Malware Analysis Report

2025-08-05 16:42

Sample ID 240204-vllgxaegd6
Target 8fb16fdcaec4600de0e247761a16bf5e
SHA256 52f9a39870e309546c2f45ddb76cd3ebc0a1f39222a5528da342fd0fa1226f61
Tags
adware discovery spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

52f9a39870e309546c2f45ddb76cd3ebc0a1f39222a5528da342fd0fa1226f61

Threat Level: Shows suspicious behavior

The file 8fb16fdcaec4600de0e247761a16bf5e was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware discovery spyware stealer upx

Reads user/profile data of web browsers

Loads dropped DLL

ACProtect 1.3x - 1.4x DLL software

Executes dropped EXE

UPX packed file

Checks installed software on the system

Installs/modifies Browser Helper Object

Drops Chrome extension

Enumerates physical storage devices

Unsigned PE

NSIS installer

Suspicious use of WriteProcessMemory

System policy modification

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-02-04 17:04

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-02-04 17:04

Reported

2024-02-04 17:07

Platform

win7-20231215-en

Max time kernel

122s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\amolhifdfoiagigbafbhfjdkhhkeoema\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A

Enumerates physical storage devices

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50f967b9ebcdf.tlb" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50f967b9ebcdf.dll" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} = "1" C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe

"C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe"

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe

.\50f967b9ebca6.exe /s

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebca6.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\settings.ini

MD5 3f7167c31481559e75a1c78b867a471e
SHA1 d5132f578e3e3948d35aeb77ca06475a65057613
SHA256 8b74068086662a0199d96ee192eab5ca4c035f3232b6fda879ae1d1c239bbfbd
SHA512 5f7b7be4aeef959b73bca0f4fdbd9f77890e504b43c0b4b97b2af7836acc93e5d5f55e8f615b40f7eac48a8e595d578b9f6794a6158a5e9e94ebe767ba331cbe

\Users\Admin\AppData\Local\Temp\nsi5B2B.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\[email protected]\bootstrap.js

MD5 eb9686bcb189a7a8b2e79aeb9775aa79
SHA1 8dcbbd434a5e52582ef79f34c839511eb62672d3
SHA256 e999ca6dca3d2d4f81c663d9f94a5806254f8d110008f4ce88a09ea07f7a7f59
SHA512 f4fe00bdb8ed58aa68304a245e6d62cf614db9b1302637c366fa3ae2bfba0f7c94a11ab3bd0fdba23ab18dc6789b30169cf2fa8f4a2c32c52054444c09df778a

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\[email protected]\chrome.manifest

MD5 6fe781667a12004fa1e145aacac6b74f
SHA1 47c8ecba5f489d3f3d1d5e8f0a1c7f5441eed386
SHA256 39a5a9cfec6aa698b4ec456790a90636a488b0f91dadbcf39b4779047e8fff47
SHA512 92d084c9dfb252599589f931b6c4f6108d99bd51621d4a8314d0b1df8054cb16cbe3f4cbb88202bc92bacc8b7a5b7ea9efbed764f8588634321f53247f7513ab

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\[email protected]\install.rdf

MD5 238166f0a52015908eb9e1d29cd843db
SHA1 94f525b2f28a13d3f277c59bd9c98ed68c899c47
SHA256 dbd0416b7202341d3b694463ecb57a74a2d8a660d2e21c1415c385b7086d062e
SHA512 29ae545a96b4d2963755ef3f21a66266e53f3e0fdd5bf4aa3f35e6c40b132ec10d4b201036164826a8dffda1a980507277e279573f8b7e3b3d2363039f3f4101

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\[email protected]\content\bg.js

MD5 03646c02ee9c9d70186de8b5efd725cc
SHA1 e1b71612f4699d94b5fcff58559bd1d90c177228
SHA256 fa662e0ff1e6a4d17bf4143a0f091f1b8022dd679106a8db2b5c4f84c1140123
SHA512 ad9326762aa1122ed78b7ab05bd2c71a5949626c19473353dc4856aa68dc43c82081997a286df2cedb315b0eb986b61755b3fd3929744ba0460e82c6f0aabfb5

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\[email protected]\content\zy.xul

MD5 5b66dc51f75f5e5a69d313e771e8f79c
SHA1 d7dcd872126bab201e9bd82d5270c35497e063ac
SHA256 9b118d23fd5fc63ecc5ac6114203cf789959c8be0a35e7a6e1f52281f3d0f59f
SHA512 1b3a9f05192ba371788715b347cc4f5d8437436a640ca6b2e582a94665f245d4d4e34acf15a95645e74ce72e132a18f6965419ba7143539bda53032547d361c6

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\50f967b9ebaae0.02925587.js

MD5 324b6abf328ae64aa32e5ae85b35da94
SHA1 88aba80d96f02f978742053fcf6c1844bf778e17
SHA256 7bb0ec3ee7a119dcecf2817434207de23e01c0ceb371da6a408ecd5b6fc67452
SHA512 358144dbc9d8eaee8e9b68fae7f403c98b9e66143db45229cc7900f7d77346e10506c6540acc8bda2457cd99a0e647979ad8fa4e778f3294dce0e511df945edc

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\background.html

MD5 3b1ccaa20cf583f63c321ef9177c0f14
SHA1 65e417c15c3de78f8b5da533a4943aa6fcc4278e
SHA256 6c9ab5b119585fd4ec18f5724fd7ddfc49bc2f0898cfaed0b3637f901a6368e9
SHA512 2e61a044f4e256b48b5660f4de78b939ed53e32f426d944968302578331486ff3e38fcde3fd0517de7ab6562f55c9385ad538dfb83634329d182e10171340945

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\manifest.json

MD5 95b6b9aa3a3730d6d373a68eb5b411c9
SHA1 05cc71bfa2d2a2a18e169def790cca29f757dd3e
SHA256 5ac43caaa60d48d2c5bc8059dc845eb344b31c088207c8da714f7a36d500c69e
SHA512 5a178056071d0c94d2cfdf72a60403fbf9703cc28abe560f1f04fc2e073188f595c6bb3b687c7e2654899e103a229fe123c41af8aebbe189c9854ed71d8c672e

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\sqlite.js

MD5 2a010612330f7a666c90ff4975a69491
SHA1 ef3b79a5792a8681d3ab9e3a5dba20dc83e60a52
SHA256 319116453ba1164b7d0c96707809c9675adb22012dc86eb3d129e52e8f3c3eda
SHA512 9b5e35d550899056c74f19b28424df75373a4118e0dc9ec398097b0910cc130dd22796b206f2ba01de08c805d2e081f6df2778b6c27086774942d810f05d97e6

memory/2900-80-0x0000000074530000-0x000000007453A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebcdf.tlb

MD5 1f14de44d0d63a79f91d3fe90badb5fc
SHA1 7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e
SHA256 bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c
SHA512 86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

C:\Users\Admin\AppData\Local\Temp\7zS5A02.tmp\50f967b9ebcdf.dll

MD5 da161da8bcb9b8032908cc303602f2ee
SHA1 8a2d5e5b32376a40f33d6c9881001425ec025205
SHA256 0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e
SHA512 39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

\Users\Admin\AppData\Local\Temp\nsi5B2B.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

C:\ProgramData\Zoomex\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

Analysis: behavioral2

Detonation Overview

Submitted

2024-02-04 17:04

Reported

2024-02-04 17:07

Platform

win10v2004-20231215-en

Max time kernel

104s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\amolhifdfoiagigbafbhfjdkhhkeoema\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A

Enumerates physical storage devices

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\50f967b9ebcdf.tlb" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\50f967b9ebcdf.dll" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{7C6C3E53-0148-452B-F566-22A8AC4B4F23} = "1" C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe

"C:\Users\Admin\AppData\Local\Temp\8fb16fdcaec4600de0e247761a16bf5e.exe"

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe

.\50f967b9ebca6.exe /s

Network

Country Destination Domain Proto
US 8.8.8.8:53 178.223.142.52.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 172.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 149.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 81.171.91.138.in-addr.arpa udp
US 8.8.8.8:53 178.113.50.184.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 66.134.221.88.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebca6.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\settings.ini

MD5 3f7167c31481559e75a1c78b867a471e
SHA1 d5132f578e3e3948d35aeb77ca06475a65057613
SHA256 8b74068086662a0199d96ee192eab5ca4c035f3232b6fda879ae1d1c239bbfbd
SHA512 5f7b7be4aeef959b73bca0f4fdbd9f77890e504b43c0b4b97b2af7836acc93e5d5f55e8f615b40f7eac48a8e595d578b9f6794a6158a5e9e94ebe767ba331cbe

C:\Users\Admin\AppData\Local\Temp\nsi4F0B.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\[email protected]\bootstrap.js

MD5 eb9686bcb189a7a8b2e79aeb9775aa79
SHA1 8dcbbd434a5e52582ef79f34c839511eb62672d3
SHA256 e999ca6dca3d2d4f81c663d9f94a5806254f8d110008f4ce88a09ea07f7a7f59
SHA512 f4fe00bdb8ed58aa68304a245e6d62cf614db9b1302637c366fa3ae2bfba0f7c94a11ab3bd0fdba23ab18dc6789b30169cf2fa8f4a2c32c52054444c09df778a

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\[email protected]\chrome.manifest

MD5 6fe781667a12004fa1e145aacac6b74f
SHA1 47c8ecba5f489d3f3d1d5e8f0a1c7f5441eed386
SHA256 39a5a9cfec6aa698b4ec456790a90636a488b0f91dadbcf39b4779047e8fff47
SHA512 92d084c9dfb252599589f931b6c4f6108d99bd51621d4a8314d0b1df8054cb16cbe3f4cbb88202bc92bacc8b7a5b7ea9efbed764f8588634321f53247f7513ab

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\[email protected]\install.rdf

MD5 238166f0a52015908eb9e1d29cd843db
SHA1 94f525b2f28a13d3f277c59bd9c98ed68c899c47
SHA256 dbd0416b7202341d3b694463ecb57a74a2d8a660d2e21c1415c385b7086d062e
SHA512 29ae545a96b4d2963755ef3f21a66266e53f3e0fdd5bf4aa3f35e6c40b132ec10d4b201036164826a8dffda1a980507277e279573f8b7e3b3d2363039f3f4101

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\[email protected]\content\bg.js

MD5 03646c02ee9c9d70186de8b5efd725cc
SHA1 e1b71612f4699d94b5fcff58559bd1d90c177228
SHA256 fa662e0ff1e6a4d17bf4143a0f091f1b8022dd679106a8db2b5c4f84c1140123
SHA512 ad9326762aa1122ed78b7ab05bd2c71a5949626c19473353dc4856aa68dc43c82081997a286df2cedb315b0eb986b61755b3fd3929744ba0460e82c6f0aabfb5

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\[email protected]\content\zy.xul

MD5 5b66dc51f75f5e5a69d313e771e8f79c
SHA1 d7dcd872126bab201e9bd82d5270c35497e063ac
SHA256 9b118d23fd5fc63ecc5ac6114203cf789959c8be0a35e7a6e1f52281f3d0f59f
SHA512 1b3a9f05192ba371788715b347cc4f5d8437436a640ca6b2e582a94665f245d4d4e34acf15a95645e74ce72e132a18f6965419ba7143539bda53032547d361c6

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\sqlite.js

MD5 2a010612330f7a666c90ff4975a69491
SHA1 ef3b79a5792a8681d3ab9e3a5dba20dc83e60a52
SHA256 319116453ba1164b7d0c96707809c9675adb22012dc86eb3d129e52e8f3c3eda
SHA512 9b5e35d550899056c74f19b28424df75373a4118e0dc9ec398097b0910cc130dd22796b206f2ba01de08c805d2e081f6df2778b6c27086774942d810f05d97e6

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\manifest.json

MD5 95b6b9aa3a3730d6d373a68eb5b411c9
SHA1 05cc71bfa2d2a2a18e169def790cca29f757dd3e
SHA256 5ac43caaa60d48d2c5bc8059dc845eb344b31c088207c8da714f7a36d500c69e
SHA512 5a178056071d0c94d2cfdf72a60403fbf9703cc28abe560f1f04fc2e073188f595c6bb3b687c7e2654899e103a229fe123c41af8aebbe189c9854ed71d8c672e

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\background.html

MD5 3b1ccaa20cf583f63c321ef9177c0f14
SHA1 65e417c15c3de78f8b5da533a4943aa6fcc4278e
SHA256 6c9ab5b119585fd4ec18f5724fd7ddfc49bc2f0898cfaed0b3637f901a6368e9
SHA512 2e61a044f4e256b48b5660f4de78b939ed53e32f426d944968302578331486ff3e38fcde3fd0517de7ab6562f55c9385ad538dfb83634329d182e10171340945

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\amolhifdfoiagigbafbhfjdkhhkeoema\50f967b9ebaae0.02925587.js

MD5 324b6abf328ae64aa32e5ae85b35da94
SHA1 88aba80d96f02f978742053fcf6c1844bf778e17
SHA256 7bb0ec3ee7a119dcecf2817434207de23e01c0ceb371da6a408ecd5b6fc67452
SHA512 358144dbc9d8eaee8e9b68fae7f403c98b9e66143db45229cc7900f7d77346e10506c6540acc8bda2457cd99a0e647979ad8fa4e778f3294dce0e511df945edc

memory/3748-78-0x00000000747B0000-0x00000000747BA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebcdf.dll

MD5 da161da8bcb9b8032908cc303602f2ee
SHA1 8a2d5e5b32376a40f33d6c9881001425ec025205
SHA256 0648d564b30e13a0819f28e00a9af39a6686a4d29ccd265c7d81548e4fe0f67e
SHA512 39e882a371dbce2484324811bffdd7ae7655b57401d07bf264aced6b5dac0ae326bd1945c536f05d8ab3b92ca03ff056c5a7baf54f7eb477b45fc405ec54052c

C:\Users\Admin\AppData\Local\Temp\nsi4F0B.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

C:\Users\Admin\AppData\Local\Temp\7zS4E6E.tmp\50f967b9ebcdf.tlb

MD5 1f14de44d0d63a79f91d3fe90badb5fc
SHA1 7fcc921608d2cf40e81cdd9a98e1a15a6ba1f57e
SHA256 bd3d85c0136a66b2af79d4d91c1c5700c8931937b7e554d5ece946760ef4a99c
SHA512 86eb6ebf9eccf1dcb601db827797ac603c0ebe01b6d73318986275c29bd034c8df5f7c79ddf0b19536faf24bdb11e09ac95ea43e8fe75b0ed3dde76dd139883c

C:\ProgramData\Zoomex\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935