Overview
overview
7Static
static
3Build/Build.exe
windows7-x64
1Build/Build.exe
windows10-2004-x64
install_all.bat
windows7-x64
7install_all.bat
windows10-2004-x64
7vcredist2005_x64.exe
windows7-x64
7vcredist2005_x64.exe
windows10-2004-x64
7vcredist2005_x86.exe
windows7-x64
7vcredist2005_x86.exe
windows10-2004-x64
7vcredist2008_x64.exe
windows7-x64
7vcredist2008_x64.exe
windows10-2004-x64
7vcredist2008_x86.exe
windows7-x64
7vcredist2008_x86.exe
windows10-2004-x64
7vcredist2010_x64.exe
windows7-x64
7vcredist2010_x64.exe
windows10-2004-x64
7vcredist2010_x86.exe
windows7-x64
7vcredist2010_x86.exe
windows10-2004-x64
7vcredist2012_x64.exe
windows7-x64
7vcredist2012_x64.exe
windows10-2004-x64
7vcredist2012_x86.exe
windows7-x64
7vcredist2012_x86.exe
windows10-2004-x64
7vcredist2013_x64.exe
windows7-x64
7vcredist2013_x64.exe
windows10-2004-x64
7vcredist2013_x86.exe
windows7-x64
7vcredist2013_x86.exe
windows10-2004-x64
7vcredist20...64.exe
windows7-x64
4vcredist20...64.exe
windows10-2004-x64
4vcredist20...86.exe
windows7-x64
4vcredist20...86.exe
windows10-2004-x64
4Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
Build/Build.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Build/Build.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
install_all.bat
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
install_all.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
vcredist2005_x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
vcredist2005_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
vcredist2005_x86.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
vcredist2005_x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
vcredist2008_x64.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
vcredist2008_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
vcredist2008_x86.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
vcredist2008_x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
vcredist2010_x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
vcredist2010_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
vcredist2010_x86.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
vcredist2010_x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
vcredist2012_x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
vcredist2012_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
vcredist2012_x86.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
vcredist2012_x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vcredist2013_x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
vcredist2013_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
vcredist2013_x86.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
vcredist2013_x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
vcredist2015_2017_2019_2022_x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
vcredist2015_2017_2019_2022_x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
vcredist2015_2017_2019_2022_x86.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
vcredist2015_2017_2019_2022_x86.exe
Resource
win10v2004-20240802-en
General
-
Target
install_all.bat
-
Size
1KB
-
MD5
eb55aae630088c91b88d2bfae4115ea0
-
SHA1
1495c69946edca474fe30c2b713aacb9f03bbf3a
-
SHA256
492ee4c16ac45a5483088583c9caa08252d3a1bb3922dbbec834d61673538f17
-
SHA512
48e4a3fa644b1859131cfec782641aaee9938c88f939ca0509df0f4120b922187753ce7cd7d912d2f90108526ba34d767baa28c9eeeb25d43fff77d38ddfd882
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
install.exeinstall.exeSetup.exeSetup.exepid process 1288 install.exe 1700 install.exe 1564 Setup.exe 2376 Setup.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeMsiExec.exemsiexec.exepid process 1856 MsiExec.exe 1628 MsiExec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
vcredist2012_x86.exevcredist2005_x86.exevcredist2005_x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f} = "\"C:\\ProgramData\\Package Cache\\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\\vcredist_x86.exe\" /burn.log.append \"C:\\Users\\Admin\\AppData\\Local\\Temp\\dd_vcredist_x86_20240828232858.log\" /passive /norestart ignored /burn.runonce" vcredist2012_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vcredist2005_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vcredist2005_x64.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in System32 directory 36 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\SysWOW64\mfc100enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100fra.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100jpn.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100kor.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcp100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100cht.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfcm100u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100enu.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100deu.dll msiexec.exe File opened for modification C:\Windows\system32\msvcr100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100cht.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100kor.dll msiexec.exe File opened for modification C:\Windows\system32\atl100.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\atl100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100ita.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100u.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100deu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100ita.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm100u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100chs.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\vcomp100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100u.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp100.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100chs.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100fra.dll msiexec.exe File opened for modification C:\Windows\system32\mfc100rus.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100esn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100jpn.dll msiexec.exe File opened for modification C:\Windows\SysWOW64\mfc100rus.dll msiexec.exe -
Drops file in Program Files directory 6 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia80.dll msiexec.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\VC\amd64\msdia80.dll msiexec.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe File created \??\c:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeDrvInst.exevcredist2012_x86.exeDrvInst.exeDrvInst.exedescription ioc process File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80CHT.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833010.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.manifest msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232849374.0 msiexec.exe File opened for modification \??\c:\Windows\Installer\f76c52b.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832869.0\mfc80u.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832869.0\mfcm80u.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833025.1\8.0.50727.6195.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232833041.0 msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849499.1\8.0.50727.6195.policy msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232849452.0 msiexec.exe File opened for modification C:\Windows\Installer\f76c51c.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832729.0\msvcr80.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832729.0\msvcp80.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80FRA.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833025.1\8.0.50727.6195.policy msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849452.0\mfc80ENU.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849452.0\mfc80JPN.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI3C3F.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833010.0\vcomp.dll msiexec.exe File opened for modification C:\Windows\Installer\f76c516.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849312.0\amd64_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_d6cffeda.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849405.0\mfc80u.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849452.0\amd64_Microsoft.VC80.MFCLOC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_9c659d69.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232849499.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832869.0\mfc80.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80ESP.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232832651.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849374.0\msvcp80.dll msiexec.exe File created \??\c:\Windows\Installer\f76c534.ipi msiexec.exe File created C:\Windows\Installer\f76c539.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832651.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.manifest msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833010.0\x86_Microsoft.VC80.OpenMP_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_452bf920.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232833025.1 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849374.0\msvcr80.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849499.0\8.0.50727.6195.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849515.0\8.0.50727.6195.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849452.0\mfc80DEU.dll msiexec.exe File opened for modification C:\Windows\WindowsUpdate.log vcredist2012_x86.exe File opened for modification C:\Windows\Installer\MSIC860.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\00004109110000000000000000F01FEC\14.0.4763\ul_ATL80.dll.97F81AF1_0E47_DC99_FF1F_C8B3B9A1E18E msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833025.0\8.0.50727.6195.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232833041.0\8.0.50727.6195.policy msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232833057.0 msiexec.exe File created C:\Windows\Installer\f76c519.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification \??\c:\Windows\Installer\f76c526.ipi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832651.0\x86_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_a4c618fa.cat msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\00004109110000000000000000F01FEC\14.0.4763\ul_ATL80.dll.97F81AF1_0E47_DC99_FF1F_C8B3B9A1E18E msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849405.0\amd64_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_4716846b.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849452.0\mfc80CHS.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI250B.tmp msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80CHS.dll msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80DEU.dll msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232849499.1 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232849312.0\amd64_Microsoft.VC80.ATL_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_d6cffeda.cat msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832869.0\x86_Microsoft.VC80.MFC_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_150c9e8b.cat msiexec.exe File opened for modification C:\Windows\WinSxS\InstallTemp\20240828232833010.0 msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832729.0\msvcm80.dll msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\f76c513.msi msiexec.exe File created C:\Windows\WinSxS\InstallTemp\20240828232832932.0\mfc80ENU.dll msiexec.exe File created C:\Windows\Installer\f76c518.msi msiexec.exe -
Event Triggered Execution: Installer Packages 2 TTPs 2 IoCs
Processes:
msiexec.exemsiexec.exepid process 1528 msiexec.exe 768 msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1080 760 WerFault.exe vcredist2012_x86.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vcredist2012_x86.exeinstall.exeSetup.exevcredist2010_x86.exemsiexec.exeMsiExec.exevcredist2008_x86.exevcredist2008_x64.exeSetup.exevcredist2012_x86.exevcredist2005_x86.exeMsiExec.exevcredist2010_x64.exemsiexec.exevcredist2005_x64.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2012_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2010_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2008_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2008_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2012_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2005_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2010_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist2005_x64.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exeSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
DrvInst.exemsiexec.exeDrvInst.exeDrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\33 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\system32\qagentrt.dll,-10 = "System Health Authentication" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\35\52C64B7E DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\34 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\30 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\32 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\33 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\34 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\SourceList\LastUsedSource = "n;2;f:\\9e04090a28cd490ba9beda72c9dd75\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1D5E3C0FEDA1E123187686FED06E995A\KB2524860 = "Servicing_Key" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\Patches\4D54076CED4F5BA32BBD3E5FAD1CD4C9 = ":SP1.1;:#SP1.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\8 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67D6ECF5CD5FBA732B8B22BAC8DE1B4D\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.OpenMP,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e007e0078002d00360076007a0045007a007e003200650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A\Patches\Patches = 3200440030003000350038004600360046003000380041003700340033003300300039003100380034004200450031003100370038004300390035004200320000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\3 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFCLOC,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004d00460043004c004f0043005f007800380036003e0042005b00240070007200510032006f004d003800720048007b00720067003d00320065006e002e0000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.OpenMP,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32" = 3600540043006c0046002e005f007400740035006200290038002100600024004b005a0046006d00460054005f00560043005f005200650064006900730074005f004f00700065006e004d0050005f007800360034003e0061005b0046005f0031006a0048006a005d003300680065005f004f005400590026006b003f00400000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.OpenMP,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e0035006f00300068002c0070004d0076004e003d00650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\PackageName = "vcredist.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E815EB96CCE9A53884E7857C57002F0\Servicing_Key msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\AA5D9C68C00F12943B2F6CA09FE28244 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\ProductName = "Microsoft Visual C++ 2005 Redistributable (x64)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\1 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.CRT,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004300520054005f007800380036003e006f006f0063007b006200340036003f004500380042006a005f0079005d005d007e004f006f002c0000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.OpenMP,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004f00700065006e004d0050005f007800380036003e00690060003700480050004400240062002400350035007e004a007b00730074007e0029006200780000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\9 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\c1c4f01781cc94c4c8fb1542c0981a2a msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\6E815EB96CCE9A53884E7857C57002F0\FT_VC_Redist_OpenMP_x86 = "VC_Redist_12222_x86_enu" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F\VCRedist_amd64_enu msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\2 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1D5E3C0FEDA1E123187686FED06E995A msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F\FT_VCRedist_x64_KB2565063_Detection msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.MFC,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e0021004d00210026005a005a006300300025006e00650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.MFCLOC,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e00530021004900240047002e004f005f0078006800650038004d006b0062004900640046007700550000000000 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\92091D8AC5E822E408118470F0E997E6 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\5 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\PackageCode = "C558A51006735C645AEE5A0FC6A310C9" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\PackageName = "vcredist.msi" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC90.MFC,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004d00460043005f007800380036003e00660074005a003f002800770035002b002e0034002c007e007b0044004700380037002b007800260000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F\KB2549743 = "Servicing_Key" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.MFCLOC,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e006600720038005f006c0028006d0032004e004400650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\7 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Win32Assemblies\Global msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.CRT,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e0049004c005400540052005900320074004f005700650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\4 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.OpenMP,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e00370030002d0054002400210028002a0026004e00650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\11 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Features\c1c4f01781cc94c4c8fb1542c0981a2a msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\3 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media\11 = ";Microsoft Visual C++ 2005 Redistributable (x64) [Disk 1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\10 = ";Microsoft Visual C++ 2005 Redistributable [Disk 1]" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\Microsoft.VC80.ATL,type="win32",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64" = 2c006c0076006a0060006f002c0042002d00400050002e0059002e00430039007300560073003000560043005f005200650064006900730074003e005a00310021003d00520046007900460072005700650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\92091D8AC5E822E408118470F0E997E6\1af2a8da7e60d0b429d7e6453b3d0182 msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.8.0.Microsoft.VC80.ATL,type="win32-policy",version="8.0.50727.6195",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86" = 67006700610044004c004d004e002c00540040003f004400350062002e0057004b0075003d005d00560043005f005200650064006900730074003e0036006b007d00700048004c004800240053004400650038004d006b0062004900640046007700550000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\67D6ECF5CD5FBA732B8B22BAC8DE1B4D\Servicing_Key msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\c1c4f01781cc94c4c8fb1542c0981a2a\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1926E8D15D0BCE53481466615F760A7F\KB2565063 = "Servicing_Key" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\1af2a8da7e60d0b429d7e6453b3d0182 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1926E8D15D0BCE53481466615F760A7F\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFC,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="x86",type="win32-policy" = 5300530073002b005a0066007a00250039003500390027006e006a004d0066002c00350072002700460054005f00560043005f005200650064006900730074005f004d00460043005f007800380036003e005500410049003f00470048002e007b005d0037006a005a003f0034005d0041006e0062002400420000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\1af2a8da7e60d0b429d7e6453b3d0182\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Win32Assemblies\Global\policy.9.0.Microsoft.VC90.MFC,version="9.0.30729.6161",publicKeyToken="1fc8b3b9a1e18e3b",processorArchitecture="amd64",type="win32-policy" = 3600540043006c0046002e005f007400740035006200290038002100600024004b005a0046006d00460054005f00560043005f005200650064006900730074005f004d00460043005f007800360034003e005e002a00320070005a00740060003f0050003500620061005700370038003400280076006c006b0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\67D6ECF5CD5FBA732B8B22BAC8DE1B4D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Patches\4D54076CED4F5BA32BBD3E5FAD1CD4C9\SourceList\Net msiexec.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 7 IoCs
Processes:
vcredist2005_x86.exevcredist2005_x64.exevcredist2008_x86.exevcredist2008_x64.exevcredist2010_x86.exevcredist2010_x64.exevcredist2012_x86.exepid process 2468 vcredist2005_x86.exe 1352 vcredist2005_x64.exe 1376 vcredist2008_x86.exe 1056 vcredist2008_x64.exe 1600 vcredist2010_x86.exe 1040 vcredist2010_x64.exe 3004 vcredist2012_x86.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
msiexec.exeSetup.exeSetup.exepid process 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 1564 Setup.exe 1564 Setup.exe 1564 Setup.exe 1564 Setup.exe 1564 Setup.exe 1564 Setup.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2376 Setup.exe 2376 Setup.exe 2376 Setup.exe 2376 Setup.exe 2376 Setup.exe 2376 Setup.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe 2640 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1528 msiexec.exe Token: SeIncreaseQuotaPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeSecurityPrivilege 2640 msiexec.exe Token: SeCreateTokenPrivilege 1528 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1528 msiexec.exe Token: SeLockMemoryPrivilege 1528 msiexec.exe Token: SeIncreaseQuotaPrivilege 1528 msiexec.exe Token: SeMachineAccountPrivilege 1528 msiexec.exe Token: SeTcbPrivilege 1528 msiexec.exe Token: SeSecurityPrivilege 1528 msiexec.exe Token: SeTakeOwnershipPrivilege 1528 msiexec.exe Token: SeLoadDriverPrivilege 1528 msiexec.exe Token: SeSystemProfilePrivilege 1528 msiexec.exe Token: SeSystemtimePrivilege 1528 msiexec.exe Token: SeProfSingleProcessPrivilege 1528 msiexec.exe Token: SeIncBasePriorityPrivilege 1528 msiexec.exe Token: SeCreatePagefilePrivilege 1528 msiexec.exe Token: SeCreatePermanentPrivilege 1528 msiexec.exe Token: SeBackupPrivilege 1528 msiexec.exe Token: SeRestorePrivilege 1528 msiexec.exe Token: SeShutdownPrivilege 1528 msiexec.exe Token: SeDebugPrivilege 1528 msiexec.exe Token: SeAuditPrivilege 1528 msiexec.exe Token: SeSystemEnvironmentPrivilege 1528 msiexec.exe Token: SeChangeNotifyPrivilege 1528 msiexec.exe Token: SeRemoteShutdownPrivilege 1528 msiexec.exe Token: SeUndockPrivilege 1528 msiexec.exe Token: SeSyncAgentPrivilege 1528 msiexec.exe Token: SeEnableDelegationPrivilege 1528 msiexec.exe Token: SeManageVolumePrivilege 1528 msiexec.exe Token: SeImpersonatePrivilege 1528 msiexec.exe Token: SeCreateGlobalPrivilege 1528 msiexec.exe Token: SeBackupPrivilege 2648 vssvc.exe Token: SeRestorePrivilege 2648 vssvc.exe Token: SeAuditPrivilege 2648 vssvc.exe Token: SeBackupPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2704 DrvInst.exe Token: SeLoadDriverPrivilege 2704 DrvInst.exe Token: SeLoadDriverPrivilege 2704 DrvInst.exe Token: SeLoadDriverPrivilege 2704 DrvInst.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe Token: SeTakeOwnershipPrivilege 2640 msiexec.exe Token: SeRestorePrivilege 2640 msiexec.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
msiexec.exemsiexec.exeinstall.exeinstall.exevcredist2012_x86.exepid process 1528 msiexec.exe 1528 msiexec.exe 768 msiexec.exe 768 msiexec.exe 1288 install.exe 1288 install.exe 1700 install.exe 1700 install.exe 760 vcredist2012_x86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exevcredist2005_x86.exemsiexec.exevcredist2005_x64.exevcredist2008_x86.exevcredist2008_x64.exedescription pid process target process PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 1512 wrote to memory of 2468 1512 cmd.exe vcredist2005_x86.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2468 wrote to memory of 1528 2468 vcredist2005_x86.exe msiexec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1856 2640 msiexec.exe MsiExec.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1512 wrote to memory of 1352 1512 cmd.exe vcredist2005_x64.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 1352 wrote to memory of 768 1352 vcredist2005_x64.exe msiexec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 1628 2640 msiexec.exe MsiExec.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1512 wrote to memory of 1376 1512 cmd.exe vcredist2008_x86.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1376 wrote to memory of 1288 1376 vcredist2008_x86.exe install.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1512 wrote to memory of 1056 1512 cmd.exe vcredist2008_x64.exe PID 1056 wrote to memory of 1700 1056 vcredist2008_x64.exe install.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\install_all.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vcredist2005_x86.exevcredist2005_x86.exe /q2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i vcredist.msi3⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\vcredist2005_x64.exevcredist2005_x64.exe /q2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec /i vcredist.msi3⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\vcredist2008_x86.exevcredist2008_x86.exe /qb2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
\??\f:\231b21e92c8e88443de18e56\install.exef:\231b21e92c8e88443de18e56\.\install.exe /qb3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\vcredist2008_x64.exevcredist2008_x64.exe /qb2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
\??\f:\f76dd77bde2a4843c6efbcb36d88ae5b\install.exef:\f76dd77bde2a4843c6efbcb36d88ae5b\.\install.exe /qb3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\vcredist2010_x86.exevcredist2010_x86.exe /passive /norestart2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\Setup.exef:\9e04090a28cd490ba9beda72c9dd75\Setup.exe /passive /norestart3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\vcredist2010_x64.exevcredist2010_x64.exe /passive /norestart2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
\??\f:\0811cf57fd5c6d3a5f\Setup.exef:\0811cf57fd5c6d3a5f\Setup.exe /passive /norestart3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\vcredist2012_x86.exevcredist2012_x86.exe /passive /norestart2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Users\Admin\AppData\Local\Temp\vcredist2012_x86.exe"C:\Users\Admin\AppData\Local\Temp\vcredist2012_x86.exe" /passive /norestart -burn.unelevated BurnPipe.{5EF00A78-9846-403B-8990-972F81093B68} {1CEF1D33-F1B5-4162-BC8D-4C53E8CAF7EA} 30043⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 3444⤵
- Program crash
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 33DF713403FC1B8EBBD0D0DBA832A4B62⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 71A5FC12DEAA0B74CFDB8C5C5FF14D0E2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004BC" "0000000000000548"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot20" "" "" "65dbac317" "0000000000000000" "00000000000002F8" "00000000000004C0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot21" "" "" "6f9bf5bcb" "0000000000000000" "00000000000004BC" "00000000000004C0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Config.Msi\f76c522.rbsFilesize
29KB
MD5f5a1f38ed0cd5333319459ce08e3b1fa
SHA1dc0fa6772e67fa76921e5c37340ee2ec42121328
SHA256f2832f28d64f2197503ff2b1c15d1de1f99140bbc81a942dea261d114005c4be
SHA51276266f61dde43a774e38179cbcedcf9a9084168ab8cec97d82fb91f1bf0380ff20463b2990d39b1a100c625f991eccde94b51de3203499456761720d0b83efcb
-
C:\Config.Msi\f76c527.rbsFilesize
29KB
MD5edc567af91718014260cb66bbe26ab07
SHA1b011fc4ebb03dbeedcef83254998f59cc404c62f
SHA2562dedc68a7e93f8dbacd9a6d82d81e38739baa0ffc034d35e44bee61efdb73a56
SHA512a14ff9ae784f0d430ec65439ce15a30e3c47ba4c22c79000e232d190d8521754afc736cece0b49987ae9106b040687601637c9c57c4e97cefcbd306d3c4ea6c6
-
C:\Config.Msi\f76c52c.rbsFilesize
4KB
MD5f36cb7898afe22122674a57ccbdb4480
SHA1959cef488e4eb31716e454cbab482f7f021a6b36
SHA25633a45773a53c5d916e3d87e37da2568d9181a1c0ad8d09d29febf8f8f97fc958
SHA51294a344361e53113b94dd468cdb01414eefbbaedaa9206e41ad544341a0b1f4e358da026b8fcb451a9ea498918ec5add8304ee79b662ac4ae2e4a3ebc42949cc8
-
C:\Config.Msi\f76c531.rbsFilesize
29KB
MD597438e4debff94282471534e319df684
SHA1ac027b35895d533c6d22aebeb6a42ba5575b1a33
SHA2562a3555630016f49397c400b1815ecb0ef4190f9ff0f61dd61453eda58b3cf313
SHA51260a09caccdd82cd2807b2e71bf81c7af5cf4ae5c6269c2ede0d8d82830c56a861d2cd26b8bff64c5df14468866f6a295f9b1563feb372f88b9f029130be62939
-
C:\Config.Msi\f76c535.rbsFilesize
4KB
MD5bb16f59e173210ccba9b2f3b309d72c4
SHA1870646635e66b9f5abdcce37c3ea09f42c15689c
SHA256263a87e5f42a600998bf41a8d0fc938d62b9f626c35c79245a00993cb4683d20
SHA512a2db403bb475c56a53b4410ab35920bc824c7d71399e6be1394c6b6b49648a9936d9c1d54a32380bac0991a504e24b47b3bb3e74d023c4fa23804da104a81704
-
C:\Config.Msi\f76c53a.rbsFilesize
28KB
MD519360ee5d627b7ac27a7f591b0234ca2
SHA17e62d06770124b5b4c11c52d1b29cb0d073b33aa
SHA256d7c54ae9776a84b7cecbdc7dcca560723a15ce5ba87706be16cc84c666310c55
SHA5126680c55b5748ca39ad1a49e60f6eb1487fa941de251dc0f7118b034070696cfcdd44ce2b0e589b794bd4e48a0f1df0928420c5d71b2a719f8a1d47867754f703
-
C:\Users\Admin\AppData\Local\Temp\CabC5A0.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\HFI2953.tmp.htmlFilesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredis1.cabFilesize
247KB
MD5cc064d4b81619991de8131a86ad77681
SHA188d80d86cc20c27d7d2a872af719300bd2bb73f9
SHA256913ee5a1cae3e5a1872b3a5efaaa00c58e4beb692492b138f76967da671b0477
SHA5125aff0eb26cfc187bf58721b2b6d73357d9f1e66d1ac5340ad9ddc08b40ad0eda27a144cb3b650604637a7476c282ded83ed890de98a73ccaf0cc021da3a9eb25
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredis1.cabFilesize
312KB
MD577a9bff5af149160775741e204734d47
SHA17b5126af69b5a79593f39db94180f1ff11b0e39d
SHA25620a26ed9a1edf7763a9b515522c5e29720048a482c7fbc8b7ff6bbdd27e61038
SHA512bb0440f58f07e113bddd9a0afb5aab8af6493218784fe5fa6f4032e3a37088f91b7e766dee87cec4a9ea11d425d27b3b536430de3a52222e8bca3e0247d81e3b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist.msiFilesize
2.6MB
MD5b20bbeb818222b657df49a9cfe4fed79
SHA13f6508e880b86502773a3275bc9527f046d45502
SHA25691bdd063f6c53126737791c9eccf0b2f4cf44927831527245bc89a0be06c0cb4
SHA512f534bc7bf1597e728940e6c3b77f864adfaa413bb1e080458326b692b0f96bddf4fbd294eeed36d7764a3578e6c8e919488bbf63b8fe2d4355ab3efd685424a4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist.msiFilesize
3.0MB
MD56dbdf338a0a25cdb236d43ea3ca2395e
SHA1685b6ea61e574e628392eaac8b10aff4309f1081
SHA256200fef5d4994523a02c4daa00060db28eb289b99d47fc6c1305183101e72bdeb
SHA5126b5b31c55cf72ab92b17fb6074b3901a1e6afe0796ef9bc831e4dfb97450376d2889cd24b1cf3fce60eb3c1bcd1b31254b5cfa3ef6107974dfa0b35c233daf5a
-
C:\Users\Admin\AppData\Local\Temp\TarF596.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\VWL230B.tmpFilesize
326B
MD502356d5332c7d98bc2d6724c0ef1c2b7
SHA162dcaa71c3ada656406e5c0cf1e27523353930eb
SHA256d757de5483716735e441410c7b02f0a287a2dda8c719d6349722f08e9d7a21d7
SHA512407aefa23678b985d36c5e6f41d4ff06210655a60d0790ac1193d068d77aeb364acc3a2940384d047cc38a29f1ef7b0ba80bc513979f57db18ced06ffe690418
-
C:\Users\Admin\AppData\Local\Temp\VWL2848.tmpFilesize
392B
MD534bc8c2c69dcdf00523f380f86d2d909
SHA132b4f89b6917caac87ceeab45005f0269d0fd5ae
SHA2564a3b8a7777ed4c74b95789ce583ae210c587643e48b7b6597297538cf0aef042
SHA5121d195211d9a2166eaa328a75e8dbe444e300695b4bd6f5ab4876782371f62ee868725eb9049956eb06782cdc84aa930b0350c7a2c0c8b81d95017b9f9c8cd51f
-
C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI0F48.txtFilesize
2KB
MD51030fff4b1ea30fe48dd32d22bb61586
SHA104ca3f80b18d66b14e0602cde1df2df28e9a7211
SHA256bc676e2e6eb06dbeaf8806fb904d43575d82f92671a8a36b3bc561c0c3a6655c
SHA5122e74d3756d6e861a419ff278d140dedd52477def5bcaa78fa463414d299522cce8c38dd309ebc7f4ce0f6c4999b3c7632f4285aa8902cab929fb7a8e09d9b577
-
C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI0F4B.txtFilesize
2KB
MD5bd938a21357498e84f8d07a6fb12a776
SHA1df8127463b4f1c0f4c2833ed0114a49435db91eb
SHA256135db1f6cad3494b0ee33f316c458c7361b8e447c34990e173f67504eee5b797
SHA512a592e180469d075e874729a9bfa2e12467f7282a1bb35e33dd2f5ade846512a5272e9a41d9741581baf64059cf0071407674937045732d8f53f77c4879b6b643
-
C:\Users\Admin\AppData\Local\Temp\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\.ba1\logo.pngFilesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
C:\Windows\Installer\MSIC860.tmpFilesize
28KB
MD585221b3bcba8dbe4b4a46581aa49f760
SHA1746645c92594bfc739f77812d67cfd85f4b92474
SHA256f6e34a4550e499346f5ab1d245508f16bf765ff24c4988984b89e049ca55737f
SHA512060e35c4de14a03a2cda313f968e372291866cc4acd59977d7a48ac3745494abc54df83fff63cf30be4e10ff69a3b3c8b6c38f43ebd2a8d23d6c86fbee7ba87d
-
F:\231b21e92c8e88443de18e56\install.exeFilesize
547KB
MD54138c31964fbcb3b7418e086933324c3
SHA197cc6f58fb064ab6c4a2f02fb665fef77d30532f
SHA256b72056fc3df6f46069294c243fe5006879bf4a9d8eef388369a590ca41745f29
SHA51240cf2f35c3a944fca93d58d66465f0308197f5485381ff07d3065e0f59e94fc3834313068e4e5e5da395413ff2d3d1c3ff6fa050f2256e118972bf21a5643557
-
F:\9e04090a28cd490ba9beda72c9dd75\Setup.exeFilesize
76KB
MD52af2c1a78542975b12282aca4300d515
SHA13216c853ed82e41dfbeb6ca48855fdcd41478507
SHA256531eb45798728cb741043b28b8c1a4f75536dc75f92d100f55f9109d2d63f0d7
SHA5124a70bd4b542f6001e46f827f341676c34af1ea216c50ad981dd04f547cd67f73aaa420fcbed379dc05dab199bf5ba00d899c49ff75da577613209f96226227eb
-
F:\f76dd77bde2a4843c6efbcb36d88ae5b\install.exeFilesize
834KB
MD5f0995d5ebde916fa146f51d324cf410c
SHA16a03e96a663051683b82601b5c7be72d72ecdb1c
SHA256f0110ab02e8a531e3e7d196c03f907c659e6262c75861dc0c8d05f6a3ccbdd6b
SHA5128a2ca604c06077a1c5a7ac9782ff6815a4ea1b152502707120cf5a8edddcda7c8d1a71e16c80305a3fa098acb6ecf158c770e6d0a9cb2e57a9d875fb935664b8
-
\??\f:\231b21e92c8e88443de18e56\globdata.iniFilesize
1KB
MD50a6b586fabd072bd7382b5e24194eac7
SHA160e3c7215c1a40fbfb3016d52c2de44592f8ca95
SHA2567912e3fcf2698cf4f8625e563cd8215c6668739cae18bd6f27af2d25bec5c951
SHA512b96b0448e9f0e94a7867b6bb103979e9ef2c0e074bcb85988d450d63de6edcf21dc83bb154aafb7de524af3c3734f0bb1ba649db0408612479322e1aa85be9f4
-
\??\f:\231b21e92c8e88443de18e56\install.iniFilesize
841B
MD5f8f6c0e030cb622f065fe47d61da91d7
SHA1cf6fa99747de8f35c6aea52df234c9c57583baa3
SHA256c16727881c47a40077dc5a1f1ea71cbb28e3f4e156c0ae7074c6d7f5ecece21d
SHA512b70c6d67dac5e6a0dbd17e3bcf570a95914482abad20d0304c02da22231070b4bc887720dbae972bc5066457e1273b68fde0805f1c1791e9466a5ca343485cde
-
\??\f:\231b21e92c8e88443de18e56\install.res.1033.dllFilesize
85KB
MD5ff6003014eefc9c30abe20e3e1f5fbe8
SHA14a5bd05f94545f01efc10232385b8fecad300678
SHA256a522c5ea3250cdd538a9ce7b4a06dfd5123e7eb05eef67509f2b975a8e1d3067
SHA5123adc5c705bab7fa7b50517a5eb3301491f5150b56e1088ed436590458e963da204cd1875af75db89742403476a56a94c3f425c05327767bdb4bbee4859667ac2
-
\??\f:\231b21e92c8e88443de18e56\vc_red.cabFilesize
3.7MB
MD50ee84ab717bc400c5e96c8d9d329fbb0
SHA1be4ba7bbb068c7256b70f4fd7634eaeb2ad04d0a
SHA256461d575bc1a07f64c14f1da885d2f310bd282cbbedcd0a5cf8ffa7057411805d
SHA5124a6b0619f471a51df09fb6c1eff4ed166cdb7ef57f79ffdf709fa952a7c2a176c338084689c8ace1a94024a24579e9ee0ab6d411c25a1b42b0f517c57749d1a2
-
\??\f:\231b21e92c8e88443de18e56\vc_red.msiFilesize
222KB
MD57e641e6a0b456271745c20c3bb8a18f9
SHA1ae6cedcb81dc443611a310140ae4671789dbbf3a
SHA25634c5e7d7ea270ee67f92d34843d89603d6d3b6d9ef5247b43ae3c59c909d380d
SHA512f67d6bf69d094edcc93541332f31b326131ff89672edb30fd349def6952ad8bfd07dc2f0ca5967b48a7589eee5b7a14b9a2c1ebe0cba4ae2324f7957090ea903
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1028\LocalizedData.xmlFilesize
29KB
MD57fc06a77d9aafca9fb19fafa0f919100
SHA1e565740e7d582cd73f8d3b12de2f4579ff18bb41
SHA256a27f809211ea1a2d5224cd01101aa3a59bf7853168e45de28a16ef7ed6acd46a
SHA512466dcc6a5fb015be1619f5725fa62ca46eb0fb428e11f93fd9d82e5df61c3950b3fb62d4db7746cc4a2be199e5e69eaa30b6f3354e0017cfa14d127fad52f8cf
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1031\LocalizedData.xmlFilesize
40KB
MD5b83c3803712e61811c438f6e98790369
SHA161a0bc59388786ced045acd82621bee8578cae5a
SHA2562aa6e8d402e44d9ee895b18195f46bf90259de1b6f44efd46a7075b110f2dcd6
SHA512e020f93e3a082476087e690ad051f1feb210e0915924bb4548cc9f53a7ee2760211890eb6036ce9e5e4a311abc0300e89e25efbbb894c2a621ffbc9d64cc8a38
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1033\LocalizedData.xmlFilesize
38KB
MD5d642e322d1e8b739510ca540f8e779f9
SHA136279c76d9f34c09ebddc84fd33fcc7d4b9a896c
SHA2565d90345ff74e177f6da8fb6459c1cfcac080e698215ca75feb130d0d1f2a76b9
SHA512e1e16ae14bc7cc1608e1a08d3c92b6d0518b5fabd27f2c0eb514c87afc3d6192bf7a793a583afc65f1899f03dc419263b29174456e1ec9ab0f0110e0258e0f0d
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1033\SetupResources.dllFilesize
16KB
MD50b4e76baf52d580f657f91972196cd91
SHA1e6ac8f80ab8ade18ac7e834ac6d0536bb483988c
SHA25674a7767d8893dcc1a745522d5a509561162f95bc9e8bcc3056f37a367dba64a4
SHA512ed53292c549d09da9118e944a646aa5dc0a6231811eafcda4258c892b218bcf3e0363a2c974868d2d2722155983c5dc8e29bed36d58e566e1695e23ce07fea87
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1036\LocalizedData.xmlFilesize
40KB
MD5e382abc19294f779d2833287242e7bc6
SHA11ceae32d6b24a3832f9244f5791382865b668a72
SHA25643f913ff28d677316f560a0f45221f35f27cfaf5fc5bd645974a82dca589edbf
SHA51206054c8048cade36a3af54f9a07fd8fa5eb4f3228790996d2abea7ee1ee7eb563d46bd54ff97441f9610e778194082c44e66c5f566c9c50a042aba9eb9cae25e
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1040\LocalizedData.xmlFilesize
39KB
MD50af948fe4142e34092f9dd47a4b8c275
SHA1b3d6dd5c126280398d9055f90e2c2c26dbae4eaa
SHA256c4c7c0ddaa6d6a3a1dc260e9c5a24bdfaa98c427c69e8a65427dd7cac0a4b248
SHA512d97b5fe2553ca78a3019d53e33d2db80c9fa1cf1d8d2501d9ddf0576c7e6ea38dab754fe4712123abf34b97e10b18fb4bbd1c76d3dacb87b4682e501f93423d9
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1041\LocalizedData.xmlFilesize
33KB
MD57fcfbc308b0c42dcbd8365ba62bada05
SHA118a0f0e89b36818c94de0ad795cc593d0e3e29a9
SHA25601e7d24dd8e00b5c333e96d1bb83813e02e96f89aad0c2f28f84551d28abbbe2
SHA512cd6f912a037e86d9e1982c73f0f8b3c4d5a9a6b5b108a7b89a46e6691e430a7cb55718de9a0c05650bb194c8d4a2e309ad6221d638cfca8e16aa5920881ba649
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1042\LocalizedData.xmlFilesize
32KB
MD571dfd70ae141f1d5c1366cb661b354b2
SHA1c4b22590e6f6dd5d39e5158b831ae217ce17a776
SHA256cccda55294aeb4af166a8c0449bca2189ddf5aa9a43d5e939dd3803e61738331
SHA5125000d62f3de41c3fb0ed8a8e9c37dbf4eb427c4f1e3ad3823d4716c6fe62250bac11b7987a302b8a45d91aabcf332457f7aff7d99f15edeffe540639e9440e8a
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\1049\LocalizedData.xmlFilesize
39KB
MD50eeb554d0b9f9fcdb22401e2532e9cd0
SHA108799520b72a1ef92ac5b94a33509d1eddf6caf8
SHA256beef0631c17a4fb1ff0b625c50c6cb6c8ce90a1ae62c5e60e14bf3d915ad509c
SHA5122180e46a5a2ea1f59c879b729806ca02a232c66660f29c338c1fa7fbee2afa4b13d8777d1f7b63cf831eb42f3e55282d70aa8e53f40616b8a6e4d695c36e313d
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\2052\LocalizedData.xmlFilesize
30KB
MD552b1dc12ce4153aa759fb3bbe04d01fc
SHA1bf21f8591c473d1fce68a9faf1e5942f486f6eba
SHA256d1735c8cfd8e10ba019d70818c19fa865e7c72f30ab6421a3748408f85fb96c3
SHA512418903ae9a7baebf73d055e4774ff1917fbaab9ee7ed8c120c34bb10e7303f6dd7b7dae701596d4626387a30ae1b4d329a9af49b8718b360e2ff619c56c19623
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\3082\LocalizedData.xmlFilesize
39KB
MD55397a12d466d55d566b4209e0e4f92d3
SHA1fcffd8961fb487995543fc173521fdf5df6e243b
SHA256f124d318138ff084b6484deb354cca0f72296e1341bf01169792b3e060c89e89
SHA5127708f5a2ad3e4c90c4c216600435af87a1557f60caf880a3dd9b5f482e17399af9f0b9de03ff1dbdd210583e0fec5b466e35794ac24d6d37f9bbc094e52fc77b
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\ParameterInfo.xmlFilesize
21KB
MD513f8768c289476fdd103ff689d73cd2d
SHA1ddebcecc02c6b1b996423d62d0def8760f031f58
SHA2564eae293ca91b31aaa206e5a1c655714f0fe84e39f9331cb759d2236cdb915523
SHA512c72998f30ebff8f4a757248639cf0351d03f5502be475b4cb8f02b09ad800dbbe2f9a82c7d9bde6d7bd748e0ee6e61b86e369192773fe726421a564e793a0139
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\SetupEngine.dllFilesize
789KB
MD563e7901d4fa7ac7766076720272060d0
SHA172dec0e4e12255d98ccd49937923c7b5590bbfac
SHA256a5116ccb17b242713e5645c2374abf5827c0d2752b31553e3540c9123812e952
SHA512de2e63bc090121484191cbf23194361d761b01c0fd332f35f0dfdfd0b11431b529e5c7f542031a0e7e26f31497d94b8baacfbf1c84c6493e66ac2ab76c11d0a0
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\SetupUi.dllFilesize
288KB
MD50d214ced87bf0b55883359160a68dacb
SHA1a60526505d56d447c6bbde03da980db67062c4c6
SHA25629cf99d7e67b4c54bafd109577a385387a39301bcdec8ae4ba1a8a0044306713
SHA512d9004ebd42d4aa7d13343b3746cf454ca1a5144f7b0f437f1a31639cc6bd90c5dd3385612df926bf53c3ef85cfe33756c067cb757fff257d674a10d638fc03c5
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\SetupUi.xsdFilesize
29KB
MD52fadd9e618eff8175f2a6e8b95c0cacc
SHA19ab1710a217d15b192188b19467932d947b0a4f8
SHA256222211e8f512edf97d78bc93e1f271c922d5e91fa899e092b4a096776a704093
SHA512a3a934a8572ff9208d38cf381649bd83de227c44b735489fd2a9dc5a636ead9bb62459c9460ee53f61f0587a494877cd3a3c2611997be563f3137f8236ffc4ca
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\Strings.xmlFilesize
13KB
MD5332adf643747297b9bfa9527eaefe084
SHA1670f933d778eca39938a515a39106551185205e9
SHA256e49545feeae22198728ad04236e31e02035af7cc4d68e10cbecffd08669cbeca
SHA512bea95ce35c4c37b4b2e36cc1e81fc297cc4a8e17b93f10423a02b015ddb593064541b5eb7003560fbeee512ed52869a113a6fb439c1133af01f884a0db0344b0
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\UiInfo.xmlFilesize
35KB
MD54f90fcef3836f5fc49426ad9938a1c60
SHA189eba3b81982d5d5c457ffa7a7096284a10de64a
SHA25666a0299ce7ee12dd9fc2cfead3c3211e59bfb54d6c0627d044d44cef6e70367b
SHA5124ce2731c1d32d7ca3a4f644f4b3111f06223de96c1e241fcc86f5fe665f4db18c8a241dae4e8a7e278d6afbf91b235a2c3517a40d4d22d9866880e19a7221160
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate1.icoFilesize
894B
MD526a00597735c5f504cf8b3e7e9a7a4c1
SHA1d913cb26128d5ca1e1ac3dab782de363c9b89934
SHA25637026c4ea2182d7908b3cf0cef8a6f72bddca5f1cfbc702f35b569ad689cf0af
SHA51208cefc5a2b625f261668f70cc9e1536dc4878d332792c751884526e49e7fee1ecfa6fccfddf7be80910393421cc088c0fd0b0c27c7a7eff2ae03719e06022fdf
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate2.icoFilesize
894B
MD58419caa81f2377e09b7f2f6218e505ae
SHA12cf5ad8c8da4f1a38aab433673f4dddc7ae380e9
SHA256db89d8a45c369303c04988322b2774d2c7888da5250b4dab2846deef58a7de22
SHA51274e504d2c3a8e82925110b7cfb45fde8a4e6df53a188e47cf22d664cbb805eba749d2db23456fc43a86e57c810bc3d9166e7c72468fbd736da6a776f8ca015d1
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate3.icoFilesize
894B
MD5924fd539523541d42dad43290e6c0db5
SHA119a161531a2c9dbc443b0f41b97cbde7375b8983
SHA25602a7fe932029c6fa24d1c7cc06d08a27e84f43a0cbc47b7c43cac59424b3d1f6
SHA51286a4c5d981370efa20183cc4a52c221467692e91539ac38c8def1cc200140f6f3d9412b6e62faf08ca6668df401d8b842c61b1f3c2a4c4570f3b2cec79c9ee8b
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate4.icoFilesize
894B
MD5bb55b5086a9da3097fb216c065d15709
SHA11206c708bd08231961f17da3d604a8956addccfe
SHA2568d82ff7970c9a67da8134686560fe3a6c986a160ced9d1cc1392f2ba75c698ab
SHA512de9226064680da6696976a4a320e08c41f73d127fbb81bf142048996df6206ddb1c2fe347c483cc8e0e50a00dab33db9261d03f1cd7ca757f5ca7bb84865fca9
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate5.icoFilesize
894B
MD53b4861f93b465d724c60670b64fccfcf
SHA1c672d63c62e00e24fbb40da96a0cc45b7c5ef7f0
SHA2567237051d9af5db972a1fecf0b35cd8e9021471740782b0dbf60d3801dc9f5f75
SHA5122e798b0c9e80f639571525f39c2f50838d5244eeda29b18a1fae6c15d939d5c8cd29f6785d234b54bda843a645d1a95c7339707991a81946b51f7e8d5ed40d2c
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate6.icoFilesize
894B
MD570006bf18a39d258012875aefb92a3d1
SHA1b47788f3f8c5c305982eb1d0e91c675ee02c7beb
SHA25619abcedf93d790e19fb3379cb3b46371d3cbff48fe7e63f4fdcc2ac23a9943e4
SHA51297fdbdd6efadbfb08161d8546299952470228a042bd2090cd49896bc31ccb7c73dab8f9de50cdaf6459f7f5c14206af7b90016deeb1220943d61c7324541fe2c
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate7.icoFilesize
894B
MD5fb4dfebe83f554faf1a5cec033a804d9
SHA16c9e509a5d1d1b8d495bbc8f57387e1e7e193333
SHA2564f46a9896de23a92d2b5f963bcfb3237c3e85da05b8f7660641b3d1d5afaae6f
SHA5123caeb21177685b9054b64dec997371c4193458ff8607bce67e4fbe72c4af0e6808d344dd0d59d3d0f5ce00e4c2b8a4ffca0f7d9352b0014b9259d76d7f03d404
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\Rotate8.icoFilesize
894B
MD5d1c53003264dce4effaf462c807e2d96
SHA192562ad5876a5d0cb35e2d6736b635cb5f5a91d9
SHA2565fb03593071a99c7b3803fe8424520b8b548b031d02f2a86e8f5412ac519723c
SHA512c34f8c05a50dc0de644d1f9d97696cdb0a1961c7c7e412eb3df2fd57bbd34199cf802962ca6a4b5445a317d9c7875e86e8e62f6c1df8cc3415afc0bd26e285bd
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\print.icoFilesize
1KB
MD57e55ddc6d611176e697d01c90a1212cf
SHA1e2620da05b8e4e2360da579a7be32c1b225deb1b
SHA256ff542e32330b123486797b410621e19eafb39df3997e14701afa4c22096520ed
SHA512283d381aa396820b7e15768b20099d67688da1f6315ec9f7938c2fcc3167777502cded0d1beddf015a34cc4e5d045bcb665ffd28ba2fbb6faf50fdd38b31d16e
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\save.icoFilesize
1KB
MD57d62e82d960a938c98da02b1d5201bd5
SHA1194e96b0440bf8631887e5e9d3cc485f8e90fbf5
SHA256ae041c8764f56fd89277b34982145d16fc59a4754d261c861b19371c3271c6e5
SHA512ab06b2605f0c1f6b71ef69563c0c977d06c6ea84d58ef7f2baecba566d6037d1458c2b58e6bfd70ddef47dccbdea6d9c2f2e46dea67ea9e92457f754d7042f67
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\graphics\setup.icoFilesize
35KB
MD53d25d679e0ff0b8c94273dcd8b07049d
SHA1a517fc5e96bc68a02a44093673ee7e076ad57308
SHA256288e9ad8f0201e45bc187839f15aca79d6b9f76a7d3c9274c80f5d4a4c219c0f
SHA5123bde668004ca7e28390862d0ae9903c756c16255bdbb3f7e73a5b093ce6a57a3165d6797b0a643b254493149231aca7f7f03e0af15a0cbe28aff02f0071ec255
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\header.bmpFilesize
7KB
MD53ad1a8c3b96993bcdf45244be2c00eef
SHA1308f98e199f74a43d325115a8e7072d5f2c6202d
SHA256133b86a4f1c67a159167489fdaeab765bfa1050c23a7ae6d5c517188fb45f94a
SHA512133442c4a65269f817675adf01adcf622e509aa7ec7583bca8cd9a7eb6018d2aab56066054f75657038efb947cd3b3e5dc4fe7f0863c8b3b1770a8fa4fe2e658
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\sqmapi.dllFilesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\vc_red.cabFilesize
4.0MB
MD5c580a38f1a1a7d838076a1b897c37011
SHA1c689488077d1c21820797707078af826ea676b70
SHA25671c0acc75eecdf39051819dc7c26503583f6be6c43ab2c320853de15bece9978
SHA512ea3a62bd312f1ddeebe5e3c7911eb3a73bc3ee184abb7e9b55bc962214f50bbf05d2499caf151d0bd00735e2021fbea9584bf3e868a1d4502b75ec3b62c7ff56
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\vc_red.msiFilesize
160KB
MD53ff9acea77afc124be8454269bb7143f
SHA18dd6ecab8576245cd6c8617c24e019325a3b2bdc
SHA2569ecf3980b29c6aa20067f9f45c64b45ad310a3d83606cd9667895ad35f106e66
SHA5128d51f692747cfdd59fc839918a34d2b6cbbb510c90dea83ba936b3f5f39ee4cbd48f6bb7e35ed9e0945bf724d682812532191d91c8f3c2adb6ff80a8df89ff7a
-
\??\f:\9e04090a28cd490ba9beda72c9dd75\watermark.bmpFilesize
301KB
MD51a5caafacfc8c7766e404d019249cf67
SHA135d4878db63059a0f25899f4be00b41f430389bf
SHA2562e87d5742413254db10f7bd0762b6cdb98ff9c46ca9acddfd9b1c2e5418638f2
SHA512202c13ded002d234117f08b18ca80d603246e6a166e18ba422e30d394ada7e47153dd3cce9728affe97128fdd797fe6302c74dc6882317e2ba254c8a6db80f46
-
\??\f:\f76dd77bde2a4843c6efbcb36d88ae5b\install.res.1033.dllFilesize
84KB
MD5e8ed5b7797472df6f5e1dae87c123e5e
SHA171e203899c3faf5e9eb5543bfd0eb748b78da566
SHA2566ad479dd35201c74092068cccd6d12fd84a45d2c04e927b39901a9126f9e06dd
SHA512dfdd6bba404753f6afbc804551550bdc771eccc034c01f4c5149beb6d98424cf7b86fc63aac361a1840df9bc8365c726baab672055534620db70ca2c0e2e1b3e
-
\??\f:\f76dd77bde2a4843c6efbcb36d88ae5b\vc_red.cabFilesize
4.3MB
MD55cad07d592a2a43905d6b656b79a7abd
SHA19168413a66fe4e41ddd506a68e7f5e5feebf9d6b
SHA2569f218cefe505a28a589b10f4e7c28ac479eca159e438012a9666e6f709bcf82f
SHA512546065881b32421ba36076dd6848d98e444d89def7a4bfd3d7299d6de6f6f746a2abea2a00e24b02ba5ba2bde816a70529eb8ca48972ccc2d03f3ccb12df4261
-
\??\f:\f76dd77bde2a4843c6efbcb36d88ae5b\vc_red.msiFilesize
230KB
MD54aa5bbddbf6b2d1cf509c566312f1203
SHA10557e25cf4c2aa1bcb170707cd282ae864d93d17
SHA256017e62a7a046acf00f5565e60f8eed4c5f409913e7ddc2f431d4236bbfdabab8
SHA512e32fad32aefb70592eec56c55eaf65d6a6ed33939a6cabe7ff0ec33f91c4687001a41575ccfcac448c4739b2af4e309c2ec9e526104fb292d04aa8746dfad8f9
-
\Program Files\Common Files\Microsoft Shared\VC\msdia90.dllFilesize
835KB
MD5b370bef39a3665a33bd82b614ffbf361
SHA1ac4608231fce95c4036dc04e1b0cf56ae813df03
SHA256a9f818f65074355e9376f9519b6846333b395d9b2d884d8d15f8d2f4991b860a
SHA51266ebf1275d86c07f5c86244b10187453ef40a550d74b9eb24ac3fbf51419786b87fdefe84812d85dc269cb49377e1b51732b697ae089cfbf35123ea90932fdb8
-
memory/1288-300-0x0000000074C20000-0x0000000074C37000-memory.dmpFilesize
92KB
-
memory/1564-556-0x0000000074A70000-0x0000000074B38000-memory.dmpFilesize
800KB
-
memory/1564-557-0x0000000074720000-0x0000000074744000-memory.dmpFilesize
144KB
-
memory/1700-386-0x000007FEF63B0000-0x000007FEF63C8000-memory.dmpFilesize
96KB
-
memory/2376-695-0x0000000074A90000-0x0000000074B58000-memory.dmpFilesize
800KB
-
memory/2376-696-0x0000000074720000-0x0000000074744000-memory.dmpFilesize
144KB