URL:

http://contentcdn.vtechda.com/vtechkidsDownload/FR-fre/1716/Setup/PC/Kidizoom1716_FR_fre_Setup.exe

Full analysis: https://app.any.run/tasks/ab4a463b-e90e-4dca-865c-857d3cdb1540
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 14, 2019, 09:07:07
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

57F6E1E99CDCF632A7E36306C60C2EBD

SHA1:

2E864061997C90EEDB40998FF37CC6692403971B

SHA256:

67C24E44326702FA72D0F8F67D6B261F690D3F44DD5943E89CB600DD08EE26A3

SSDEEP:

3:N1KdKL8gsKEyThGNjvE8SXvUSRR3L13CA:CIEKfG9c1XMSRRb13CA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Kidizoom1716_FR_fre_Setup.exe (PID: 1720)
      • SetupLoader.exe (PID: 1976)
      • SetupLoaderWrapper.exe (PID: 3836)
      • DM_Cleanup.exe (PID: 2768)
      • ProdSetup.exe (PID: 1900)
      • KillALl.exe (PID: 2052)
      • AgentMonitor.exe (PID: 1444)
      • DownloadManager.exe (PID: 3880)
      • ProductExtend.exe (PID: 3124)
    • Downloads executable files from the Internet

      • chrome.exe (PID: 3272)
    • Loads dropped or rewritten executable

      • ProductExtend.exe (PID: 3124)
      • DM_Cleanup.exe (PID: 2768)
      • AgentMonitor.exe (PID: 1444)
      • DownloadManager.exe (PID: 3880)
    • Changes the autorun value in the registry

      • ProductExtend.exe (PID: 3124)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Kidizoom1716_FR_fre_Setup.exe (PID: 1720)
      • chrome.exe (PID: 3272)
      • qt_temp.Hp1976 (PID: 3636)
      • msiexec.exe (PID: 2792)
      • DM_Cleanup.exe (PID: 2768)
      • ProdSetup.exe (PID: 1900)
    • Creates files in the program directory

      • SetupLoader.exe (PID: 1976)
      • ProductExtend.exe (PID: 3124)
      • qt_temp.Hp1976 (PID: 3636)
      • ProdSetup.exe (PID: 1900)
      • DM_Cleanup.exe (PID: 2768)
    • Starts application with an unusual extension

      • SetupLoader.exe (PID: 1976)
    • Modifies the open verb of a shell class

      • ProductExtend.exe (PID: 3124)
    • Creates a software uninstall entry

      • ProductExtend.exe (PID: 3124)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 3272)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 3272)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2792)
    • Dropped object may contain Bitcoin addresses

      • qt_temp.Hp1976 (PID: 3636)
      • ProdSetup.exe (PID: 1900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
61
Monitored processes
22
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs kidizoom1716_fr_fre_setup.exe setuploaderwrapper.exe no specs setuploader.exe chrome.exe no specs chrome.exe no specs qt_temp.hp1976 msiexec.exe no specs msiexec.exe productextend.exe prodsetup.exe dm_cleanup.exe killall.exe agentmonitor.exe downloadmanager.exe

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=940,1202593172576514276,2785419405118137926,131072 --enable-features=PasswordImport --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=3759865898777856456 --mojo-platform-channel-handle=3752 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1444"C:\Program Files\VTech\DownloadManager\System\AgentMonitor.exe" lauchC:\Program Files\VTech\DownloadManager\System\AgentMonitor.exe
SetupLoaderWrapper.exe
User:
admin
Integrity Level:
MEDIUM
Description:
AgentMon Application
Exit code:
0
Version:
5.0.1.0
Modules
Images
c:\program files\vtech\downloadmanager\system\agentmonitor.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\vtech\downloadmanager\system\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1672"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3660 --on-initialized-event-handle=308 --parent-handle=312 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1720"C:\Users\admin\Downloads\Kidizoom1716_FR_fre_Setup.exe" C:\Users\admin\Downloads\Kidizoom1716_FR_fre_Setup.exe
chrome.exe
User:
admin
Company:
VTech
Integrity Level:
MEDIUM
Description:
Kidizoom_1716_FR_frePlugin Setup
Exit code:
0
Version:
1.1.0.2
Modules
Images
c:\users\admin\downloads\kidizoom1716_fr_fre_setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1900C:\Users\admin\AppData\Local\Temp\qt_temp.Gi17202799\ProdSetup.exe C:\Users\admin\AppData\Local\Temp\qt_temp.Gi17202799\ProdSetup.exe
SetupLoader.exe
User:
admin
Company:
VTech
Integrity Level:
HIGH
Description:
ProdSetup
Exit code:
0
Version:
1.3.4.2
Modules
Images
c:\users\admin\appdata\local\temp\qt_temp.gi17202799\prodsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1976"C:\Users\admin\AppData\Local\Temp\qt_temp.Gi17202799\SetupLoader.exe" C:\Users\admin\AppData\Local\Temp\qt_temp.Gi17202799\SetupLoader.exe
SetupLoaderWrapper.exe
User:
admin
Company:
VTech
Integrity Level:
HIGH
Description:
Setup Loader
Exit code:
0
Version:
0.9.5.0
Modules
Images
c:\users\admin\appdata\local\temp\qt_temp.gi17202799\setuploader.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\imm32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msctf.dll
2052"C:\Program Files\VTech\DownloadManager\System\KillALl.exe" ""C:\Program Files\VTech\DownloadManager\System\KillALl.exe
DM_Cleanup.exe
User:
admin
Company:
VTech
Integrity Level:
HIGH
Description:
Kill Application for Download Manager
Exit code:
0
Version:
1, 3, 4, 0
Modules
Images
c:\program files\vtech\downloadmanager\system\killall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
2112"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=940,1202593172576514276,2785419405118137926,131072 --enable-features=PasswordImport --service-pipe-token=9229381766526083586 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9229381766526083586 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2120"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=940,1202593172576514276,2785419405118137926,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwAAAQAAAAAAAAAAAGAAAAAAAAEAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=12093851127285970670 --mojo-platform-channel-handle=960 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
2440"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=940,1202593172576514276,2785419405118137926,131072 --enable-features=PasswordImport --service-pipe-token=18237179778706359896 --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=18237179778706359896 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
73.0.3683.75
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\73.0.3683.75\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
1 684
Read events
1 507
Write events
161
Delete events
16

Modification events

(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3488-13197474229333984
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3272) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3272-13204976847855250
Value:
259
Executable files
72
Suspicious files
80
Text files
164
Unknown types
5

Dropped files

PID
Process
Filename
Type
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\index
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_0
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_2
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_3
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\5418db45-e6de-4e19-abda-56aaa8a172dc.tmp
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000018.dbtmp
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\index
MD5:
SHA256:
3272chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
38
DNS requests
16
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_166855.png
US
image
15.0 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_274105.png
US
image
16.3 Kb
shared
3272
chrome.exe
GET
200
143.204.214.17:80
http://contentcdn.vtechda.com/vtechkidsDownload/FR-fre/1716/Setup/PC/Kidizoom1716_FR_fre_Setup.exe
US
executable
14.7 Mb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_200939.png
US
image
11.9 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_136105.png
US
image
11.9 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_215659.png
US
image
14.4 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_273405.png
US
image
14.1 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_274505.png
US
image
16.8 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_275205.png
US
image
16.0 Kb
shared
3880
DownloadManager.exe
GET
200
143.204.214.59:80
http://contentcdn.vtechda.com/Data/CrossSell/Ver2/LLNHome/FR-fre/100x80_171605.png
US
image
11.5 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3272
chrome.exe
172.217.22.35:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3272
chrome.exe
143.204.214.17:80
contentcdn.vtechda.com
US
suspicious
3272
chrome.exe
172.217.16.141:443
accounts.google.com
Google Inc.
US
suspicious
3272
chrome.exe
172.217.21.196:443
www.google.com
Google Inc.
US
whitelisted
172.217.21.238:443
sb-ssl.google.com
Google Inc.
US
whitelisted
1976
SetupLoader.exe
149.126.77.143:443
www.vtechda.com
Incapsula Inc
DE
unknown
1976
SetupLoader.exe
143.204.214.118:443
contentcdn.vtechda.com
US
suspicious
3272
chrome.exe
172.217.18.163:443
www.gstatic.com
Google Inc.
US
whitelisted
3880
DownloadManager.exe
172.217.18.168:443
ssl.google-analytics.com
Google Inc.
US
whitelisted
3880
DownloadManager.exe
149.126.77.143:443
www.vtechda.com
Incapsula Inc
DE
unknown

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 172.217.22.35
whitelisted
contentcdn.vtechda.com
  • 143.204.214.17
  • 143.204.214.100
  • 143.204.214.118
  • 143.204.214.59
shared
accounts.google.com
  • 172.217.16.141
shared
www.google.com
  • 172.217.21.196
malicious
ssl.gstatic.com
  • 172.217.22.35
whitelisted
sb-ssl.google.com
  • 172.217.21.238
whitelisted
www.vtechda.com
  • 149.126.77.143
unknown
system.vtechda.com
  • 143.204.214.118
  • 143.204.214.17
  • 143.204.214.100
  • 143.204.214.59
shared
www.gstatic.com
  • 172.217.18.163
whitelisted
clients1.google.com
  • 216.58.207.78
whitelisted

Threats

PID
Process
Class
Message
3272
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1 ETPRO signatures available at the full report
Process
Message
SetupLoader.exe
[IniXmlReader::set_file] Failed to open the DA configuration file "C:/Users/admin/AppData/Local/Temp/qt_temp.Gi17202799/Common.cfg"
SetupLoader.exe
[HVTechSysInfo::get_install_path] Failed to open the installation path record file "C:\ProgramData/VTech/DA/InstallPath/DAInstallationPath.xml"
SetupLoader.exe
QString::arg: Argument missing: Bienvenue dans l'Assistant d'Installation de l'Explor@ Park<sup>?</sup>, Kidizoom Smart Watch DX
SetupLoader.exe
QString::arg: Argument missing: L'Assistant vous aide ? d?marrer l'Explor@ Park<sup>?</sup> et ? installer tous les composants n?cessaires sur votre ordinateur. Il est recommand? de fermer toutes les applications avant de continuer. Cliquez sur Suivant pour continuer, ou Annuler pour quitter l'Assistant d'Installation., Kidizoom Smart Watch DX
SetupLoader.exe
[HVTechSysInfo::get_install_path] Failed to open the installation path record file "C:\ProgramData/VTech/DA/InstallPath/DAInstallationĸ
SetupLoader.exe
[HVTechSysInfo::get_install_path] Failed to open the installation path record file "C:\ProgramData/VTech/DA/InstallPath/DAInstallationPath.xml"
SetupLoader.exe
dltotal 6.23091e+07 dlnow 14480
SetupLoader.exe
dltotal 6.23091e+07 dlnow 14480
SetupLoader.exe
dltotal 6.23091e+07 dlnow 14480
SetupLoader.exe
dltotal 6.23091e+07 dlnow 14480