Malware Analysis Report

2025-08-10 22:22

Sample ID 240202-1m24yaafcp
Target 8a9d717454901a3e696d1fc2e85f2f85
SHA256 21f70da2781527b6e0ae0ecf6866612bcf9274671e894852f27a0e4db239b793
Tags
adware discovery spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

21f70da2781527b6e0ae0ecf6866612bcf9274671e894852f27a0e4db239b793

Threat Level: Shows suspicious behavior

The file 8a9d717454901a3e696d1fc2e85f2f85 was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware discovery spyware stealer upx

Reads user/profile data of web browsers

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

Loads dropped DLL

UPX packed file

Checks installed software on the system

Drops Chrome extension

Installs/modifies Browser Helper Object

Unsigned PE

Enumerates physical storage devices

NSIS installer

Suspicious use of WriteProcessMemory

Modifies registry class

System policy modification

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-02 21:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-02 21:46

Reported

2024-02-02 21:49

Platform

win7-20231215-en

Max time kernel

119s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A

Enumerates physical storage devices

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50f7758620377.dll" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50f7758620377.tlb" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2} = "1" C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe

"C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe"

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe

.\50f7758620341.exe /s

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620341.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\settings.ini

MD5 186a1bda5285f2587cb0f1a505f8178e
SHA1 a3f18af928088b9ce648fe9e621c51f94ab37a1b
SHA256 03bc28b41e382e7afec4445afa558e05fe0ec7a601efae839187c888b75c5297
SHA512 db16d3233148ab81ebf558262eebebe579625acece73add09ead169b1f05689fc95ac07bb820ea44cf836820d8a74ab9fdfbd429128943eb57d9d9b29aefd0a1

\Users\Admin\AppData\Local\Temp\nst3BBA.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\[email protected]\bootstrap.js

MD5 30770cb65dae2ecab2a2a225f2fa9c70
SHA1 3e1b3e56aeac0926595962eb2017b35cb954da3e
SHA256 416575c2fe11cfcbcc8f41a2a78e95250bec7e0c03c156ee62b5ed8cd3e5efcc
SHA512 bb71202037eadd1ac4297a5bdcd67d6e7dc28ce0d65ca01b562fb9c793b06526f81805d3eec4fe65e551ddc525333c2d15ffcfa175b118bba24b160710b5da80

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\[email protected]\chrome.manifest

MD5 57b3367a2637471d453665074b693840
SHA1 e0cfd0902fc44645a6b3a4c70ed42ed2f6325ace
SHA256 bc5e67018258fbbb1a097778b6f6ff51893585af82ddb4b171773b21fd7b522e
SHA512 0c29202d4651943ef224cd1587b94dfa386e25187b335436b183acf326f98342d4eb8885466a65daf2db9f747bf4eea27957508f4f1da41366ba264db23ff564

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\[email protected]\install.rdf

MD5 30e9e46c2860dfdfe0dd2c212ba18f54
SHA1 e97a27eb52e18997c6d9265424ed0e8e4af59f01
SHA256 b5cf318fa54d199ffd0f866e997accf5a432bfa947a2014ddb4fa03597c638fb
SHA512 f6182272357eecbf4c62d654a1564da45009679801b7bf158cc5dea447b4a9207adc8ccb8ecb1cde4d02e9509797bc4ed18085f229309035052a9738b7fa0353

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\[email protected]\content\bg.js

MD5 c50b3e9d2087f68af3fefeeda0ba4acb
SHA1 88766150ca2d47d03d883fe92c4292a544dd2bc4
SHA256 21db9ec85ca4d35bfa56d3387d276114f94240f0a2500a9bc9a38dd862cdc868
SHA512 8009b5d3839c4d094c9b0dec09b3737d0d278c628978fc2431974dfc9e68604b80017c4529a49dbb036f848ec343b7c5e5dbd9150cebab2c0537fa0c792ab878

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\[email protected]\content\zy.xul

MD5 b1d311744519ba95dd1e7bb089fb3053
SHA1 61c12d1557e49b57691c9ac38bff103089f63a10
SHA256 406251e97254621fc72798e2723b43a9c676ec24573305caa402caadb5022eb6
SHA512 830ea1fa85602f69da0b9c60f4e4854276827e12f4a9c65ed47edd9a72889233a45e12878bd8b66335a49ece444bcb91069d5d01a3ac5cb14aaa940d8b35e5a3

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\50f775862015c0.65625688.js

MD5 9b10957f71a5800133e7d15237374180
SHA1 29a6b1b7f5bb6ba61086ab33623099affe1eb6b7
SHA256 0aefada06784384c98ad7a1b82d19553e244eb10f5c90f3eebba4e07122e6724
SHA512 e55f5c45da18dea60adc486ffac7e36c7f2c40d2ecd13d928511e8c2b2ddf5aac90d99debe9966f1fe84a8eb51518000c716bd5d9d0d02aca9e91f13727d2a44

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\background.html

MD5 6fe8fc22fe51930be3d3d8c54cdf7d99
SHA1 6b324de611b2d5e906294497c921991903c709a6
SHA256 26864715e4c3af71fc896b02aebb933b031a2ee2ada284048faf62eead97c20b
SHA512 5a3eb0a9e4eab951cc24b200dffcb5775fc189bf6176286af7e04b3b814b655a399a019909ce1ff9f5f96e18e50199ba79df7615b53e64e119f5f5a5bcbebc6c

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\manifest.json

MD5 95b6b9aa3a3730d6d373a68eb5b411c9
SHA1 05cc71bfa2d2a2a18e169def790cca29f757dd3e
SHA256 5ac43caaa60d48d2c5bc8059dc845eb344b31c088207c8da714f7a36d500c69e
SHA512 5a178056071d0c94d2cfdf72a60403fbf9703cc28abe560f1f04fc2e073188f595c6bb3b687c7e2654899e103a229fe123c41af8aebbe189c9854ed71d8c672e

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\sqlite.js

MD5 ea532e191fa77820fda8c7739bcb47b3
SHA1 a213e9026ed71085950194d5f4544b2730451069
SHA256 c1866e835b7e3999143d3073aab24cd67f7776be1c3a33b85cdddec88766faa7
SHA512 7dc1a6ab79ba5cf517537f9395e8357a7d17883a7c5641ff206be8320275d2625b8ef295b2155c73c5c28bda10d08b1c205d389772d9133dc052ade893f6aabf

\Users\Admin\AppData\Local\Temp\nst3BBA.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

memory/2780-80-0x0000000075120000-0x000000007512A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620377.dll

MD5 da161da8bcb9b8032908cc303602f2ee
SHA1 8a2d5e5b32376a40f33d6c9881001425ec025205
SHA256 0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e
SHA512 39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

C:\Users\Admin\AppData\Local\Temp\7zS3AA0.tmp\50f7758620377.tlb

MD5 1f14de44d0d63a79f91d3fe90badb5fc
SHA1 7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e
SHA256 bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c
SHA512 86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

C:\ProgramData\Zoomex\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-02 21:46

Reported

2024-02-02 21:49

Platform

win10v2004-20231222-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C94C340D-A61A-AEED-8510-BE081C1209D2}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A

Enumerates physical storage devices

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50f7758620377.tlb" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50f7758620377.dll" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{C94C340D-A61A-AEED-8510-BE081C1209D2} = "1" C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe

"C:\Users\Admin\AppData\Local\Temp\8a9d717454901a3e696d1fc2e85f2f85.exe"

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe

.\50f7758620341.exe /s

Network

Country Destination Domain Proto
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 199.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 205.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 173.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 208.143.182.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620341.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\nsq492F.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\settings.ini

MD5 186a1bda5285f2587cb0f1a505f8178e
SHA1 a3f18af928088b9ce648fe9e621c51f94ab37a1b
SHA256 03bc28b41e382e7afec4445afa558e05fe0ec7a601efae839187c888b75c5297
SHA512 db16d3233148ab81ebf558262eebebe579625acece73add09ead169b1f05689fc95ac07bb820ea44cf836820d8a74ab9fdfbd429128943eb57d9d9b29aefd0a1

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\[email protected]\install.rdf

MD5 30e9e46c2860dfdfe0dd2c212ba18f54
SHA1 e97a27eb52e18997c6d9265424ed0e8e4af59f01
SHA256 b5cf318fa54d199ffd0f866e997accf5a432bfa947a2014ddb4fa03597c638fb
SHA512 f6182272357eecbf4c62d654a1564da45009679801b7bf158cc5dea447b4a9207adc8ccb8ecb1cde4d02e9509797bc4ed18085f229309035052a9738b7fa0353

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\[email protected]\chrome.manifest

MD5 57b3367a2637471d453665074b693840
SHA1 e0cfd0902fc44645a6b3a4c70ed42ed2f6325ace
SHA256 bc5e67018258fbbb1a097778b6f6ff51893585af82ddb4b171773b21fd7b522e
SHA512 0c29202d4651943ef224cd1587b94dfa386e25187b335436b183acf326f98342d4eb8885466a65daf2db9f747bf4eea27957508f4f1da41366ba264db23ff564

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\[email protected]\bootstrap.js

MD5 30770cb65dae2ecab2a2a225f2fa9c70
SHA1 3e1b3e56aeac0926595962eb2017b35cb954da3e
SHA256 416575c2fe11cfcbcc8f41a2a78e95250bec7e0c03c156ee62b5ed8cd3e5efcc
SHA512 bb71202037eadd1ac4297a5bdcd67d6e7dc28ce0d65ca01b562fb9c793b06526f81805d3eec4fe65e551ddc525333c2d15ffcfa175b118bba24b160710b5da80

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\[email protected]\content\bg.js

MD5 c50b3e9d2087f68af3fefeeda0ba4acb
SHA1 88766150ca2d47d03d883fe92c4292a544dd2bc4
SHA256 21db9ec85ca4d35bfa56d3387d276114f94240f0a2500a9bc9a38dd862cdc868
SHA512 8009b5d3839c4d094c9b0dec09b3737d0d278c628978fc2431974dfc9e68604b80017c4529a49dbb036f848ec343b7c5e5dbd9150cebab2c0537fa0c792ab878

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\[email protected]\content\zy.xul

MD5 b1d311744519ba95dd1e7bb089fb3053
SHA1 61c12d1557e49b57691c9ac38bff103089f63a10
SHA256 406251e97254621fc72798e2723b43a9c676ec24573305caa402caadb5022eb6
SHA512 830ea1fa85602f69da0b9c60f4e4854276827e12f4a9c65ed47edd9a72889233a45e12878bd8b66335a49ece444bcb91069d5d01a3ac5cb14aaa940d8b35e5a3

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\manifest.json

MD5 95b6b9aa3a3730d6d373a68eb5b411c9
SHA1 05cc71bfa2d2a2a18e169def790cca29f757dd3e
SHA256 5ac43caaa60d48d2c5bc8059dc845eb344b31c088207c8da714f7a36d500c69e
SHA512 5a178056071d0c94d2cfdf72a60403fbf9703cc28abe560f1f04fc2e073188f595c6bb3b687c7e2654899e103a229fe123c41af8aebbe189c9854ed71d8c672e

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\sqlite.js

MD5 ea532e191fa77820fda8c7739bcb47b3
SHA1 a213e9026ed71085950194d5f4544b2730451069
SHA256 c1866e835b7e3999143d3073aab24cd67f7776be1c3a33b85cdddec88766faa7
SHA512 7dc1a6ab79ba5cf517537f9395e8357a7d17883a7c5641ff206be8320275d2625b8ef295b2155c73c5c28bda10d08b1c205d389772d9133dc052ade893f6aabf

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\background.html

MD5 6fe8fc22fe51930be3d3d8c54cdf7d99
SHA1 6b324de611b2d5e906294497c921991903c709a6
SHA256 26864715e4c3af71fc896b02aebb933b031a2ee2ada284048faf62eead97c20b
SHA512 5a3eb0a9e4eab951cc24b200dffcb5775fc189bf6176286af7e04b3b814b655a399a019909ce1ff9f5f96e18e50199ba79df7615b53e64e119f5f5a5bcbebc6c

C:\Users\Admin\AppData\Local\Temp\nsq492F.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\hcafhmdjmjmloknjmpdmgdmfcjaeckbl\50f775862015c0.65625688.js

MD5 9b10957f71a5800133e7d15237374180
SHA1 29a6b1b7f5bb6ba61086ab33623099affe1eb6b7
SHA256 0aefada06784384c98ad7a1b82d19553e244eb10f5c90f3eebba4e07122e6724
SHA512 e55f5c45da18dea60adc486ffac7e36c7f2c40d2ecd13d928511e8c2b2ddf5aac90d99debe9966f1fe84a8eb51518000c716bd5d9d0d02aca9e91f13727d2a44

memory/1064-78-0x0000000074290000-0x000000007429A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS4853.tmp\50f7758620377.dll

MD5 1ecb155527e757f4587b5bf1c4aa5721
SHA1 92d66b75815ed3e7c016a8b839c388576aeec24e
SHA256 a2db16a9429bf3af5f744e8a2dac421b5ed8430e718e33e819139db676b9ce49
SHA512 3c4578e47cdb06b212ea9b12115b3bf5c032c70d9138f35e80ac77273e7f6706871f64045fab1fb4d8ae3ee15122e1c6f42c1ddf8f6af623c2db9c1fd1a32b42

C:\ProgramData\Zoomex\50f7758620377.dll

MD5 45feb52d5bcc7ec519a1955f88f192ff
SHA1 a16bf9bfd3421acce233a0ea7f277d6774f3147f
SHA256 ea92541a03e9154c0ced119b6c64766cf7eab8361c02594a3b6700b50924f845
SHA512 e0d45891c8eaaa232926d56ffe333e4135e8c22d38e95d676291d0bc44e9e68702648a60352dbee6127b92e8ba6f0ba5f8e458109d7ed921dfe706c94e01351e

C:\ProgramData\Zoomex\50f7758620377.dll

MD5 d08856f302821119ed1ca10681ad6f4b
SHA1 650d49ae5368830f7fe59b2214673621d74e26da
SHA256 f7a19e02a265a353a4b2f8fcb86b5a5133f78b39e4aa831097ce40a3c8f3f46c
SHA512 a22e855388baad020ff79923b02f2a538c8f7ddbfd2974ce3847e9280bc05b521cc3f40354310aae9f92ea5cdac309a35063ba831cc94e399fda32c2374f759c

C:\ProgramData\Zoomex\50f7758620377.tlb

MD5 1f14de44d0d63a79f91d3fe90badb5fc
SHA1 7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e
SHA256 bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c
SHA512 86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

C:\Users\Admin\AppData\Local\Temp\nsq492F.tmp\nsJSON.dll

MD5 9bf4b91a4bc79f904a37597b64b2253b
SHA1 aacbf930bbf820f70282f0e0dbb725aaf603fe46
SHA256 5bc2f1fee48d8db3e6798ea85db01b0e7f24703933276ce44272cef59b396077
SHA512 b39f1e84beeadd5714dffca27c82eb4810af80c62482925713ba781995af580947a9c2fa319aad93eb1a145f867965f9d2a6138f91ad50816b6faf78a39571b1

C:\ProgramData\Zoomex\uninstall.exe

MD5 67ae4e54b4ee805a448bcd987b24b675
SHA1 367b44858eabb5bdc42d517764507d86e84b1e5a
SHA256 10c3128278e1c390ddc929a26d1d7fd76a4c775d103bda0b82cdd963077d2af5
SHA512 a9fb0648c03675c81c05b496f5550d378662164b7fbcb7909009b70c9849b4960517dc00772141e9ce588f2253185eac6d7963213cd6f3ece8f3bbafd9befcfe