Malware Analysis Report

2024-11-13 17:38

Sample ID 241110-ay91taylck
Target 1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c
SHA256 1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c
Tags
purecrypter redline notepad_2 discovery downloader infostealer loader persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c

Threat Level: Known bad

The file 1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c was found to be: Known bad.

Malicious Activity Summary

purecrypter redline notepad_2 discovery downloader infostealer loader persistence

PureCrypter

Redline family

RedLine

Purecrypter family

Detect PureCrypter injector

RedLine payload

Checks computer location settings

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: EnumeratesProcesses

Delays execution with timeout.exe

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 00:39

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:41

Platform

win10v2004-20241007-en

Max time kernel

147s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 3060 set thread context of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2520 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2520 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2520 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 3060 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 3060 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 3060 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 1268 wrote to memory of 3984 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1268 wrote to memory of 3984 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1268 wrote to memory of 3984 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 3060 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3060 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3060 wrote to memory of 2592 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 3060 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 524 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 3060 wrote to memory of 64 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp

Files

memory/3060-5-0x00000000752AE000-0x00000000752AF000-memory.dmp

memory/3060-6-0x0000000000EF0000-0x000000000139E000-memory.dmp

memory/3060-7-0x0000000005DE0000-0x0000000006268000-memory.dmp

memory/3060-8-0x00000000752A0000-0x0000000075A50000-memory.dmp

memory/3060-9-0x00000000752AE000-0x00000000752AF000-memory.dmp

memory/3060-10-0x00000000752A0000-0x0000000075A50000-memory.dmp

memory/3060-11-0x0000000006370000-0x00000000067FA000-memory.dmp

memory/3060-12-0x00000000057C0000-0x000000000580C000-memory.dmp

memory/3060-13-0x0000000007870000-0x00000000078D6000-memory.dmp

memory/3060-14-0x0000000008490000-0x0000000008522000-memory.dmp

memory/3060-15-0x0000000008AE0000-0x0000000009084000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

memory/64-27-0x0000000000400000-0x0000000000420000-memory.dmp

memory/3060-33-0x00000000752A0000-0x0000000075A50000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsw6186.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/64-39-0x0000000005190000-0x00000000051A2000-memory.dmp

memory/64-41-0x00000000051F0000-0x000000000522C000-memory.dmp

memory/64-40-0x00000000052C0000-0x00000000053CA000-memory.dmp

memory/64-38-0x0000000005710000-0x0000000005D28000-memory.dmp

memory/64-42-0x0000000005250000-0x000000000529C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsw6186.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

C:\Users\Admin\AppData\Local\Temp\nsw6186.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nsw6186.tmp\ioSpecial.ini

MD5 cbde92e4235e163a5387f7f131e442d1
SHA1 5d5890cbbf67608862fa015c9105ba8c05452df7
SHA256 dc5c4235921c3087de80e98bc152b1860168978fa8f14c8a9d71f35f830614a0
SHA512 2700a39cf17ed472e28be5431b00b6e94022ad817932e452ce741d8009f95b6450ffbfd2b0a82c7aa7af2daa24301400eb15067e05e211f4187c7458af5f03ab

C:\Users\Admin\AppData\Local\Temp\nsw6186.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:42

Platform

win7-20241010-en

Max time kernel

120s

Max time network

139s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:41

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

152s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:41

Platform

win7-20241010-en

Max time kernel

119s

Max time network

123s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:41

Platform

win10v2004-20241007-en

Max time kernel

91s

Max time network

152s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-10 00:38

Reported

2024-11-10 00:41

Platform

win7-20240903-en

Max time kernel

137s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2696 set thread context of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2644 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2644 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2644 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2644 wrote to memory of 2696 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2696 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2696 wrote to memory of 2676 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2676 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2676 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2676 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2676 wrote to memory of 2836 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2212 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2696 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/2696-6-0x0000000074B8E000-0x0000000074B8F000-memory.dmp

memory/2696-7-0x0000000000FA0000-0x000000000144E000-memory.dmp

memory/2696-8-0x00000000053D0000-0x0000000005858000-memory.dmp

memory/2696-9-0x0000000074B80000-0x000000007526E000-memory.dmp

memory/2696-10-0x0000000074B8E000-0x0000000074B8F000-memory.dmp

memory/2696-11-0x0000000074B80000-0x000000007526E000-memory.dmp

memory/2696-12-0x00000000066D0000-0x0000000006B5A000-memory.dmp

memory/2696-13-0x00000000003B0000-0x00000000003FC000-memory.dmp

\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/2860-31-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-40-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-41-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-43-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2860-37-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-35-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2860-33-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2696-44-0x0000000074B80000-0x000000007526E000-memory.dmp

\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\ioSpecial.ini

MD5 0cd8313c0f0e57d3e9f78ae9f5e89db6
SHA1 ac6a849d5f8cf236f19bfe0439f05e550bdd856f
SHA256 a7f88c8dbe201ef467e45a9b0833e4176fab1f023d065d0ca8b7d2b6b9a39439
SHA512 5b6131e24860c1d9d11e6992c910ae414cab6390849043ee5f1dc3393c272bd81a0ba05601c2ef0c9884435b054873e07c8e3ae88659446cc01f7d03c12aaba6

C:\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\ioSpecial.ini

MD5 dc046e77810e445c27a14eb5419fc44b
SHA1 0958134cdf53b5fbd81d5e9a8733e7bf76930887
SHA256 67908f4178075d68ea85445fa602b6db4c725cc891cf854f2e648138efb042c6
SHA512 44e9bea3181aa4651ffdde52bffcc307068d2bf9702a2459c2eeabe51fe1029c784664b478f043bbbe64c4e7daa6232a6aa4ae24d1a9884b71490128c74124d8

\Users\Admin\AppData\Local\Temp\nseE3CC.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355