URL:

http://www.vpay.co.kr

Full analysis: https://app.any.run/tasks/f3d21b85-517f-410c-9dff-fbcaa5cb5be6
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 25, 2019, 09:06:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

D85DB615C79180989A423E60EEBDC1B1

SHA1:

3FB1C120898469F02E9C9DBC502B52E60AC7BA3D

SHA256:

F91C9FF016B9E17B419D47440DB128B2307258B341ACB2AB7ADA8AC7A5E2D9FC

SSDEEP:

3:N1KJS4ZBGK6X:Cc47d6X

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • VPWSControl.exe (PID: 3156)
    • Application was dropped or rewritten from another process

      • VPWSSetup_C[1].exe (PID: 4072)
      • VPWSSetup_C[1].exe (PID: 2868)
      • certutil.exe (PID: 2428)
      • certutil.exe (PID: 2856)
      • certutil.exe (PID: 3400)
      • certutil.exe (PID: 1808)
      • SCSKMLInst.exe (PID: 3184)
      • certutil.exe (PID: 2840)
      • VPWalletService.exe (PID: 1516)
      • VPWalletService.exe (PID: 2452)
      • VPWalletDaemon.exe (PID: 3780)
      • VPWSSetup.exe (PID: 3356)
      • VPWSControl.exe (PID: 3156)
      • ns9975.tmp (PID: 3328)
      • ns9BA8.tmp (PID: 3260)
      • ISPSetup.exe (PID: 2204)
      • ISPSetup.exe (PID: 2792)
    • Loads dropped or rewritten executable

      • certutil.exe (PID: 3400)
      • certutil.exe (PID: 2840)
      • certutil.exe (PID: 2428)
      • certutil.exe (PID: 2856)
      • SCSKMLInst.exe (PID: 3184)
      • certutil.exe (PID: 1808)
      • VPWSSetup.exe (PID: 3356)
    • Starts NET.EXE for service management

      • cmd.exe (PID: 3828)
      • cmd.exe (PID: 3964)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3120)
      • ISPSetup.exe (PID: 2792)
  • SUSPICIOUS

    • Executed via COM

      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 4024)
    • Creates files in the program directory

      • VPWSSetup.exe (PID: 3356)
      • cmd.exe (PID: 2588)
      • ISPSetup.exe (PID: 2792)
    • Executable content was dropped or overwritten

      • VPWSSetup.exe (PID: 3356)
      • VPWSControl.exe (PID: 3156)
      • VPWSSetup_C[1].exe (PID: 2868)
      • iexplore.exe (PID: 2832)
      • iexplore.exe (PID: 3120)
      • SCSKMLInst.exe (PID: 3184)
      • ISPSetup.exe (PID: 2792)
    • Creates files in the Windows directory

      • VPWSSetup.exe (PID: 3356)
      • SCSKMLInst.exe (PID: 3184)
      • ISPSetup.exe (PID: 2792)
    • Starts CMD.EXE for commands execution

      • VPWSControl.exe (PID: 3156)
      • VPWSSetup.exe (PID: 3356)
      • ns9BA8.tmp (PID: 3260)
      • ns9975.tmp (PID: 3328)
    • Starts application with an unusual extension

      • SCSKMLInst.exe (PID: 3184)
    • Creates files in the user directory

      • certutil.exe (PID: 2428)
      • ISPSetup.exe (PID: 2792)
    • Creates a software uninstall entry

      • VPWSSetup.exe (PID: 3356)
    • Executed as Windows Service

      • VPWalletService.exe (PID: 2452)
    • Reads internet explorer settings

      • ISPSetup.exe (PID: 2792)
    • Removes files from Windows directory

      • ISPSetup.exe (PID: 2792)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3120)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3120)
    • Creates files in the user directory

      • iexplore.exe (PID: 2832)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 4024)
      • iexplore.exe (PID: 3120)
    • Application launched itself

      • iexplore.exe (PID: 2832)
    • Changes internet zones settings

      • iexplore.exe (PID: 2832)
    • Dropped object may contain Bitcoin addresses

      • ISPSetup.exe (PID: 2792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
80
Monitored processes
31
Malicious processes
12
Suspicious processes
4

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe flashutil32_26_0_0_131_activex.exe no specs vpwssetup_c[1].exe no specs vpwssetup_c[1].exe vpwssetup.exe vpwscontrol.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs certutil.exe no specs certutil.exe no specs vpwalletservice.exe no specs certutil.exe no specs vpwalletservice.exe cmd.exe no specs certutil.exe no specs vpwalletdaemon.exe no specs certutil.exe no specs findstr.exe no specs scskmlinst.exe ns9975.tmp no specs cmd.exe no specs net.exe no specs net1.exe no specs ns9ba8.tmp no specs cmd.exe no specs net.exe no specs net1.exe no specs ispsetup.exe no specs ispsetup.exe

Process information

PID
CMD
Path
Indicators
Parent process
256C:\Windows\system32\net.exe stop scsk5C:\Windows\system32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
1224C:\Windows\system32\cmd.exe /c C:\Users\admin\AppData\Local\Temp\impca.batC:\Windows\system32\cmd.exeVPWSControl.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1516"C:\Program Files\VP\VPWalletService\VPWalletService.exe" -InstallC:\Program Files\VP\VPWalletService\VPWalletService.execmd.exe
User:
admin
Company:
VP Inc.
Integrity Level:
HIGH
Description:
VPWalletService for payment
Exit code:
0
Version:
2.1.0.7
Modules
Images
c:\program files\vp\vpwalletservice\vpwalletservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\advapi32.dll
1808"C:\Users\admin\AppData\Local\Temp\RarSFX0\bin\certutil.exe" -A -n "AddedByUser rootca" -i "C:\Users\admin\AppData\Local\Temp\RarSFX0\cacert\rootca.pem" -t "cTC,cTC,cTC", -d "C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default"C:\Users\admin\AppData\Local\Temp\RarSFX0\bin\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\bin\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\temp\rarsfx0\bin\nssutil3.dll
c:\users\admin\appdata\local\temp\rarsfx0\bin\plc4.dll
c:\users\admin\appdata\local\temp\rarsfx0\bin\nspr4.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2204"C:\Users\admin\Downloads\ISPSetup.exe" C:\Users\admin\Downloads\ISPSetup.exeiexplore.exe
User:
admin
Company:
VP Inc.
Integrity Level:
MEDIUM
Description:
Smart Wizard for ISP Service
Exit code:
3221226540
Version:
1.0.0.9
Modules
Images
c:\users\admin\downloads\ispsetup.exe
c:\systemroot\system32\ntdll.dll
2428"C:\Users\admin\AppData\Local\Temp\certutil.exe" -A -n "VP ROOT CA" -i "C:\Users\admin\AppData\Local\Temp\rootca.cer" -t "TCu,TCu,TCu" -d .C:\Users\admin\AppData\Local\Temp\certutil.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\nssutil3.dll
c:\users\admin\appdata\local\temp\libplc4.dll
c:\users\admin\appdata\local\temp\libnspr4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
2448C:\Windows\system32\net1 stop scsk5C:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
2452"C:\Program Files\VP\VPWalletService\VPWalletService.exe"C:\Program Files\VP\VPWalletService\VPWalletService.exe
services.exe
User:
SYSTEM
Company:
VP Inc.
Integrity Level:
SYSTEM
Description:
VPWalletService for payment
Exit code:
0
Version:
2.1.0.7
Modules
Images
c:\program files\vp\vpwalletservice\vpwalletservice.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\userenv.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\advapi32.dll
2588cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\add-certs.cmd" "C:\Windows\system32\cmd.exeVPWSSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2792"C:\Users\admin\Downloads\ISPSetup.exe" C:\Users\admin\Downloads\ISPSetup.exe
iexplore.exe
User:
admin
Company:
VP Inc.
Integrity Level:
HIGH
Description:
Smart Wizard for ISP Service
Exit code:
0
Version:
1.0.0.9
Modules
Images
c:\users\admin\downloads\ispsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msimg32.dll
Total events
2 298
Read events
2 141
Write events
153
Delete events
4

Modification events

(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{C9ACD5F5-DF73-11E9-95D3-5254004A04AF}
Value:
0
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2832) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307090003001900090006002A00AD01
Executable files
76
Suspicious files
17
Text files
68
Unknown types
15

Dropped files

PID
Process
Filename
Type
2832iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2832iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2832iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019092020190921\index.dat
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OXNZ6F5Q\service_vp_co_kr[1].txt
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019092520190926\index.datdat
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
2832iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019092520190926\index.datdat
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MDP1MD8H\style_new[1].csstext
MD5:
SHA256:
3120iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\XH94IAAM\service_vp_co_kr[1].htmhtml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
50
TCP/UDP connections
23
DNS requests
11
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3120
iexplore.exe
GET
304
14.0.68.16:80
http://www.vp.co.kr/
KR
html
933 b
malicious
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/html/index.html
KR
html
16.9 Kb
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/
KR
html
386 b
unknown
3120
iexplore.exe
GET
200
14.0.68.16:80
http://www.vp.co.kr/
KR
html
933 b
malicious
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/
KR
html
386 b
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/assets/styles/style_new.css
KR
text
97.2 Kb
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/assets/images/logo.png
KR
image
2.98 Kb
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/assets/scripts/libs/modernizr.custom.js
KR
html
9.19 Kb
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/assets/images/main_visual_text@2x.png
KR
image
36.5 Kb
unknown
3120
iexplore.exe
GET
200
203.239.100.67:80
http://service.vp.co.kr/vp_home/assets/images/main_slider_01_t.png
KR
image
9.84 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3120
iexplore.exe
14.0.77.83:80
www.vpay.co.kr
CDNetworks
KR
suspicious
2832
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2832
iexplore.exe
14.0.67.49:80
www.vpay.co.kr
CDNetworks
KR
suspicious
3120
iexplore.exe
104.19.196.151:443
cdnjs.cloudflare.com
Cloudflare Inc
US
shared
3120
iexplore.exe
216.58.206.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
3120
iexplore.exe
216.58.207.78:443
www.google-analytics.com
Google Inc.
US
whitelisted
2832
iexplore.exe
14.0.67.54:80
www.vpay.co.kr
CDNetworks
KR
unknown
2832
iexplore.exe
203.239.100.67:80
service.vp.co.kr
VP
KR
unknown
3120
iexplore.exe
14.0.77.83:443
www.vpay.co.kr
CDNetworks
KR
suspicious
2792
ISPSetup.exe
211.239.115.37:80
Sejong Telecom
KR
unknown

DNS requests

Domain
IP
Reputation
www.vpay.co.kr
  • 14.0.77.83
  • 14.0.77.205
  • 14.0.67.49
  • 14.0.67.54
  • 14.0.67.52
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
www.vp.co.kr
  • 14.0.68.16
  • 14.0.69.244
malicious
service.vp.co.kr
  • 203.239.100.67
unknown
fonts.googleapis.com
  • 216.58.207.42
whitelisted
fonts.gstatic.com
  • 172.217.23.99
whitelisted
cdnjs.cloudflare.com
  • 104.19.196.151
  • 104.19.198.151
  • 104.19.197.151
  • 104.19.195.151
  • 104.19.199.151
whitelisted
www.googletagmanager.com
  • 216.58.206.8
whitelisted
www.google-analytics.com
  • 216.58.207.78
whitelisted

Threats

PID
Process
Class
Message
3120
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3120
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2792
ISPSetup.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1 Check for and remove existing files.., OK
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 1 Check for and installation folder.., OK
VPWSSetup.exe
[VPWalletService] [4072] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [4072] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [4072] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [4072] (INFO) 0[
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 3 Skip.., OK
VPWSSetup.exe
[VPWalletService] [4072] (TRAC) **** [Setup] Thread_InformDlg_Install Step. 4 Install files.., OK