SHA5122aef6a4d4f27b04fa90f7133003975f67fdbb271b9a0ad0d2300402bbd0cdaffefa37f5ca1207b8550de629d4e0e7f02b0fba3d61518774a6100197d0586ba43
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\amd64\ViviDisplayDriver1_0.dll
Filesize117KB
MD5947ce2b79459e22a185c9a796cf02fc4
SHA173f23d91aab6a1e49d4d7020abe727996c297cf7
SHA256e88028726bd247263a9a2976bd340455bc2a2bca18b36cbf71834e7aa8a0e506
SHA512e405f9cc51a5117d3dbf24cb7fd60da2f7d0db18078e7ec1837cb7d3a2ca46cc6f315d5154bbf8057a3e49eaa1ca522138c9d1a2b2d301516079265b0d477224
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\amd64\ViviDisplayDriver1_2.dll
Filesize117KB
MD5c0285d968d2a9d1acef1a0b4bd06a22c
SHA1946de4945a94d7ecb3bb3fa4a0cd4c8db61c88e6
SHA25655f6953c4c884bc0974762e798e7d6a306caf02193852673490ecb0936fd13d9
SHA512e8f260365121d952925f4d6e5e2002aef3665c4cea827b910335f441d62454075e4ead3a67120fd272dc393a5b944c8058ac5f3ccb7c99716730659825d34681
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\x86\ViviDisplayDriver1_0.dll
Filesize99KB
MD57916cb0a165eb16afb32710e4b3e510a
SHA1aa0001e9bd67ad5b7fef107c8c626f8aef04e110
SHA256b72c50ca18f7258aaf93fed6abea3ef2aa5379f36ac90c8952c1c127c75ccd48
SHA5120885db1cdbab2a7fd9231750eb8bb5f6711695cfef7940045dab28eb1aabf8529699f3a2a0dba899bd5680ce28b1159c19c88e9a29ccdd3ade312b58c2c92077
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\extend\x86\ViviDisplayDriver1_2.dll
Filesize99KB
MD5a2d455b16a69853523d1a08ebfacf455
SHA1116f83f6b12896ca6ab3723299b6541158b76e91
SHA25694852c7c9b106cffebde89bd5e65361e0fab219b727095d57fbe982f666d0e21
SHA512c2b150e954e30bcc7559b69979d85c04982083171474e4ea042cd5190c8ccc5ad06f56337a35d998fc8387d85eb2e5412f172a46781a961fb586b631cad983e3
-
Filesize
2.5MB
MD5d3ffc36ddd21357320e256314ba0bbed
SHA1b0aa24771ccea0ffec089cd7aa5a6a2f2203c1f0
SHA256226b591f952480fda136a0831800417339d5b5786d865278707fd57bc6e099da
SHA512bf193b2244f18521e8fc548308a64b3018d0838c0664a7620c3c55a100032af8399ad8ba7a6b9d301bd01ac3bb72c8f2d32f516d8296829dbd710fdff8823b1a
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\broadcast.node
Filesize4.2MB
MD5c81057a9c8f03db308aba08d137093af
SHA161679092dac1f1c50ff4b63159e30e2d8e235060
SHA256e8fd055bdaf3c2260b27aa7f0d8e3c62b8ec4008960d496cc7f1b9f16c0f0c9b
SHA512fe4345acefc1a2817dc6c019a27c75994d030c15fbcd2d9ed4eb8d73c43e682226b4263370269095e12ccc5ab79b4ae53ce5c7ea8fb8a2e2a90f6876bcf8a012
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\bz2.dll
Filesize52KB
MD5c9fc651b66aa706643b8b790b6c3ae54
SHA1c33747fa63cc59125fee55f86bf80c5bc5fc58c4
SHA25605fb0fe16c8e2a72c096b75aaff4af2f721f0483cf9a85243e2391ee997b756f
SHA5122f6abac3a3f7ee5d51b6ff2b8bd9e9f2941f8ef7cdd0b3ac67bee95b93a8169823e03f858cbb836e49c6fcb3c165f0ee53bae98d43d5ce1bd3a428cdc544c0a3
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\ffi-7.dll
Filesize23KB
MD5b27705bc1159480f7e0f98246e942cff
SHA14c5dee0a5e6b3b0be621123e2bdf4d38f5405250
SHA256c8590b4a1a6342e0d91db93df4d85031f16d98d6567679a4857f1bab9a55f10a
SHA512cfdcfae8bf2fd2bbae0a5d6aca1bccff5f1a0c2d20e05c41752d7defd71526dedb2b8c021da29cd44cba43540038909c86ce63e4868ccab5adb11491f647d204
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\fribidi-0.dll
Filesize112KB
MD50ba55cf64e6008dbda3a80f58691c49b
SHA1a96721263db2349276fd73e963cc02d9668b8afc
SHA256596c3826177f054343ddb4b102f2c4f9877cc3b819d40b9efa9def8464f4ac99
SHA51218826693f08965186b680636d5aaf0feb4ec7028a5a20c12837897c77bfc7126c6af859840d91da375c15c23742a8d5b9af664880b238eade3d3828268111640
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\gdk_pixbuf-2.0-0.dll
Filesize202KB
MD596bc7cccd5789ae31deced5a31d96555
SHA1481d3c5802403ba0d008d9da29795c2d0217dc6f
SHA256bd80e15d01fa6ea5a299e5539686c1b670b2e810db692daac1d064196706af26
SHA5126cf566860fc160570fd97b085c6a6ae7258bcdd31dab0fefd2be97ccee265c1f6780530891b8585bdaf933c385bcdddfa4fb59635cb7767dd6f56a730e719061
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\gio-2.0-0.dll
Filesize1.0MB
MD53e6a61d1cd9e5c32c302d2d97c4ade4e
SHA127c30d4fb5dfbac1874345abafefc8cb95df9251
SHA256a3b60dfb17cfb05306028460bfd16042f408b3aa2b3b1d5d8fa9b3c07ecbdbd9
SHA5128ce7094ae074f09ab87f4b6f678d172eef82b1ff60a2adbe7ace28f7f6bb17e472583682439189f5950427545053e68601c11e99dbdb5086e8cc8d45fab3537c
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\glib-2.0-0.dll
Filesize1.1MB
MD5ca5f881510a620107365ec57452d2043
SHA1579aa54652286d70b472709f31099d20e3f5f547
SHA256f0fcf084aa25f7e4cb171acaedb6226ecb9ba09326cb327714bb750af584a368
SHA512a7580c6f7ba1ba20fd119c4f619777bf8b83e591cf7522eb69e90fecdaee188d7dc3c6534d1a48e427066579bbaf2466c7cfa1cfc786c56298c45f8184a5ff6a
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\gmodule-2.0-0.dll
Filesize16KB
MD58428ec07e5b7bed384196c07355ed4bf
SHA130f764828941d0c6cf7efdf838e92ab43a149384
SHA256d42dde5765ffd90ee40324b3adc4a83e722dabfce60f52884e5f349e147da760
SHA51216a344ae72e7d545e52b7bf46008f5a956a5fb67906ca7891342e85b752f8dbefdfc9fe26bf0987e5a5b71280b606cacf2721c8ce9aa6017ebe19018626f1d09
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\gobject-2.0-0.dll
Filesize227KB
MD5d27acccfdb8736f037656738f49259ce
SHA1641a3bce6b5a54e158879326c9870ad4aae31327
SHA256d764a740269f96b06ca5d7cce3c2b0a5321ac79ec0a24cba20c471cffc9fefdc
SHA5125a2806debe451380664b9c3b65599759041d3085362bb75c70d8d02c196f152beb6a6e3b1d529a994004962525675ba20e8ad619bbd5c22c65c4859cc82b4d0e
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\build\Release\gstaudio-1.0-0.dll
Filesize406KB
MD5185362cfea8af82ea7b2e8db963acfe8
SHA1efae0d5cbde6cb7c5bb2d503ddad69f399ca9e6c
SHA256607ec3791c547199f205c3a3e185c18a6a4e03437cbc890ae6f54ffa0398e80b
SHA5124948443e2a227e21943626ebbbf3dd4c9fccf984d666ef65b8d78c717e21194c6c92952e85db3e2074c581535b058625947f692c1f37ef406cb468de8fbc89b4
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\node_modules\@abandonware\bluetooth-hci-socket\build\Release\bluetooth_hci_socket.node
Filesize412KB
MD51a9b739048e3a3a4bdd58f4ef0388abd
SHA170217170179a23198c8bc1c482b17eabe7a51f99
SHA256f2816f28899bd75e2882dc1b975026dc19f895f586671a90300fae62893d1117
SHA512e8dbef13e1b774b8949c281f89f4530f8de229ac1f10dfea3b182361e3f49e50b73638639af2222aa9db8d557c04c39084aba1f6889bf6e274c39f3486974f81
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\node_modules\@abandonware\bluetooth-hci-socket\lib\binding\bluetooth_hci_socket.node
Filesize412KB
MD51a9b739048e3a3a4bdd58f4ef0388abd
SHA170217170179a23198c8bc1c482b17eabe7a51f99
SHA256f2816f28899bd75e2882dc1b975026dc19f895f586671a90300fae62893d1117
SHA512e8dbef13e1b774b8949c281f89f4530f8de229ac1f10dfea3b182361e3f49e50b73638639af2222aa9db8d557c04c39084aba1f6889bf6e274c39f3486974f81
-
C:\Users\Admin\AppData\Roaming\Vivi Corporation\Vivi 3.3.2\install\2C62C40\resources\app.asar.unpacked\node_modules\noble-winrt\prebuilt\BLEServer.exe
Filesize431KB
MD585ee2865815e88f879384f76611e4184
SHA18ade2ce698a923fa8319efe9336c14ce50a25710
SHA256b930384becf0239a83b3a00853aae64c1354c26019ad131386823e403de326c7
SHA5120cf47c866e7f5d597e830f7f8253ad56a09fbefdea7f6ef04969a5da8903a8205dccfb5540356010b77bfd1f48da28c2ecbeb43922be1f353d725f272776640b
-
Filesize
206KB
MD540cea5eb829c3ba2e30ea635006cfeb2
SHA16710dfb83c99790ef0f5853c42a08ec09a2111ea
SHA2561d757c73a19dcc9c36578be99c50624f937aca3ff0cfa82bece6aadbc633f4a7
SHA512b7a003b14a2680696e7e9f178a345ebbafd7b4f818b8ce3eb681a13c2fb84c0bbb877158114c8c79de396533a2a491b9ee90d9fc434d0c3ff7ccaddbbeedfaa6
-
Filesize
206KB
MD540cea5eb829c3ba2e30ea635006cfeb2
SHA16710dfb83c99790ef0f5853c42a08ec09a2111ea
SHA2561d757c73a19dcc9c36578be99c50624f937aca3ff0cfa82bece6aadbc633f4a7
SHA512b7a003b14a2680696e7e9f178a345ebbafd7b4f818b8ce3eb681a13c2fb84c0bbb877158114c8c79de396533a2a491b9ee90d9fc434d0c3ff7ccaddbbeedfaa6
-
Filesize
206KB
MD540cea5eb829c3ba2e30ea635006cfeb2
SHA16710dfb83c99790ef0f5853c42a08ec09a2111ea
SHA2561d757c73a19dcc9c36578be99c50624f937aca3ff0cfa82bece6aadbc633f4a7
SHA512b7a003b14a2680696e7e9f178a345ebbafd7b4f818b8ce3eb681a13c2fb84c0bbb877158114c8c79de396533a2a491b9ee90d9fc434d0c3ff7ccaddbbeedfaa6
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
540KB
MD5dfc682d9f93d6dcd39524f1afcd0e00d
SHA1adb81b1077d14dbe76d9ececfc3e027303075705
SHA256f0f00100e20741444f8a6f5db8cc826515134622c3a82e4f53ba6237e97a8328
SHA51252f84956b480bd06914a3615b75ad198a3ce821b0dd88dd30443bf4ea3d406349c95a115c31cb879775bd716563473909d22a8ec34253eca1aa7009845430bc9
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
632KB
MD5db4e30e47be69408ccdebffc517764c1
SHA19ab0db45e9c84670fe8a3181bf38511e8776815f
SHA2563558203b78ee8ea16f1151cc7034ad9fd4850fce0f948aed4231b870ae51904a
SHA512a32ed4fec7e381605e8d0fc463bf65140d5dc7a499aced785b4ef644a5bae1a4dc693ba33be8be46b07ccd049fceef95136a8fd852219ff18293c19da5fed129
-
Filesize
23.0MB
MD5fc991045e9d680a32bb77889223966c3
SHA187ab6d60d133d6d8a72c2fb25a62696d0da7de69
SHA256b31dff1758fbc836837e9a4e1c4a36c847dd55c72ce3a9955a7cea3c1b34e3f9
SHA51292620c124c064ce4daabdba3a77e7ce1ee4b8e3c922f90727bd5c4f406e5c066d5e0d5ca3c2340f1b5064dace27bb1d5a83cea80a7d06ed2f4aeec8aa5e948d8
-
\??\Volume{06969d78-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{1084ca5a-0672-41a4-9f48-dd194f811900}_OnDiskSnapshotProp
Filesize5KB
MD51fb3ed9bf4536783d8aa78813f75d764
SHA16564f43e1a03a6c29efd439da2ab9810c2a70f16
SHA256949f2703802a34187c6cbacdd41332284c2264f8947a3501743fc13614a4f15a
SHA5126166fb25507297953a90bef0e27738a7ca7a5ba5d7f0d03a16ba8aa24e82e6317be000a7cb1a7ec29825a5dd17602c39d27bfed2c8ba860387ab01c2b67e4aef