File name:

setup.msi

Full analysis: https://app.any.run/tasks/9727689d-93ec-4eb7-b52b-1b06a6026c54
Verdict: Malicious activity
Analysis date: June 23, 2025, 12:15:43
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {D11D1A01-F475-44D2-BE71-0120E9530948}, Number of Words: 10, Subject: Kroqoul Civil Tools, Author: Werqos Livina, Name of Creating Application: Kroqoul Civil Tools, Template: x64;1033, Comments: This installer database contains the logic and data required to install Kroqoul Civil Tools., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Jun 22 21:28:53 2025, Last Saved Time/Date: Sun Jun 22 21:28:53 2025, Last Printed: Sun Jun 22 21:28:53 2025, Number of Pages: 450
MD5:

EC36175FDADA97232B695634192DD62E

SHA1:

137B9DEAE5E7822353CE4A2C2D576063C4C69C23

SHA256:

0ED50D27280D82FC40EFFA6C72CE38B2FAE60476A242F95F379FD5C13D537CA2

SSDEEP:

393216:2gShndyL/8/aDzj9U82/PVoATjN2h0objZMdmYxIg2AZkijr:6dij9RcVoATjN2h0objZB2Iflw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 1564)
    • Process drops python dynamic module

      • msiexec.exe (PID: 6224)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6224)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6224)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 6224)
    • Executing commands from a ".bat" file

      • msiexec.exe (PID: 6224)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 5708)
      • openvpn.exe (PID: 3740)
    • There is functionality for taking screenshot (YARA)

      • taskcoach.exe (PID: 4036)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 6224)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 6224)
      • msiexec.exe (PID: 1564)
      • 7z.exe (PID: 5708)
      • taskcoach.exe (PID: 4036)
    • Checks supported languages

      • msiexec.exe (PID: 1564)
      • msiexec.exe (PID: 6224)
      • 7z.exe (PID: 5708)
      • taskcoach.exe (PID: 4036)
    • An automatically generated document

      • msiexec.exe (PID: 2760)
    • Reads Environment values

      • msiexec.exe (PID: 1564)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6224)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 1564)
      • taskcoach.exe (PID: 4036)
    • Checks proxy server information

      • msiexec.exe (PID: 1564)
      • taskcoach.exe (PID: 4036)
      • slui.exe (PID: 5896)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 1564)
      • msiexec.exe (PID: 6224)
      • taskcoach.exe (PID: 4036)
    • Reads the software policy settings

      • msiexec.exe (PID: 1564)
      • slui.exe (PID: 5896)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6224)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6224)
    • Create files in a temporary directory

      • taskcoach.exe (PID: 4036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {D11D1A01-F475-44D2-BE71-0120E9530948}
Words: 10
Subject: Kroqoul Civil Tools
Author: Werqos Livina
LastModifiedBy: -
Software: Kroqoul Civil Tools
Template: x64;1033
Comments: This installer database contains the logic and data required to install Kroqoul Civil Tools.
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2025:06:22 21:28:53
ModifyDate: 2025:06:22 21:28:53
LastPrinted: 2025:06:22 21:28:53
Pages: 450
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe msiexec.exe cmd.exe no specs taskcoach.exe conhost.exe no specs 7z.exe no specs openvpn.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1564C:\Windows\syswow64\MsiExec.exe -Embedding C214334F788206E85276C94AC12EE98FC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2760"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\setup.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3740"C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\\openvpn.exe" 0C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\openvpn.execmd.exe
User:
admin
Company:
The OpenVPN Project
Integrity Level:
MEDIUM
Description:
OpenVPN Daemon
Exit code:
3221225781
Version:
2.6.11.0
Modules
Images
c:\users\admin\appdata\roaming\kroqoul civil tools\openvpn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\msvcrt.dll
4036"C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\taskcoach.exe"C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\taskcoach.exe
msiexec.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Your friendly task manager
Version:
1.4.6
Modules
Images
c:\users\admin\appdata\roaming\kroqoul civil tools\taskcoach.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5708"C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\\7z.exe" x "C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\\xlicense.dat" -o"C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\" -y -p0C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
2
Version:
24.09
Modules
Images
c:\users\admin\appdata\roaming\kroqoul civil tools\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
5896C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6224C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6636\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6940C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\xupdate.bat" "C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\" 0"C:\Windows\System32\cmd.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
3221225781
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
Total events
3 897
Read events
3 569
Write events
319
Delete events
9

Modification events

(PID) Process:(6224) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
50180000FF078D9C38E4DB01
(PID) Process:(6224) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
02EBB2DBDB8D981AE4143CB0F9E74B50A8D259942B8CB0F9D039A020757528E3
(PID) Process:(6224) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(1564) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1564) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1564) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6224) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\EE517F264941A23449C811419D3E65FF
Operation:writeName:ACC62E45E452308468EDC41BAD281F1D
Value:
C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\
(PID) Process:(6224) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\825033A6A7F99AF4ABD0055DFD47DE0D
Operation:writeName:ACC62E45E452308468EDC41BAD281F1D
Value:
21:\Software\Werqos Livina\Kroqoul Civil Tools\Version
(PID) Process:(6224) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\083E538AEB4D6AA4CAE0D26CFEF6E4C3
Operation:writeName:ACC62E45E452308468EDC41BAD281F1D
Value:
C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\_socket.pyd
(PID) Process:(6224) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\9101AFDFAB2B2564B88347A4A121C144
Operation:writeName:ACC62E45E452308468EDC41BAD281F1D
Value:
C:\Users\admin\AppData\Roaming\Kroqoul Civil Tools\gdiplus.dll
Executable files
119
Suspicious files
166
Text files
102
Unknown types
100

Dropped files

PID
Process
Filename
Type
6224msiexec.exeC:\Windows\Installer\17786c.msi
MD5:
SHA256:
1564msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3554D6D68D8291652D7FDC994BCEF253binary
MD5:861F51E2F26927F32BB9E85F23F81BD6
SHA256:185184A2A9DDAD0550CB535F1E50A5EA8F33B7E34022300D276F734A1675F4E9
6224msiexec.exeC:\Windows\Installer\MSI7B9A.tmpexecutable
MD5:B717117EB31436F2FBD8182C3AAB267A
SHA256:4516899C2D5369CAC039258668E5AEF2651B33502849C1FA0778D3D63654CE9E
6224msiexec.exeC:\Windows\Installer\MSI8C76.tmpexecutable
MD5:805680BE3B2F96DDD652257156481EBB
SHA256:B5D0C2958F7C59410EB7E255E978563403A71B17D2105498005E1CED7F643489
6224msiexec.exeC:\Windows\Temp\~DFFA0712C32A3B823D.TMPgmc
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
6224msiexec.exeC:\Windows\Installer\MSI7A7F.tmpexecutable
MD5:B717117EB31436F2FBD8182C3AAB267A
SHA256:4516899C2D5369CAC039258668E5AEF2651B33502849C1FA0778D3D63654CE9E
1564msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3554D6D68D8291652D7FDC994BCEF253binary
MD5:BC758025E898E1BE4F2A1EF2AC14B959
SHA256:56DD102D139C2C6D5C3550792BD0F4538C0C0109CB64D75844F8DB59A8C1CD9C
6224msiexec.exeC:\Windows\Installer\MSI7C19.tmpexecutable
MD5:B717117EB31436F2FBD8182C3AAB267A
SHA256:4516899C2D5369CAC039258668E5AEF2651B33502849C1FA0778D3D63654CE9E
1564msiexec.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\diagnostics[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
6224msiexec.exeC:\Windows\Installer\MSI8E2C.tmpexecutable
MD5:B717117EB31436F2FBD8182C3AAB267A
SHA256:4516899C2D5369CAC039258668E5AEF2651B33502849C1FA0778D3D63654CE9E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
31
DNS requests
23
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1200
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1564
msiexec.exe
GET
200
104.18.21.213:80
http://r10.c.lencr.org/52.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4036
taskcoach.exe
GET
301
51.158.149.82:80
http://taskcoach.org/version.txt
unknown
unknown
4960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4960
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4036
taskcoach.exe
GET
301
51.158.149.82:80
http://taskcoach.org/messages.txt
unknown
unknown
2940
svchost.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5348
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1200
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1200
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1564
msiexec.exe
169.150.247.37:443
salsawynwood.com
GB
unknown
1564
msiexec.exe
104.18.21.213:80
r10.c.lencr.org
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 216.58.212.174
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.71
  • 40.126.31.1
  • 20.190.159.130
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
salsawynwood.com
  • 169.150.247.37
unknown
r10.c.lencr.org
  • 104.18.21.213
  • 104.18.20.213
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 23.35.229.160
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

PID
Process
Class
Message
4036
taskcoach.exe
Attempted Information Leak
ET INFO Python-urllib/ Suspicious User Agent
4036
taskcoach.exe
Attempted Information Leak
ET INFO Python-urllib/ Suspicious User Agent
Process
Message
taskcoach.exe
12:16:29 PM: ..\..\src\msw\menu.cpp(487): 'InsertMenuItem()' failed with error 0x00000057 (the parameter is incorrect.).
taskcoach.exe
12:16:29 PM: ..\..\src\msw\menu.cpp(487): 'InsertMenuItem()' failed with error 0x00000057 (the parameter is incorrect.).
taskcoach.exe
12:16:29 PM: ..\..\src\msw\menu.cpp(487): 'InsertMenuItem()' failed with error 0x00000057 (the parameter is incorrect.).