Malware Analysis Report

2025-01-22 08:53

Sample ID 241027-rr8b3sybqg
Target 01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N
SHA256 01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1
Tags
adware discovery persistence privilege_escalation spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1

Threat Level: Shows suspicious behavior

The file 01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware discovery persistence privilege_escalation spyware stealer

Executes dropped EXE

Event Triggered Execution: Component Object Model Hijacking

Reads user/profile data of web browsers

Loads dropped DLL

Drops Chrome extension

Installs/modifies Browser Helper Object

Checks installed software on the system

Drops file in Program Files directory

Unsigned PE

System Location Discovery: System Language Discovery

System policy modification

Modifies registry class

Modifies Internet Explorer settings

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-27 14:26

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-27 14:26

Reported

2024-10-27 14:28

Platform

win7-20241010-en

Max time kernel

15s

Max time network

20s

Command Line

"C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe"

Signatures

Event Triggered Execution: Component Object Model Hijacking

persistence privilege_escalation

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pgfcnoaadlhofgjfopceoggoalkecocl\5.6\manifest.json C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Windows\system32\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\NoExplorer = "1" C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.dll C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.dll C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.tlb C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.tlb C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.dat C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.dat C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key deleted \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID\ = "kkeepnouW.5.6" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID\ = "kkeepnouW" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID\ = "kkeepnouW" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\keeepnoW\\5XVyStEu.tlb" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID\ = "kkeepnouW.5.6" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\CLSID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Implemented Categories C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Implemented Categories C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\ = "keeepnoW" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CurVer C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CLSID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win64 C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CurVer\ = "kkeepnouW.5.6" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\CLSID\ = "{5A1ADB4A-AEC8-3964-6440-21309414903C}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2344 wrote to memory of 2856 N/A C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2856 wrote to memory of 2448 N/A C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 2448 wrote to memory of 2548 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe

System policy modification

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C} = "1" C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe

"C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe"

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe

.\ewW8Yp1X3.exe

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe /s "C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll"

C:\Windows\system32\regsvr32.exe

/s "C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll"

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.exe

MD5 6223a19e77e3b9b4f633e8863ee1cf40
SHA1 ee5ec9cffb59790d553f5a3394ad5808e1e37446
SHA256 d4041f6772da83d968fcf13181a9004ba69f89effc3a69bee019ab44b5ad1f46
SHA512 66c99f26af2895142c61d75025f9343cc132883f79a513b47c18da1f9eb2582971eeee0610779e20d51d378fda854bf4c5a51434a0f0425054a7d059f764bcb3

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\ewW8Yp1X3.dat

MD5 aab18333be7abac1eb3deb1a17bc9122
SHA1 15e412702af2f26477680c9add65a8b79fb660d9
SHA256 342e0e5487d51c266f011094d7ba55be9717fcec428d649e84355fbd6e5cc6d2
SHA512 fd0182fdf157cb623a4d3df6d8319596dd7e4123dda5ed9cf9e7ff4d56b5ad77324b0ee47a2ad2196da13b9d327d959d112809433906dfcae00f57033d3ea504

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\background.html

MD5 83f63b9787aa41c2dd0c8943bb931e7f
SHA1 87572cf205022817162c65c63cb298ea3253ae4b
SHA256 0579d27c941770c7d33417c9504b0ece79b5b76867a825298039f557ff484228
SHA512 8b40d3cfe120c43d2e633fd8107742ec51e35f0820728f2d96090f51b7d1645df78a9447c392d316f36a27ee11074253271a533f02b2141290ce5df90c4c342b

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\bY82n2mrA.js

MD5 9bd299b7456f48c3de663168ecc7ef50
SHA1 bf7d679aabfc8e4689ed3b0a1e0c7f1fd3be688d
SHA256 ac8ac43b84f4dec04756cd2664c0bcb72e04ac9979869b67d7145b39acc61f3d
SHA512 64cf6321e3c7bff7a39e91d75c7a6689d5257e40cfb1fc83ddd2bab2d7c34cbf2c8951abd92570f3197d1caf82ce1983d5d69d4d7484d7925c53a84535d4f7ee

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\manifest.json

MD5 efad43f39a0c890e30b78bee358f5025
SHA1 4583c2945c1f60844a80a58d4be6662a59fc891d
SHA256 6a05f6c3ec717f6da2446ecebd26217ade0e99307451c8f65e3ff67c98ab7d76
SHA512 a32a05824b4272f944e2f91c2a84542e3ef8082833ebf9ae4996c245d832c808570fd85fdfa579b369405b9ca29854742ae6ae8ff86c818408f0e62e89e8527c

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\sqlite.js

MD5 27d7027adc7227787219b8c8ad04aa32
SHA1 85dfa5b8f6aab18997b93a813124bcaf23dec758
SHA256 00cfb49f08cc565e681a5b3ca668716ddbcf0a97ac1f4bf53e33a25d286daa93
SHA512 a2ab0f412af1418f325e0acce0b53982b460ea90b94bfe5802d4e3f1761ed78c2add948682406bce4279e7080d094762b7f7ba747bf3865548ae5974a2b71e4d

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\[email protected]\bootstrap.js

MD5 1b53c596cfb1aa2209446ff64c17dabd
SHA1 2542da14728dcdbe1763f1ee39fe9ceae38ad414
SHA256 a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f
SHA512 be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\[email protected]\chrome.manifest

MD5 2c6cd4990abbe76f02878fb87fd5ae4b
SHA1 3353b02a8a8e47d67a878b476bfc6a13126e8378
SHA256 1516a8975a62b9814744a6e863a42d876f7b1cd5145479c640f22fa263918c6f
SHA512 054fea9c22f32824d78b8261a8792d623ac887477de7c8df435b3c8b0b65bee0a507363d35462b9f9e1e8fff6d7cc17ae74b9822345101e98a082b5062dd125e

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\[email protected]\content\bg.js

MD5 a557691051dd75650911a8f1994b0fff
SHA1 05de2744a1c723e9c8c0f5ce20364c6bfbabf243
SHA256 b5a58349d36bebac9258b7ca5cdc294f1e0c79dadc5998e12989863797d8358b
SHA512 a678fb9d40e80d55e932942b4e8c7469e348dde44a6648d8401fd084493c2182db4cbf7369cb48a67e2adc36478fff09fc545c2d67aef644e538445ba6d3a750

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\[email protected]\install.rdf

MD5 b733b11ea452cf49833ffb2235a951ac
SHA1 753853776a20f93356a4eb785bf4181925a9a852
SHA256 f244dbde3afbd47ce7f31c87a6d291d2c36ca6ac0ae63e1cfb9e6f429022274e
SHA512 e66de428ecf53c77de00e9048fcdcfd2896603892f75cbe328a0bdb58e82e1947e2e2cdf288b87b22ec4ce298c4a31a80f15d01262d8eda4c9cc7f0055a4ff14

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhzluvd5.Admin\extensions\staged\[email protected]\bootstrap.js

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\5XVyStEu.dll

MD5 9afeb7fa65aa31c6b871237d14a8fb94
SHA1 58f99ae9ea22f56f28b6c5fa798bda3109f297f6
SHA256 4cb847c3d1b5b9ae746e3725ae26b756c4eb980c93faf2a5963a030e9db2874a
SHA512 311655752677bad1e397ef2f03608ee9819157d211b65cb3b4d81a11b70c32fdd07a6e38c7b276e66ad7953f7549d1c881a0fd97ec82621365a4c2ec23dca855

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\5XVyStEu.tlb

MD5 9f260bfcd1ef83627ceb2792ee3324f5
SHA1 078164529ae639e5ff9cf0e4003a82259c2aace8
SHA256 8ce97c40c3fea5c0a6446b3e647cdb0d1d38eb0a07c40a91a8df4ad0517b2526
SHA512 3e3fa6af779fdda2ecd4e75cfb7b09eae69352eb39560fecbeae750130a111aa099a11d91dce90ab2a7dc11a9fe25d3898c65da8de7fb5729398cdb8260dcd6f

C:\Users\Admin\AppData\Local\Temp\7zSE3BA.tmp\5XVyStEu.x64.dll

MD5 410bb7e2c88f92de31b83a173e173e2d
SHA1 ff40233a038f80b7b1513431d6a9632e8f0e39f0
SHA256 afd8e3c979685360c26ff618eb85e0b788f7d9b743fc4e52b9337c242e5bf8d3
SHA512 d5a2727ac2936f189e4247852f147efe93f4473c690abb046c0e38cd8371198c601ae3ec41b04f389da208090c110b7d7ccc903bd3ae9f6ec1b926d5461fdd1e

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-27 14:26

Reported

2024-10-27 14:28

Platform

win10v2004-20241007-en

Max time kernel

103s

Max time network

104s

Command Line

"C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe"

Signatures

Event Triggered Execution: Component Object Model Hijacking

persistence privilege_escalation

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\system32\regsvr32.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\pgfcnoaadlhofgjfopceoggoalkecocl\5.6\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Windows\system32\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5A1ADB4A-AEC8-3964-6440-21309414903C}\NoExplorer = "1" C:\Windows\system32\regsvr32.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.dat C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.dat C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.dll C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.dll C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File created C:\Program Files (x86)\keeepnoW\5XVyStEu.tlb C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
File opened for modification C:\Program Files (x86)\keeepnoW\5XVyStEu.tlb C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID\ = "kkeepnouW.5.6" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID\ = "kkeepnouW" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\CLSID C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win64\ = "C:\\Program Files (x86)\\keeepnoW\\5XVyStEu.x64.dll" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\CLSID\ = "{5A1ADB4A-AEC8-3964-6440-21309414903C}" C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CLSID C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\keeepnoW\\5XVyStEu.tlb" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CLSID\ = "{5A1ADB4A-AEC8-3964-6440-21309414903C}" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Implemented Categories C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW.5.6\ = "keeepnoW" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\keeepnoW\\5XVyStEu.dll" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win64 C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CurVer C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C}\ProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kkeepnouW.kkeepnouW\CLSID\ = "{5A1ADB4A-AEC8-3964-6440-21309414903C}" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{5A1ADB4A-AEC8-3964-6440-21309414903C} = "1" C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe

"C:\Users\Admin\AppData\Local\Temp\01979e92bbab5c1dcda5d55b4d189c65cbd75e4bef84bc3b6ae407d7103aabb1N.exe"

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe

.\ewW8Yp1X3.exe

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe /s "C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll"

C:\Windows\system32\regsvr32.exe

/s "C:\Program Files (x86)\keeepnoW\5XVyStEu.x64.dll"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 150.171.27.10:443 g.bing.com tcp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.exe

MD5 6223a19e77e3b9b4f633e8863ee1cf40
SHA1 ee5ec9cffb59790d553f5a3394ad5808e1e37446
SHA256 d4041f6772da83d968fcf13181a9004ba69f89effc3a69bee019ab44b5ad1f46
SHA512 66c99f26af2895142c61d75025f9343cc132883f79a513b47c18da1f9eb2582971eeee0610779e20d51d378fda854bf4c5a51434a0f0425054a7d059f764bcb3

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\ewW8Yp1X3.dat

MD5 aab18333be7abac1eb3deb1a17bc9122
SHA1 15e412702af2f26477680c9add65a8b79fb660d9
SHA256 342e0e5487d51c266f011094d7ba55be9717fcec428d649e84355fbd6e5cc6d2
SHA512 fd0182fdf157cb623a4d3df6d8319596dd7e4123dda5ed9cf9e7ff4d56b5ad77324b0ee47a2ad2196da13b9d327d959d112809433906dfcae00f57033d3ea504

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\background.html

MD5 83f63b9787aa41c2dd0c8943bb931e7f
SHA1 87572cf205022817162c65c63cb298ea3253ae4b
SHA256 0579d27c941770c7d33417c9504b0ece79b5b76867a825298039f557ff484228
SHA512 8b40d3cfe120c43d2e633fd8107742ec51e35f0820728f2d96090f51b7d1645df78a9447c392d316f36a27ee11074253271a533f02b2141290ce5df90c4c342b

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\bY82n2mrA.js

MD5 9bd299b7456f48c3de663168ecc7ef50
SHA1 bf7d679aabfc8e4689ed3b0a1e0c7f1fd3be688d
SHA256 ac8ac43b84f4dec04756cd2664c0bcb72e04ac9979869b67d7145b39acc61f3d
SHA512 64cf6321e3c7bff7a39e91d75c7a6689d5257e40cfb1fc83ddd2bab2d7c34cbf2c8951abd92570f3197d1caf82ce1983d5d69d4d7484d7925c53a84535d4f7ee

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\manifest.json

MD5 efad43f39a0c890e30b78bee358f5025
SHA1 4583c2945c1f60844a80a58d4be6662a59fc891d
SHA256 6a05f6c3ec717f6da2446ecebd26217ade0e99307451c8f65e3ff67c98ab7d76
SHA512 a32a05824b4272f944e2f91c2a84542e3ef8082833ebf9ae4996c245d832c808570fd85fdfa579b369405b9ca29854742ae6ae8ff86c818408f0e62e89e8527c

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\pgfcnoaadlhofgjfopceoggoalkecocl\sqlite.js

MD5 27d7027adc7227787219b8c8ad04aa32
SHA1 85dfa5b8f6aab18997b93a813124bcaf23dec758
SHA256 00cfb49f08cc565e681a5b3ca668716ddbcf0a97ac1f4bf53e33a25d286daa93
SHA512 a2ab0f412af1418f325e0acce0b53982b460ea90b94bfe5802d4e3f1761ed78c2add948682406bce4279e7080d094762b7f7ba747bf3865548ae5974a2b71e4d

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\[email protected]\bootstrap.js

MD5 1b53c596cfb1aa2209446ff64c17dabd
SHA1 2542da14728dcdbe1763f1ee39fe9ceae38ad414
SHA256 a7dfea4bf7e1d46a8b8e64ccfb2cf35017e3a5b350eead26d6671254d2b3c46f
SHA512 be54481675c38ef6a41697cf8cd3ab5a0b126922b192732a9c587dd8905b74b66c79eb0c849f62bbe8934979a894be63734b0ad59ffae295f5797cbfaa327030

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\[email protected]\chrome.manifest

MD5 2c6cd4990abbe76f02878fb87fd5ae4b
SHA1 3353b02a8a8e47d67a878b476bfc6a13126e8378
SHA256 1516a8975a62b9814744a6e863a42d876f7b1cd5145479c640f22fa263918c6f
SHA512 054fea9c22f32824d78b8261a8792d623ac887477de7c8df435b3c8b0b65bee0a507363d35462b9f9e1e8fff6d7cc17ae74b9822345101e98a082b5062dd125e

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\[email protected]\content\bg.js

MD5 a557691051dd75650911a8f1994b0fff
SHA1 05de2744a1c723e9c8c0f5ce20364c6bfbabf243
SHA256 b5a58349d36bebac9258b7ca5cdc294f1e0c79dadc5998e12989863797d8358b
SHA512 a678fb9d40e80d55e932942b4e8c7469e348dde44a6648d8401fd084493c2182db4cbf7369cb48a67e2adc36478fff09fc545c2d67aef644e538445ba6d3a750

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\[email protected]\install.rdf

MD5 b733b11ea452cf49833ffb2235a951ac
SHA1 753853776a20f93356a4eb785bf4181925a9a852
SHA256 f244dbde3afbd47ce7f31c87a6d291d2c36ca6ac0ae63e1cfb9e6f429022274e
SHA512 e66de428ecf53c77de00e9048fcdcfd2896603892f75cbe328a0bdb58e82e1947e2e2cdf288b87b22ec4ce298c4a31a80f15d01262d8eda4c9cc7f0055a4ff14

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\5XVyStEu.tlb

MD5 9f260bfcd1ef83627ceb2792ee3324f5
SHA1 078164529ae639e5ff9cf0e4003a82259c2aace8
SHA256 8ce97c40c3fea5c0a6446b3e647cdb0d1d38eb0a07c40a91a8df4ad0517b2526
SHA512 3e3fa6af779fdda2ecd4e75cfb7b09eae69352eb39560fecbeae750130a111aa099a11d91dce90ab2a7dc11a9fe25d3898c65da8de7fb5729398cdb8260dcd6f

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\5XVyStEu.dll

MD5 9afeb7fa65aa31c6b871237d14a8fb94
SHA1 58f99ae9ea22f56f28b6c5fa798bda3109f297f6
SHA256 4cb847c3d1b5b9ae746e3725ae26b756c4eb980c93faf2a5963a030e9db2874a
SHA512 311655752677bad1e397ef2f03608ee9819157d211b65cb3b4d81a11b70c32fdd07a6e38c7b276e66ad7953f7549d1c881a0fd97ec82621365a4c2ec23dca855

C:\Users\Admin\AppData\Local\Temp\7zS86B4.tmp\5XVyStEu.x64.dll

MD5 410bb7e2c88f92de31b83a173e173e2d
SHA1 ff40233a038f80b7b1513431d6a9632e8f0e39f0
SHA256 afd8e3c979685360c26ff618eb85e0b788f7d9b743fc4e52b9337c242e5bf8d3
SHA512 d5a2727ac2936f189e4247852f147efe93f4473c690abb046c0e38cd8371198c601ae3ec41b04f389da208090c110b7d7ccc903bd3ae9f6ec1b926d5461fdd1e