Malware Analysis Report

2024-11-13 16:39

Sample ID 241108-e3fd8axren
Target d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e
SHA256 d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e
Tags
purecrypter redline notepad_2 discovery downloader infostealer loader persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e

Threat Level: Known bad

The file d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e was found to be: Known bad.

Malicious Activity Summary

purecrypter redline notepad_2 discovery downloader infostealer loader persistence

PureCrypter

RedLine

Redline family

RedLine payload

Detect PureCrypter injector

Purecrypter family

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Delays execution with timeout.exe

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-08 04:28

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-08 04:27

Reported

2024-11-08 04:31

Platform

win7-20240903-en

Max time kernel

136s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2072 set thread context of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2124 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2124 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2124 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2124 wrote to memory of 2072 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2072 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2072 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2072 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2072 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2480 wrote to memory of 2792 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2480 wrote to memory of 2792 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2480 wrote to memory of 2792 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2480 wrote to memory of 2792 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2612 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2072 wrote to memory of 2400 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe

"C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/2072-6-0x00000000747AE000-0x00000000747AF000-memory.dmp

memory/2072-7-0x0000000000890000-0x0000000000D3E000-memory.dmp

memory/2072-8-0x0000000004F00000-0x0000000005388000-memory.dmp

memory/2072-9-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/2072-10-0x00000000747AE000-0x00000000747AF000-memory.dmp

memory/2072-11-0x00000000747A0000-0x0000000074E8E000-memory.dmp

memory/2072-12-0x0000000005670000-0x0000000005AFA000-memory.dmp

memory/2072-13-0x0000000000790000-0x00000000007DC000-memory.dmp

\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

memory/2400-27-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-31-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-33-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-30-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2400-25-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-23-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2400-21-0x0000000000400000-0x0000000000420000-memory.dmp

\Users\Admin\AppData\Local\Temp\nso3F82.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

\Users\Admin\AppData\Local\Temp\nso3F82.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/2072-44-0x00000000747A0000-0x0000000074E8E000-memory.dmp

\Users\Admin\AppData\Local\Temp\nso3F82.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nso3F82.tmp\ioSpecial.ini

MD5 4111964458518aba78a005836fd71df0
SHA1 c5499db5e598647dee69758bd81f6733f4f02769
SHA256 020aaa2d2db7d0d138c4e7967c19621332379d99a2162d121dc33babc46edc82
SHA512 4a089c7a1b0a3b02fa3bdbf2fd7bfb4c1c683c003e42c9e25c5d1f36e3e2b766d24ab9e70ceaa0e8b846a9ef53791ae7b985db5f5daae795536abe0a030b9ef9

\Users\Admin\AppData\Local\Temp\nso3F82.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-08 04:27

Reported

2024-11-08 04:31

Platform

win10v2004-20241007-en

Max time kernel

144s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3420 set thread context of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1292 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1292 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1292 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 3420 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 3420 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 3420 wrote to memory of 3392 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 3392 wrote to memory of 3624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3392 wrote to memory of 3624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3392 wrote to memory of 3624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3420 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3420 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3420 wrote to memory of 1768 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3420 wrote to memory of 4960 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe

"C:\Users\Admin\AppData\Local\Temp\d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/3420-5-0x0000000074F2E000-0x0000000074F2F000-memory.dmp

memory/3420-6-0x0000000000890000-0x0000000000D3E000-memory.dmp

memory/3420-7-0x00000000057A0000-0x0000000005C28000-memory.dmp

memory/3420-8-0x0000000074F20000-0x00000000756D0000-memory.dmp

memory/3420-9-0x0000000074F2E000-0x0000000074F2F000-memory.dmp

memory/3420-10-0x0000000074F20000-0x00000000756D0000-memory.dmp

memory/3420-11-0x0000000005D30000-0x00000000061BA000-memory.dmp

memory/3420-12-0x00000000030D0000-0x000000000311C000-memory.dmp

memory/3420-13-0x0000000008230000-0x0000000008296000-memory.dmp

memory/3420-14-0x0000000009030000-0x00000000090C2000-memory.dmp

memory/3420-15-0x0000000009680000-0x0000000009C24000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

memory/4960-26-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3420-28-0x0000000074F20000-0x00000000756D0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsx5745.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

memory/4960-36-0x0000000005CD0000-0x00000000062E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsx5745.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/4960-37-0x00000000056D0000-0x00000000056E2000-memory.dmp

memory/4960-40-0x0000000005800000-0x000000000590A000-memory.dmp

memory/4960-41-0x0000000005760000-0x000000000579C000-memory.dmp

memory/4960-42-0x0000000005700000-0x000000000574C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsx5745.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nsx5745.tmp\ioSpecial.ini

MD5 2a588c8508cd3ba352b7755420f8f2c9
SHA1 1d9d67ef22f75c2d585d9f5fa7c67f79fef8e1bd
SHA256 bae81586019cd7ff58be040157b901960caf0df98086a0e7d7eefb0119516aaf
SHA512 aedcf8861c68f77e42c3855c8eca5c8404c2b040f45ae84ba573049827bfc152df141ac13838a6ff3f1bec412258ec01e28e2b6df824b0b429d2f01353970406

C:\Users\Admin\AppData\Local\Temp\nsx5745.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355