File name:

install.exe

Full analysis: https://app.any.run/tasks/42b629d3-06a8-4a1a-aa15-20cbce3bb272
Verdict: Malicious activity
Analysis date: January 31, 2025, 19:17:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

76F6C92091D6D72237FD134CF38DD543

SHA1:

257BA330360D07E33097CD647B3E364E321CB601

SHA256:

53C8B7E0CDBDFC82C08EAE2FF1590C85FD53B8BDE152222DF510AE9DDBF46695

SSDEEP:

98304:nanvyA75oENidwkz09gDYvgdZym4y1PfIxQGAd1eIGSLK2/PvZnx4L4y1qDrqozj:b7tHNHgH07S/c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • install.exe (PID: 6340)
      • install.tmp (PID: 6412)
      • unins000.exe (PID: 7088)
      • _iu14D2N.tmp (PID: 7108)
      • install.exe (PID: 6508)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
    • Reads the Windows owner or organization settings

      • install.tmp (PID: 6412)
      • _iu14D2N.tmp (PID: 7108)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
    • Process drops legitimate windows executable

      • install.tmp (PID: 6412)
      • _iu14D2N.tmp (PID: 7108)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
    • Starts application with an unusual extension

      • unins000.exe (PID: 7088)
      • unins000.exe (PID: 6636)
    • Starts itself from another location

      • unins000.exe (PID: 7088)
      • unins000.exe (PID: 6636)
  • INFO

    • Checks supported languages

      • install.tmp (PID: 6412)
      • install.exe (PID: 6340)
      • unins000.exe (PID: 7088)
      • _iu14D2N.tmp (PID: 7108)
      • install.tmp (PID: 5036)
      • unins000.exe (PID: 6636)
      • _iu14D2N.tmp (PID: 6592)
    • Create files in a temporary directory

      • install.exe (PID: 6340)
      • install.tmp (PID: 6412)
      • unins000.exe (PID: 7088)
      • _iu14D2N.tmp (PID: 7108)
      • install.exe (PID: 6508)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
      • unins000.exe (PID: 6636)
    • Reads the computer name

      • install.tmp (PID: 6412)
      • unins000.exe (PID: 7088)
      • _iu14D2N.tmp (PID: 7108)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
    • The sample compiled with english language support

      • install.tmp (PID: 6412)
      • _iu14D2N.tmp (PID: 7108)
      • install.tmp (PID: 5036)
      • _iu14D2N.tmp (PID: 6592)
    • The sample compiled with russian language support

      • install.tmp (PID: 6412)
      • install.tmp (PID: 5036)
    • Creates a software uninstall entry

      • install.tmp (PID: 6412)
      • install.tmp (PID: 5036)
    • Process checks computer location settings

      • _iu14D2N.tmp (PID: 7108)
      • _iu14D2N.tmp (PID: 6592)
    • Manual execution by a user

      • install.exe (PID: 6508)
      • install.exe (PID: 3840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (81.5)
.exe | Win32 Executable Delphi generic (10.5)
.exe | Win32 Executable (generic) (3.3)
.exe | Win16/32 Executable Delphi generic (1.5)
.exe | Generic Win/DOS Executable (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:07:26 13:09:48+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 86016
InitializedDataSize: 138240
UninitializedDataSize: -
EntryPoint: 0x16478
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.20.3.0
ProductVersionNumber: 1.20.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: OverF1X
FileDescription: Vintage Story 1.20.3.0 by OverF1X
FileVersion: 1.20.3.0
LegalCopyright: © OverF1X
ProductName: Vintage Story
ProductVersion: 1.20.3.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
11
Malicious processes
2
Suspicious processes
6

Behavior graph

Click at the process to see the details
start install.exe install.tmp unins000.exe _iu14d2n.tmp rundll32.exe no specs install.exe no specs install.exe install.tmp unins000.exe no specs _iu14d2n.tmp install.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3664C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3732"C:\Users\admin\AppData\Local\Temp\install.exe" C:\Users\admin\AppData\Local\Temp\install.exeexplorer.exe
User:
admin
Company:
OverF1X
Integrity Level:
MEDIUM
Description:
Vintage Story 1.20.3.0 by OverF1X
Exit code:
3221226540
Version:
1.20.3.0
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3840"C:\Users\admin\Desktop\install.exe" C:\Users\admin\Desktop\install.exeexplorer.exe
User:
admin
Company:
OverF1X
Integrity Level:
MEDIUM
Description:
Vintage Story 1.20.3.0 by OverF1X
Exit code:
3221226540
Version:
1.20.3.0
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5036"C:\Users\admin\AppData\Local\Temp\is-A6FUF.tmp\install.tmp" /SL5="$80358,3600598,225280,C:\Users\admin\Desktop\install.exe" C:\Users\admin\AppData\Local\Temp\is-A6FUF.tmp\install.tmp
install.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-a6fuf.tmp\install.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6340"C:\Users\admin\AppData\Local\Temp\install.exe" C:\Users\admin\AppData\Local\Temp\install.exe
explorer.exe
User:
admin
Company:
OverF1X
Integrity Level:
HIGH
Description:
Vintage Story 1.20.3.0 by OverF1X
Exit code:
0
Version:
1.20.3.0
Modules
Images
c:\users\admin\appdata\local\temp\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6412"C:\Users\admin\AppData\Local\Temp\is-CC62C.tmp\install.tmp" /SL5="$502F2,3600598,225280,C:\Users\admin\AppData\Local\Temp\install.exe" C:\Users\admin\AppData\Local\Temp\is-CC62C.tmp\install.tmp
install.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-cc62c.tmp\install.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6508"C:\Users\admin\Desktop\install.exe" C:\Users\admin\Desktop\install.exe
explorer.exe
User:
admin
Company:
OverF1X
Integrity Level:
HIGH
Description:
Vintage Story 1.20.3.0 by OverF1X
Exit code:
0
Version:
1.20.3.0
Modules
Images
c:\users\admin\desktop\install.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6592"C:\Users\admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Games\FPlay.SU\Vintage Story\Uninstall\unins000.exe" /FIRSTPHASEWND=$602D2 /SILENTC:\Users\admin\AppData\Local\Temp\_iu14D2N.tmp
unins000.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\_iu14d2n.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6636"C:\Games\FPlay.SU\Vintage Story\Uninstall\unins000.exe" /SILENTC:\Games\FPlay.SU\Vintage Story\Uninstall\unins000.exeinstall.tmp
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\games\fplay.su\vintage story\uninstall\unins000.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
7088"C:\Games\FPlay.SU\Vintage Story\Uninstall\unins000.exe" /SILENTC:\Games\FPlay.SU\Vintage Story\Uninstall\unins000.exe
install.tmp
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\games\fplay.su\vintage story\uninstall\unins000.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
990
Read events
944
Write events
36
Delete events
10

Modification events

(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{VINTAGES-TORY-0L6C-Z4W0-RPCBYOVERF1X}_is1
Operation:delete keyName:(default)
Value:
(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack\Vintage Story
Operation:delete valueName:Product GUID
Value:
{VINTAGES-TORY-0L6C-Z4W0-RPCBYOVERF1X}
(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack\Vintage Story
Operation:delete valueName:Install Dir
Value:
C:\Games\FPlay.SU\Vintage Story
(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack\Vintage Story
Operation:delete keyName:(default)
Value:
(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack
Operation:delete keyName:(default)
Value:
(PID) Process:(7108) _iu14D2N.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\StartPage
Operation:writeName:FavoritesRemovedChanges
Value:
1
(PID) Process:(6412) install.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack\Vintage Story
Operation:writeName:Install Dir
Value:
C:\Games\FPlay.SU\Vintage Story
(PID) Process:(6412) install.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\OverF1XRepack\Vintage Story
Operation:writeName:Product GUID
Value:
{VINTAGES-TORY-0L6C-Z4W0-RPCBYOVERF1X}
(PID) Process:(6412) install.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{VINTAGES-TORY-0L6C-Z4W0-RPCBYOVERF1X}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.5.1.ee1 (u)
(PID) Process:(6412) install.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{VINTAGES-TORY-0L6C-Z4W0-RPCBYOVERF1X}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Games\FPlay.SU\Vintage Story
Executable files
41
Suspicious files
7
Text files
22
Unknown types
1

Dropped files

PID
Process
Filename
Type
6340install.exeC:\Users\admin\AppData\Local\Temp\is-CC62C.tmp\install.tmpexecutable
MD5:BA317844C8E8D573730038ED55A9AF23
SHA256:751467D1CCDA971BDDC049D925EBFC94E18829C785C7142DDC049E2417852D7D
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\arc.initext
MD5:5D629E7E12C8DAB71030E9A4281F2A42
SHA256:26236CCB50C50A0006B496465C0C71A77549A815CC20D7498E9C0F0DD8AFF7EE
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\ISGSG.dllexecutable
MD5:09974EAFF6DEFADDE38B1328754DBE09
SHA256:9EEEF28D82FC4DB7D1269DFBC0EA282768CE5E2E4E4BDC867D80D6847468DCA7
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\facompress_mt.dllexecutable
MD5:002508839634E56D43E4FD56E3DF2757
SHA256:7EEB2C50920E30544E2F180B0C39488501372A8F8BD8393BCB095353E9114CDE
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\ISDone.dllexecutable
MD5:4FEAFA8B5E8CDB349125C8AF0AC43974
SHA256:BB8A0245DCC5C10A1C7181BAD509B65959855009A8105863EF14F2BB5B38AC71
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\Splash-1.pngimage
MD5:66D1AC6C9609918A1215CB39E0EC99D2
SHA256:351D32DDABAFBF86B12534D96162654B60447B5DA332046A2A46C37847297573
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\WinTB.dllexecutable
MD5:348F5C9651B979191373EBA950D0EDC3
SHA256:6922915886745D1B59320DEE9A87311AADD57F924FFB73CAC1D27573E75BCECC
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\cls-srep_x86.exeexecutable
MD5:4E1184838F7B10E0D3848EF5CC7ABA21
SHA256:2D537C66F8080A51F4CFDDC412E1E976828B1FDF840D7B0CECA57E41C2E2EEB2
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\unarc.dllexecutable
MD5:890274AC337E16B51B0CD25A2FB37586
SHA256:A363A14CF3D1416661BDEC2E084B3DE31DB1497E4A97E2DC91C0DEC193E42A3F
6412install.tmpC:\Users\admin\AppData\Local\Temp\is-OL485.tmp\cls-msc.dllexecutable
MD5:67A3A34ECAFC68AFDF05F71657EE0009
SHA256:6D3D6B0FF25FD2AC2C8D478B068AF55CB053D9B2C08C53964D6559C7C8B8047D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
28
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6096
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5464
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5464
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.21.65.132:443
www.bing.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
6096
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.21.65.132
  • 2.21.65.146
  • 2.21.65.159
  • 2.21.65.134
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 2.17.190.73
whitelisted
login.live.com
  • 40.126.32.136
  • 20.190.160.128
  • 20.190.160.2
  • 20.190.160.66
  • 20.190.160.20
  • 40.126.32.76
  • 20.190.160.65
  • 40.126.32.140
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.49.150.241
  • 40.127.240.158
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

No threats detected
No debug info