analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Macabacus2016.exe

Full analysis: https://app.any.run/tasks/2aba8902-554c-40a9-828c-0caedd96dba7
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 11, 2019, 03:20:04
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C5107D5BA8AC0980F99EB10B4F69622A

SHA1:

D5A500DEE2CD8619E4B33EA333C323FD2AFA704C

SHA256:

C48AFFD046DD25C0F921D03F0B9D3FDBE9759C68B77285C6C5835AFE41EFE92F

SSDEEP:

393216:lENKyb6J8pc/5SBdlagZXD8rwi2Kjla8sDjAY8XXK:lENKg+rtgZXD8rwiO3ABK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Setup.exe (PID: 2824)
      • install.exe (PID: 3072)
      • addinutil.exe (PID: 2404)
    • Application was dropped or rewritten from another process

      • Setup.exe (PID: 2824)
      • vstor40_x86.exe (PID: 2392)
      • install.exe (PID: 3072)
    • Changes the autorun value in the registry

      • Macabacus2016.exe (PID: 2260)
    • Downloads executable files from the Internet

      • Macabacus2016.exe (PID: 2260)
    • Loads the Task Scheduler COM API

      • ngen.exe (PID: 2456)
      • ngen.exe (PID: 2964)
      • ngen.exe (PID: 4000)
      • ngen.exe (PID: 3852)
      • ngen.exe (PID: 2928)
      • ngen.exe (PID: 3980)
      • ngen.exe (PID: 2904)
      • ngen.exe (PID: 4040)
      • ngen.exe (PID: 2076)
      • ngen.exe (PID: 4092)
      • ngen.exe (PID: 2948)
      • ngen.exe (PID: 856)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 3108)
      • ngen.exe (PID: 3004)
      • ngen.exe (PID: 3040)
      • ngen.exe (PID: 3900)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 588)
      • ngen.exe (PID: 184)
      • ngen.exe (PID: 2236)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 4072)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 2800)
      • ngen.exe (PID: 3020)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 3480)
      • ngen.exe (PID: 3036)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 2128)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 2464)
      • ngen.exe (PID: 3372)
      • ngen.exe (PID: 3320)
      • ngen.exe (PID: 560)
      • ngen.exe (PID: 3556)
      • ngen.exe (PID: 2204)
      • ngen.exe (PID: 2316)
      • ngen.exe (PID: 3420)
      • ngen.exe (PID: 1472)
      • ngen.exe (PID: 3220)
      • ngen.exe (PID: 1420)
      • ngen.exe (PID: 3568)
      • ngen.exe (PID: 2756)
      • ngen.exe (PID: 3276)
      • ngen.exe (PID: 2520)
      • ngen.exe (PID: 2588)
      • ngen.exe (PID: 1920)
      • ngen.exe (PID: 2856)
      • ngen.exe (PID: 1620)
      • ngen.exe (PID: 3708)
      • ngen.exe (PID: 2752)
      • ngen.exe (PID: 1724)
      • ngen.exe (PID: 2784)
      • ngen.exe (PID: 3804)
      • ngen.exe (PID: 1140)
      • ngen.exe (PID: 3248)
      • ngen.exe (PID: 3524)
      • ngen.exe (PID: 2096)
      • ngen.exe (PID: 2172)
      • ngen.exe (PID: 2840)
      • ngen.exe (PID: 2656)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • vstor_redist.exe (PID: 2360)
      • vstor40_x86.exe (PID: 2392)
      • msiexec.exe (PID: 2632)
    • Creates files in the Windows directory

      • ngen.exe (PID: 3852)
      • ngen.exe (PID: 2456)
      • ngen.exe (PID: 2964)
      • ngen.exe (PID: 4000)
      • ngen.exe (PID: 2928)
      • ngen.exe (PID: 3980)
      • msiexec.exe (PID: 2632)
      • ngen.exe (PID: 4040)
      • ngen.exe (PID: 4092)
      • ngen.exe (PID: 2076)
      • ngen.exe (PID: 2904)
      • ngen.exe (PID: 3108)
      • ngen.exe (PID: 3004)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 3040)
      • ngen.exe (PID: 2948)
      • ngen.exe (PID: 3300)
      • ngen.exe (PID: 2236)
      • ngen.exe (PID: 184)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 588)
      • ngen.exe (PID: 856)
      • ngen.exe (PID: 3900)
      • ngen.exe (PID: 2800)
      • ngen.exe (PID: 3020)
      • ngen.exe (PID: 4072)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 3056)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 3480)
      • ngen.exe (PID: 2128)
      • ngen.exe (PID: 2464)
      • ngen.exe (PID: 1316)
      • ngen.exe (PID: 3036)
      • ngen.exe (PID: 3372)
      • ngen.exe (PID: 3208)
      • ngen.exe (PID: 1472)
      • ngen.exe (PID: 560)
      • ngen.exe (PID: 3320)
      • ngen.exe (PID: 3556)
      • ngen.exe (PID: 3420)
      • ngen.exe (PID: 3220)
      • ngen.exe (PID: 2316)
      • ngen.exe (PID: 2204)
      • ngen.exe (PID: 2520)
      • ngen.exe (PID: 3276)
      • ngen.exe (PID: 1420)
      • ngen.exe (PID: 3568)
      • ngen.exe (PID: 2756)
      • ngen.exe (PID: 1920)
      • ngen.exe (PID: 3708)
      • ngen.exe (PID: 2588)
      • ngen.exe (PID: 3804)
      • ngen.exe (PID: 2856)
      • ngen.exe (PID: 1724)
      • ngen.exe (PID: 3248)
      • ngen.exe (PID: 1620)
      • ngen.exe (PID: 1140)
      • ngen.exe (PID: 2752)
      • ngen.exe (PID: 2784)
      • ngen.exe (PID: 3524)
      • ngen.exe (PID: 2656)
      • ngen.exe (PID: 2096)
      • ngen.exe (PID: 2172)
      • ngen.exe (PID: 2840)
    • Modifies the open verb of a shell class

      • msiexec.exe (PID: 2632)
    • Creates COM task schedule object

      • msiexec.exe (PID: 2632)
    • Removes files from Windows directory

      • msiexec.exe (PID: 2632)
    • Starts Microsoft Installer

      • Macabacus2016.exe (PID: 2260)
    • Creates files in the program directory

      • Macabacus2016.exe (PID: 2260)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • vstor_redist.exe (PID: 2360)
    • Loads dropped or rewritten executable

      • msiexec.exe (PID: 2632)
      • MsiExec.exe (PID: 3516)
      • MsiExec.exe (PID: 3560)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2632)
    • Application launched itself

      • msiexec.exe (PID: 2632)
    • Reads settings of System Certificates

      • msiexec.exe (PID: 2632)
    • Creates files in the program directory

      • msiexec.exe (PID: 2632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

ISInternalDescription: Setup Launcher Unicode
ISInternalVersion: 22.0.347
InternalBuildNumber: 158438
ProductVersion: 8.11.3
ProductName: Macabacus 2016
OriginalFileName: InstallShield Setup.exe
LegalCopyright: (C)2012 Macabacus, LLC
InternalName: Setup
FileVersion: 8.11.3
FileDescription: Macabacus Pro 2016
CompanyName: Macabacus, LLC
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Dynamic link library
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 8.11.3.0
FileVersionNumber: 8.11.3.0
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0xa759c
UninitializedDataSize: -
InitializedDataSize: 620544
CodeSize: 968704
LinkerVersion: 11
PEType: PE32
TimeStamp: 2015:09:09 08:00:09+02:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 09-Sep-2015 06:00:09
Detected languages:
  • English - United States
Debug artifacts:
  • C:\CodeBases\isdev\redist\Language Independent\i386\setupPreReq.pdb
CompanyName: Macabacus, LLC
FileDescription: Macabacus Pro 2016
FileVersion: 8.11.3
InternalName: Setup
LegalCopyright: (C)2012 Macabacus, LLC
OriginalFilename: InstallShield Setup.exe
ProductName: Macabacus 2016
ProductVersion: 8.11.3
Internal Build Number: 158438
ISInternalVersion: 22.0.347
ISInternalDescription: Setup Launcher Unicode

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 4
Time date stamp: 09-Sep-2015 06:00:09
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000EC6E6
0x000EC800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.55533
.rdata
0x000EE000
0x00041146
0x00041200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.95232
.data
0x00130000
0x00009058
0x00002800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.55179
.rsrc
0x0013A000
0x00053C2C
0x00053E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.73153

Resources

Title
Entropy
Size
Codepage
Language
Type
1
4.91161
381
Latin 1 / Western European
English - United States
RT_MANIFEST
2
3.835
744
Latin 1 / Western European
UNKNOWN
RT_ICON
3
3.35696
296
Latin 1 / Western European
UNKNOWN
RT_ICON
4
6.14965
3752
Latin 1 / Western European
UNKNOWN
RT_ICON
5
6.18448
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.85842
1384
Latin 1 / Western European
UNKNOWN
RT_ICON
7
5.57777
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
8
5.81004
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
9
6.06596
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
10
3.22977
744
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
CRYPT32.dll
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
RPCRT4.dll
SHELL32.dll
USER32.dll
VERSION.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
198
Monitored processes
77
Malicious processes
5
Suspicious processes
66

Behavior graph

Click at the process to see the details
start drop and start drop and start macabacus2016.exe no specs macabacus2016.exe vstor_redist.exe setup.exe msiexec.exe vstor40_x86.exe install.exe no specs msiexec.exe no specs msiexec.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs ngen.exe no specs addinutil.exe addinutil.exe no specs msiexec.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3456"C:\Users\admin\AppData\Local\Temp\Macabacus2016.exe" C:\Users\admin\AppData\Local\Temp\Macabacus2016.exeexplorer.exe
User:
admin
Company:
Macabacus, LLC
Integrity Level:
MEDIUM
Description:
Macabacus Pro 2016
Exit code:
3221226540
Version:
8.11.3
2260"C:\Users\admin\AppData\Local\Temp\Macabacus2016.exe" C:\Users\admin\AppData\Local\Temp\Macabacus2016.exe
explorer.exe
User:
admin
Company:
Macabacus, LLC
Integrity Level:
HIGH
Description:
Macabacus Pro 2016
Exit code:
1603
Version:
8.11.3
2360"C:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\{0CAE4D50-8700-4DF8-B93A-5FAAEA39039E}\vstor_redist.exe" /q:a /c:"install /q /l"C:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\{0CAE4D50-8700-4DF8-B93A-5FAAEA39039E}\vstor_redist.exe
Macabacus2016.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual Studio Tools for Office Runtime 2010 Redistributable Setup
Exit code:
0
Version:
10.0.40302.00
2824c:\a2f4d00db231480995b469\Setup.exe /q:a /c:"install /q /l"c:\a2f4d00db231480995b469\Setup.exe
vstor_redist.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setup Installer
Exit code:
0
Version:
10.0.40302.0 built by: VSTO_Rel
2632C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2392vstor40_x86.exe /qc:\a2f4d00db231480995b469\vstor40\vstor40_x86.exe
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual Studio 2010 Tools for Office Runtime (x86) Setup
Exit code:
0
Version:
10.0.40302.00
3072c:\ba714451d079f1954278df\install.exe /qc:\ba714451d079f1954278df\install.exevstor40_x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
External Installer
Exit code:
0
Version:
10.0.40302.0 built by: VSTO_Rel
3516c:\Windows\system32\MsiExec.exe -Embedding A1E9DF89AD5E917129324B74B5CFA8E9c:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
3560c:\Windows\system32\MsiExec.exe -Embedding DFE1030E173CA3C951DD3AF4F8F7F3BA M Global\MSI0000c:\Windows\system32\MsiExec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
2456c:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe install "Microsoft.VisualStudio.Tools.Applications.AddInAdapter.v9.0, Version=9.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a" /queue:3 /NoDependenciesc:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeMsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Total events
6 041
Read events
1 687
Write events
0
Delete events
0

Modification events

No data
Executable files
346
Suspicious files
9
Text files
197
Unknown types
18

Dropped files

PID
Process
Filename
Type
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\~B5C9.tmp
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\~B5DA.tmp
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\_isB5FA..dll
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\vstor_redist[1].exe
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\{0CAE4D50-8700-4DF8-B93A-5FAAEA39039E}\vstor_redist.exe
MD5:
SHA256:
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\_ISMSIDEL.INItext
MD5:9ADCE1A0AD14ED995CD566CC1C076B1D
SHA256:317B987F341275D58857D28D3CCBDDD1827D7AC3432B370975C78F4C10B503ED
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Setup.INItext
MD5:8D1D11F7F8B55F31547E9E2EF2DACCDA
SHA256:6D39437EDCF487F827E4DBFBCB0F56F83DE47BD174C7C1BBC5BBADF855D71901
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Microsoft .NET Framework 4.5 Full.prqxml
MD5:72394D3ABC17ED3E9EF83953E0EAED32
SHA256:DBB76BDD53AA179B344B34FA5EFA075406F796D0AAC044F30879BDCB3344C452
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Windows Imaging Component (x86).prqxml
MD5:7F16206BFC71FBCD5E519663926D4F7A
SHA256:FFAF5153EB50DDB3943DB295C40A99BD2DB193EEAF32EB3DFF2DC0BE684799E1
2260Macabacus2016.exeC:\Users\admin\AppData\Local\Temp\{A979D27B-607C-4575-8D57-6F97E5240698}\Microsoft VSTO 2010 Runtime x64.prqxml
MD5:43C9E819542F3827F881886AB7BE9EA6
SHA256:6A739B280C5D8A6DE90C470BFFC40439EDD4CA6E274A073973B44C5E83A6EAD0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
3
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2260
Macabacus2016.exe
GET
68.168.98.61:80
http://macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
suspicious
2260
Macabacus2016.exe
GET
200
68.168.98.61:80
http://macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
executable
38.1 Mb
suspicious
2260
Macabacus2016.exe
GET
301
68.168.98.61:80
http://www.macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
html
356 b
suspicious
2260
Macabacus2016.exe
GET
301
68.168.98.61:80
http://www.macabacus.com/downloads/prereqs/VSTO%202010%20Runtime/x86/vstor_redist.exe
US
html
356 b
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2260
Macabacus2016.exe
68.168.98.61:80
www.macabacus.com
Codero
US
suspicious

DNS requests

Domain
IP
Reputation
www.macabacus.com
  • 68.168.98.61
suspicious

Threats

PID
Process
Class
Message
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
A Network Trojan was detected
ET POLICY Installshield One Click Install User-Agent Toys File
2260
Macabacus2016.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
addinutil.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
addinutil.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144