Malware Analysis Report

2025-08-05 10:33

Sample ID 241107-s5v5cavjay
Target 65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN
SHA256 65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefd
Tags
adware discovery spyware stealer upx
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefd

Threat Level: Shows suspicious behavior

The file 65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware discovery spyware stealer upx

Executes dropped EXE

Loads dropped DLL

ACProtect 1.3x - 1.4x DLL software

Reads user/profile data of web browsers

Drops Chrome extension

Checks installed software on the system

Installs/modifies Browser Helper Object

UPX packed file

Unsigned PE

System Location Discovery: System Language Discovery

Enumerates physical storage devices

NSIS installer

System policy modification

Modifies registry class

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-07 15:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-07 15:43

Reported

2024-11-07 15:45

Platform

win7-20241010-en

Max time kernel

14s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\milpcllefklcpfhfogdpnclfohhmdmgm\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\5117642dcec3b.dll" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\5117642dcec3b.tlb" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe
PID 2524 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147} = "1" C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe

"C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe"

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe

.\5117642dcec02.exe /s

Network

N/A

Files

\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec02.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\settings.ini

MD5 a00b41b743370ef0d73b3377dc7529c9
SHA1 014efae5c80b511f97181e71e881d850ecec4390
SHA256 5924b2ea6a6d2b098bac22c955b6e0f34658e32ea260860d6ce9b2db61afaf20
SHA512 7242fb9c01061269a435a425b905a2060edf8120fb1bfd7e83ed4469fd17ceba5729eaca0da620a7a3c2b0890fd428209bddfacc2dcc338351b6435118545a25

\Users\Admin\AppData\Local\Temp\nso9915.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\[email protected]\bootstrap.js

MD5 6dc32f99d7ad5bc8063c09222a0bd243
SHA1 50437045d7410a9799f4211c8b71cb95c2ed6d40
SHA256 4c563086d0e842fcfdfcb7377005e7f5f44fc75782a32551c5853f27286a3fc2
SHA512 4190c27192c016e8b54aa8dcce6d95fef3d4a0e03c46f709b8fc07f86777db6556d97dc59eb2cfd7b88d3fedd265fca061cbe21e8cfb9689049b3b534becc8a3

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\[email protected]\chrome.manifest

MD5 b1910b3c5fb9b47d3cc0614e41cc45e9
SHA1 65d3efda15da7f5beb1394a88e54b3513e4283c1
SHA256 1e8369497738dd9189c90c05d5d371e8e908517b5b1eeb117258ee681a336d80
SHA512 15e220533a63c7447e33d084052fd8bd037e5aa6b756bd226d407e350343f16c0de0ea19555dda8df873ced7c4630b6f31f740eaa6ecd833f1a9596d344bff24

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\[email protected]\install.rdf

MD5 ddda43af9949ab2452a655736060abe2
SHA1 5cb8e0eefb39c493b01111d9a009f824d0dc775d
SHA256 885cf7f5477aae126f8088ed3cbf12da0915c21d54219083b9ad1254ad1353bd
SHA512 d77b5be9294fca4b30e64e01cdc0d01a07afab3515b48a4560d8dd2fb5e5ca9b38645812cf5a861f2eba255a84d7020789af42b0453cb0ce34c12954fbdb6741

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\[email protected]\content\zy.xul

MD5 84c05193d2a1e1ccef559a235f1c95f4
SHA1 69a2f9ae003d6d0121be495284eab02a74644253
SHA256 fe2c6644efc26a98edc7b29cdce4d6f01f800883ee406afe2b73aa7c96ab01ea
SHA512 260374e9010e9e3c6fa3e21a963e2410162c217741afaac58cfef692eb6a2768e188f82c34d8b801217fb6c9f9368adb6d3bc186ca789d9a74aca2818bdb9cfb

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\[email protected]\content\bg.js

MD5 0c8d3f00433fd72659aea1b398775093
SHA1 ceedf95cd2bb4ddb063c23ca6076640c49c5eb28
SHA256 1d2ecf41975c903286350993c9ea8c8e00b04977c6ae51d4f6f28f2fb2620a5b
SHA512 0c600e6b80a86765e7b8be0b5ebe02e5ed03adf2f0fedb8318d9e01ee29c4ac1b691ce84ba14eb437fd7c434df47f8a04e22c307dd89bf6aa66f88b74f8e1c00

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\background.html

MD5 4703ceb22e434e5d47a53a3e1873b941
SHA1 3f8088b38575f0dd2d5f2b8d796842f92f3020be
SHA256 2b5f3f4b2279ea615f9e4f3cf64c16122c03034de74d264a84117a11ed224cba
SHA512 4d37e6bd7c9c64e818310873858d08c09960ccf7d05b3173f553feba2bfb63ecf80553e54922b3584c8f4ac64262e342e138920d00030efba5183897591a5cda

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\5117642dce9fd7.02301309.js

MD5 cb91a133d30d7044d93a5c6a1358ad45
SHA1 d64a416ce417a21cb69a24ce3c9cae5683108115
SHA256 37619163e4115918176a138d34f100c6006d62296e3fd919c6e187209a3a1d2c
SHA512 12490e96c784bad2e03281ba474424f4b73aaf669ce1eeb486abe242567c77e61d01d505e8420ee50fa121b428097e860fc9bab0c2e1c8a5938ecf4d8b8d1045

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\manifest.json

MD5 d9670f9c069ec46aaff5a60a9608e885
SHA1 c15da079582c4bf21b06e934dc78f3bd8fbc5607
SHA256 a631255a7467449ff89bb97a8d97632411076d00bfb8dc84c19abd100e235e7c
SHA512 d7ead015d25cdf1d31ec3330020bd43c5ec702a148c130083fb5ee70a8a4691fe94db7f9390b93d7afbc083531c9c1f23d29bd607c22d7cb362a0cb299645ad3

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\sqlite.js

MD5 754526279aed9317f22a8ee499bc4628
SHA1 70ddaf095a56c6e13282ac9393bd4bf3849e09d0
SHA256 295731c539e930f0decd93740879bf50ccc374d79fed7b7e9bcc76b78e9e96fb
SHA512 da81e082cf98e5e23e5b6a1c3790952b6d5b94157fec28b0c30bd84de1a55ab6ad284daa5b421af74a6ed04fc1ec0a5a03c54b7e03d24283739a706fe27f5788

\Users\Admin\AppData\Local\Temp\nso9915.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

memory/2972-80-0x0000000074E90000-0x0000000074E9A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec3b.dll

MD5 44f1dc155d3d083b677f20ed0fab8404
SHA1 a696c5a0d50145afde3d3a71f70b1c3006ac2199
SHA256 67014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470
SHA512 04a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6

C:\Users\Admin\AppData\Local\Temp\7zS9849.tmp\5117642dcec3b.tlb

MD5 c749bca713cf6481411b5c4eaac4506a
SHA1 539cb813dea7e37eff8c1b696eb0ab42c815ab62
SHA256 0a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d
SHA512 11b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a

C:\ProgramData\Zoomex\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-07 15:43

Reported

2024-11-07 15:45

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe"

Signatures

ACProtect 1.3x - 1.4x DLL software

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\milpcllefklcpfhfogdpnclfohhmdmgm\1\manifest.json C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D5AE58C5-673D-4212-4C8F-E556385C7147}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\Zoomex\\5117642dcec3b.tlb" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ = "Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32\ = "C:\\ProgramData\\Zoomex\\5117642dcec3b.dll" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ProgID\ = "Zoomex.1" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\Zoomex" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\ProgID C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147} C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147}\InProcServer32 C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{D5AE58C5-673D-4212-4C8F-E556385C7147} = "1" C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe

"C:\Users\Admin\AppData\Local\Temp\65f95d4c4a4222059284139076292b3617fad9656f16b2e1015b34f81760fefdN.exe"

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe

.\5117642dcec02.exe /s

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 74.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec02.exe

MD5 b78633fae8aaf5f7e99e9c736f44f9c5
SHA1 26fc60e29c459891ac0909470ac6c61a1eca1544
SHA256 d205693516dbaf34cfbd216e825190de4de1412e861bc9cb30ce863907b30d22
SHA512 3885b609269b26918ccfcd9069181168c12f4271b6bdfcc51afe176b2dd242d4c0953ac1a4ddaf25abcfaf28a0b694a6269d96ae39bb7b2db2f0140d2d60cd43

C:\Users\Admin\AppData\Local\Temp\nsb8A20.tmp\UserInfo.dll

MD5 7579ade7ae1747a31960a228ce02e666
SHA1 8ec8571a296737e819dcf86353a43fcf8ec63351
SHA256 564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512 a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\settings.ini

MD5 a00b41b743370ef0d73b3377dc7529c9
SHA1 014efae5c80b511f97181e71e881d850ecec4390
SHA256 5924b2ea6a6d2b098bac22c955b6e0f34658e32ea260860d6ce9b2db61afaf20
SHA512 7242fb9c01061269a435a425b905a2060edf8120fb1bfd7e83ed4469fd17ceba5729eaca0da620a7a3c2b0890fd428209bddfacc2dcc338351b6435118545a25

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\[email protected]\bootstrap.js

MD5 6dc32f99d7ad5bc8063c09222a0bd243
SHA1 50437045d7410a9799f4211c8b71cb95c2ed6d40
SHA256 4c563086d0e842fcfdfcb7377005e7f5f44fc75782a32551c5853f27286a3fc2
SHA512 4190c27192c016e8b54aa8dcce6d95fef3d4a0e03c46f709b8fc07f86777db6556d97dc59eb2cfd7b88d3fedd265fca061cbe21e8cfb9689049b3b534becc8a3

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\[email protected]\chrome.manifest

MD5 b1910b3c5fb9b47d3cc0614e41cc45e9
SHA1 65d3efda15da7f5beb1394a88e54b3513e4283c1
SHA256 1e8369497738dd9189c90c05d5d371e8e908517b5b1eeb117258ee681a336d80
SHA512 15e220533a63c7447e33d084052fd8bd037e5aa6b756bd226d407e350343f16c0de0ea19555dda8df873ced7c4630b6f31f740eaa6ecd833f1a9596d344bff24

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\[email protected]\install.rdf

MD5 ddda43af9949ab2452a655736060abe2
SHA1 5cb8e0eefb39c493b01111d9a009f824d0dc775d
SHA256 885cf7f5477aae126f8088ed3cbf12da0915c21d54219083b9ad1254ad1353bd
SHA512 d77b5be9294fca4b30e64e01cdc0d01a07afab3515b48a4560d8dd2fb5e5ca9b38645812cf5a861f2eba255a84d7020789af42b0453cb0ce34c12954fbdb6741

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\[email protected]\content\bg.js

MD5 0c8d3f00433fd72659aea1b398775093
SHA1 ceedf95cd2bb4ddb063c23ca6076640c49c5eb28
SHA256 1d2ecf41975c903286350993c9ea8c8e00b04977c6ae51d4f6f28f2fb2620a5b
SHA512 0c600e6b80a86765e7b8be0b5ebe02e5ed03adf2f0fedb8318d9e01ee29c4ac1b691ce84ba14eb437fd7c434df47f8a04e22c307dd89bf6aa66f88b74f8e1c00

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\[email protected]\content\zy.xul

MD5 84c05193d2a1e1ccef559a235f1c95f4
SHA1 69a2f9ae003d6d0121be495284eab02a74644253
SHA256 fe2c6644efc26a98edc7b29cdce4d6f01f800883ee406afe2b73aa7c96ab01ea
SHA512 260374e9010e9e3c6fa3e21a963e2410162c217741afaac58cfef692eb6a2768e188f82c34d8b801217fb6c9f9368adb6d3bc186ca789d9a74aca2818bdb9cfb

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\background.html

MD5 4703ceb22e434e5d47a53a3e1873b941
SHA1 3f8088b38575f0dd2d5f2b8d796842f92f3020be
SHA256 2b5f3f4b2279ea615f9e4f3cf64c16122c03034de74d264a84117a11ed224cba
SHA512 4d37e6bd7c9c64e818310873858d08c09960ccf7d05b3173f553feba2bfb63ecf80553e54922b3584c8f4ac64262e342e138920d00030efba5183897591a5cda

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\5117642dce9fd7.02301309.js

MD5 cb91a133d30d7044d93a5c6a1358ad45
SHA1 d64a416ce417a21cb69a24ce3c9cae5683108115
SHA256 37619163e4115918176a138d34f100c6006d62296e3fd919c6e187209a3a1d2c
SHA512 12490e96c784bad2e03281ba474424f4b73aaf669ce1eeb486abe242567c77e61d01d505e8420ee50fa121b428097e860fc9bab0c2e1c8a5938ecf4d8b8d1045

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\lsdb.js

MD5 209b7ae0b6d8c3f9687c979d03b08089
SHA1 6449f8bff917115eef4e7488fae61942a869200f
SHA256 e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA512 1b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\content.js

MD5 5f9891607f65f433b0690bae7088b2c1
SHA1 b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256 fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA512 76018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\manifest.json

MD5 d9670f9c069ec46aaff5a60a9608e885
SHA1 c15da079582c4bf21b06e934dc78f3bd8fbc5607
SHA256 a631255a7467449ff89bb97a8d97632411076d00bfb8dc84c19abd100e235e7c
SHA512 d7ead015d25cdf1d31ec3330020bd43c5ec702a148c130083fb5ee70a8a4691fe94db7f9390b93d7afbc083531c9c1f23d29bd607c22d7cb362a0cb299645ad3

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\milpcllefklcpfhfogdpnclfohhmdmgm\sqlite.js

MD5 754526279aed9317f22a8ee499bc4628
SHA1 70ddaf095a56c6e13282ac9393bd4bf3849e09d0
SHA256 295731c539e930f0decd93740879bf50ccc374d79fed7b7e9bcc76b78e9e96fb
SHA512 da81e082cf98e5e23e5b6a1c3790952b6d5b94157fec28b0c30bd84de1a55ab6ad284daa5b421af74a6ed04fc1ec0a5a03c54b7e03d24283739a706fe27f5788

C:\Users\Admin\AppData\Local\Temp\nsb8A20.tmp\nsJSON.dll

MD5 b9cd1b0fd3af89892348e5cc3108dce7
SHA1 f7bc59bf631303facfc970c0da67a73568e1dca6
SHA256 49b173504eb9cd07e42a3c4deb84c2cd3f3b49c7fb0858aee43ddfc64660e384
SHA512 fdcbdd21b831a92ca686aab5b240f073a89a08588e42439564747cad9160d79cfa8e3c103b6b4f2917684c1a591880203b4303418b85bc040f9f00b6658b0c90

memory/1572-78-0x00000000744D0000-0x00000000744DA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec3b.dll

MD5 44f1dc155d3d083b677f20ed0fab8404
SHA1 a696c5a0d50145afde3d3a71f70b1c3006ac2199
SHA256 67014a6fc8a77ae480dae9b09f800a1f40a40399ef967f86843a80eb4c9eb470
SHA512 04a7098abd589eb1a533af6f89d0d982d2faf9c4e7e29d02abaacf81635b789acfb5ca026f7a0c6b4a263934f0425c69f5225488c450e864f8dc8000ffbf94f6

C:\Users\Admin\AppData\Local\Temp\7zS8925.tmp\5117642dcec3b.tlb

MD5 c749bca713cf6481411b5c4eaac4506a
SHA1 539cb813dea7e37eff8c1b696eb0ab42c815ab62
SHA256 0a94d2086eb6ac57ba5ee365d3f6f64f33e7c8d18419f04715460bc04ebddf2d
SHA512 11b3b333b97b1bbbbbf01b6d367188698470877e180a3854ec9762f706755156136b404f2b95a7304a890686d8f5f697232e6c28497aca20e0aa76988b0f179a

C:\ProgramData\Zoomex\uninstall.exe

MD5 f3c79bda3fdf7c5dd24d60400a57cadb
SHA1 1adb606aaeedb246a371c8877c737f0f8c798625
SHA256 a76272ed3bbf23308782a308d428ee805ec77fbb622a830af26cb0ddbbf7377b
SHA512 c43cb957bdea357bd016fe03a8004a48d8117a12106f62876394feba05ad01a321ff6017ffb7b926cc77712f5ab63ea2e4b169a419c444c8f62aa4933f289935