Malware Analysis Report

2025-08-05 23:17

Sample ID 250115-2njveszkdq
Target d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe
SHA256 d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835f
Tags
adware discovery persistence privilege_escalation spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835f

Threat Level: Shows suspicious behavior

The file d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

adware discovery persistence privilege_escalation spyware stealer

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Event Triggered Execution: Component Object Model Hijacking

Checks installed software on the system

Installs/modifies Browser Helper Object

Drops Chrome extension

Drops file in Program Files directory

Unsigned PE

System Location Discovery: System Language Discovery

Modifies Internet Explorer settings

Modifies registry class

Suspicious use of WriteProcessMemory

System policy modification

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-15 22:43

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-15 22:43

Reported

2025-01-15 22:45

Platform

win7-20240903-en

Max time kernel

16s

Max time network

16s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe"

Signatures

Event Triggered Execution: Component Object Model Hijacking

persistence privilege_escalation

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\NoExplorer = "1" C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.tlb C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.tlb C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dat C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dat C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Modifies registry class

Description Indicator Process Target
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CurVer\ = "YoutubeAdblocker.1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID\ = "YoutubeAdblocker.1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\CLSID\ = "{EED68B27-BE9E-1212-47AC-D6C052244161}" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Implemented Categories C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CLSID\ = "{EED68B27-BE9E-1212-47AC-D6C052244161}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.tlb" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.x64.dll" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ = "IRegistry" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID\ = "YoutubeAdblocker.1.0" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.dll" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\CLSID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 1636 wrote to memory of 2008 N/A C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 2008 wrote to memory of 1080 N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe C:\Windows\SysWOW64\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe
PID 1080 wrote to memory of 1680 N/A C:\Windows\SysWOW64\regsvr32.exe C:\Windows\system32\regsvr32.exe

System policy modification

evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} = "1" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe

"C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe"

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe

"C:\Users\Admin\AppData\Local\Temp/3d780473/N438XI.exe"

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll"

C:\Windows\system32\regsvr32.exe

/s "C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe

MD5 9c354249e2b00af7362d8eecaee9b2b2
SHA1 13ffdbab9f8df78798ee14ab2640f21eb7deaa67
SHA256 69da81656ee601972241df4c1cf0debdf2c09eefce5753b10d58a9136cf45023
SHA512 55713fdbee4a11a4677d6375f5975e7ff2c1a197a3bc639beba09b506a6d8856793f9ee3cf917be0ae24cddbc47b24d6e36c01be0841f85d84d7069f389c1119

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.dat

MD5 6756ab3272d1b86ea59ef6cf69c75915
SHA1 eb882c295736705fa7b96e098c6b7c89640d7271
SHA256 2c8100a420444cb5ad536739842ceb0dc47e6f6a847c3561894d9eee58dd19b7
SHA512 bbfe4890c8aad00526f6620d864b3c119601b46573378392a4d73badf569cea8e604fbc557239354998995f2ea491290c879308d4b93490c238daadd2f1b180b

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\wQdayVz.js

MD5 11925b51dd1028d94cb51d5032f8eef9
SHA1 d6e02e9f2d60b176fac570bb997d7d3a3bec0b25
SHA256 cc36379fdb7ac8956c2c3e4408b8dbaef7a6c8fbeb08e32580183da78fe8617d
SHA512 94f81b967105638a34f573e949bb700c8317e06cf050472929685cc53854b8cba18c42a2cf1d5346865731f8867853e7d0fd8d692f2374e2f077a0d8ec6248b8

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\manifest.json

MD5 e2832fbedae560495781610b5c511afa
SHA1 95f9c6fe1ea5a6ee009bce1e9c215ef53fb5c108
SHA256 6e03e688a9f7cc23a788e004cea4c87ee73e36c1053d2fb34a214bcc597f3ea2
SHA512 2e206b58d02a88d21cb0cd74d5523b9f07f4558b4af9a19936befb256c2dc868107ab1716849e09b665721d1ac7b01ba6762bb54822596e39a4cdad763c68cb9

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\lsdb.js

MD5 36d98318ab2b3b2585a30984db328afb
SHA1 f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256 ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA512 6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\content.js

MD5 0654917402505bc71a231599d02e09a2
SHA1 e24d4fcf6f136c3be86b4dc01bd3bf446ce462ff
SHA256 9577828de9e701114e75cca9918972c9028689518882edcb6aa193f9353c19ae
SHA512 3e7077342d4c06d1192898a4ec5c9b19f3ca8883c5fd7c6e2a581d855959b748b5a8c4b07e3468cfc8b79e6abc1595fefccb41011c179da665567d5dc4b2da5d

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\background.html

MD5 bf8dad3c3ea73f269c2028c8c907052a
SHA1 16ac030b5436001a146c5cc4d88fe0be4aaa4262
SHA256 bbf6020d19ab323ae4c0bc12ffaba7a81ca76e6be172bf80109e7749f7af90ef
SHA512 dc3d522c58485eb6d7364e0f1f6e10b3bad4a4b2a3d0e002050ef45d4d8fc8050c7170616eea70f6ee0ce1536111de72145c98255fa9fe9541913c75ebfa6846

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\bootstrap.js

MD5 df13f711e20e9c80171846d4f2f7ae06
SHA1 56d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA256 6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA512 6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\chrome.manifest

MD5 ab4518bcc2597f39cdd8a4e4f3f92734
SHA1 174da52f6304602e9d2ce2dc1c5e3d932dc3267c
SHA256 1c17bb02562ff09222f4d392e9ff6d94b801506f84f6f7750dfd9227e8299340
SHA512 df698968e6464d6527162273c8fc1a393e8663375568e75ac6e4ce7d14b70236a6246cd8be6c99f206cdd936337cb5eea46c5f8fe25a431ecdf36003db669823

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\install.rdf

MD5 2cf63f0661d2a96210f4be3d17dcb394
SHA1 c72be832b89282f6f903ba7ce46fd14e5d361d35
SHA256 eefb8da139326382c8433d9ea23d55e8906f98f685847ead8456d18669aa4042
SHA512 6dd156affe899de3cda2385af9b066d742c4dce5dadc8c6cc12c85b3ef2ef669149ef1860b0df1eb86596c22f295e463bc40bc8fe3ca53913a2871b68e440836

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\content\bg.js

MD5 b5f20fc536d3a1204f8064cb4da795fe
SHA1 275411f9a822776ad18b8e65951b438f90aff7ed
SHA256 9f6f614a0464f1d5419466f407955e85fef39050e5a3102aa6f16f1f890d5fd5
SHA512 4d157df9780b5b2c38667082feab02e1f9179ac66c5516ce6997d16957ddef3d94fb4dee5b6543ed28b55325ad791c8356da8eb075c5e3a5214df4b62092c425

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.tlb

MD5 8d10c52cfa044ccdcfff4e0b5775babd
SHA1 3b2c872ab3237d7b74377032ed7a5239c82df766
SHA256 af8efa41494e63e07553fed5bd5df73cf55c160de292ea2a2ee0568cf12e0156
SHA512 123d5af4dec8a370a1176fe50998be5a97d3bc46ed7dd9fa365f8f4fc669785b4ed3cb0b65b266095edd3dc3512a4a1d916c035d6184e8e134617502b90f9700

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.dll

MD5 ffe3f0c62f2fede9890b18d73724fd97
SHA1 0dafa42039405f8d49a6790180194076bd57c833
SHA256 2ec40c7a7808d8aeee27eb8db1ed36424dd7d692e6d2043b20b3c75e8dd2b4d8
SHA512 84fb90d2214beae1e0c90b2d4a8678c8a55792daf60e70c441d6b5e279ae7ab5e03f49c401e14b7610189f4e885095f7f569add030254656c0e7e41f75eb8bfc

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.x64.dll

MD5 0231aebb8155fd069d17eab6a679cc1e
SHA1 61cb4b5228e6253863391ef3346c2f9920dbc554
SHA256 fde9e3251cc1237aa3b2ad89acfb5691e8fee5a434989d9a9308ab41b774b672
SHA512 42c61873d4287d4a7fb17760fc9e9902723d8c74b21be92ddf6a949b1d6170894abbab9e03680a1518c997decf58ccafc351a5ed619e6515532379663e4f5434

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-15 22:43

Reported

2025-01-15 22:45

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

96s

Command Line

"C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe"

Signatures

Event Triggered Execution: Component Object Model Hijacking

persistence privilege_escalation

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
N/A N/A C:\Windows\SysWOW64\regsvr32.exe N/A
N/A N/A C:\Windows\system32\regsvr32.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

Drops Chrome extension

Description Indicator Process Target
File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\DefaultAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\WDAGUtilityAccount\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\decjnkimcnbijcgdofgopnmnaahffflg\1.0\manifest.json C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Installs/modifies Browser Helper Object

stealer adware
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\NoExplorer = "1" C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161}\NoExplorer = "1" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dat C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dll C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.tlb C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File opened for modification C:\Program Files (x86)\YoutubeAdblocker\8n2kB.tlb C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
File created C:\Program Files (x86)\YoutubeAdblocker\8n2kB.dat C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\regsvr32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration C:\Windows\system32\regsvr32.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CurVer\ = "YoutubeAdblocker.1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32 C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CurVer C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win64\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.x64.dll" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID\ = "YoutubeAdblocker.1.0" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ThreadingModel = "Apartment" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CLSID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\CLSID\ = "{EED68B27-BE9E-1212-47AC-D6C052244161}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Implemented Categories C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker\ = "YoutubeAdblocker" C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.x64.dll" C:\Windows\system32\regsvr32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\CLSID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ThreadingModel = "Apartment" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32 C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EAF749DC-CD87-4B04-B22A-D4AC3FBCB2BC}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\YoutubeAdblocker.YoutubeAdblocker.1.0\ = "YoutubeAdblocker" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\InprocServer32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.dll" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\Program Files (x86)\\YoutubeAdblocker\\8n2kB.tlb" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\VersionIndependentProgID C:\Windows\system32\regsvr32.exe N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\Programmable C:\Windows\system32\regsvr32.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161}\ProgID\ = "YoutubeAdblocker.1.0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

System policy modification

evasion
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{EED68B27-BE9E-1212-47AC-D6C052244161} = "1" C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe

"C:\Users\Admin\AppData\Local\Temp\d1ff9e16abf3f1ed36f9860bb843cb64222c3230dbbbc8e7882133225723835fN.exe"

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe

"C:\Users\Admin\AppData\Local\Temp/3d780473/N438XI.exe"

C:\Windows\SysWOW64\regsvr32.exe

regsvr32.exe /s "C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll"

C:\Windows\system32\regsvr32.exe

/s "C:\Program Files (x86)\YoutubeAdblocker\8n2kB.x64.dll"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 181.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 167.173.78.104.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 85.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 86.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.exe

MD5 9c354249e2b00af7362d8eecaee9b2b2
SHA1 13ffdbab9f8df78798ee14ab2640f21eb7deaa67
SHA256 69da81656ee601972241df4c1cf0debdf2c09eefce5753b10d58a9136cf45023
SHA512 55713fdbee4a11a4677d6375f5975e7ff2c1a197a3bc639beba09b506a6d8856793f9ee3cf917be0ae24cddbc47b24d6e36c01be0841f85d84d7069f389c1119

C:\Users\Admin\AppData\Local\Temp\3d780473\N438XI.dat

MD5 6756ab3272d1b86ea59ef6cf69c75915
SHA1 eb882c295736705fa7b96e098c6b7c89640d7271
SHA256 2c8100a420444cb5ad536739842ceb0dc47e6f6a847c3561894d9eee58dd19b7
SHA512 bbfe4890c8aad00526f6620d864b3c119601b46573378392a4d73badf569cea8e604fbc557239354998995f2ea491290c879308d4b93490c238daadd2f1b180b

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\background.html

MD5 bf8dad3c3ea73f269c2028c8c907052a
SHA1 16ac030b5436001a146c5cc4d88fe0be4aaa4262
SHA256 bbf6020d19ab323ae4c0bc12ffaba7a81ca76e6be172bf80109e7749f7af90ef
SHA512 dc3d522c58485eb6d7364e0f1f6e10b3bad4a4b2a3d0e002050ef45d4d8fc8050c7170616eea70f6ee0ce1536111de72145c98255fa9fe9541913c75ebfa6846

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\content.js

MD5 0654917402505bc71a231599d02e09a2
SHA1 e24d4fcf6f136c3be86b4dc01bd3bf446ce462ff
SHA256 9577828de9e701114e75cca9918972c9028689518882edcb6aa193f9353c19ae
SHA512 3e7077342d4c06d1192898a4ec5c9b19f3ca8883c5fd7c6e2a581d855959b748b5a8c4b07e3468cfc8b79e6abc1595fefccb41011c179da665567d5dc4b2da5d

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\lsdb.js

MD5 36d98318ab2b3b2585a30984db328afb
SHA1 f30b85fbe08e1d569ad49dfeafaf7cb2da6585a5
SHA256 ea2caf61817c6f7781ee049217e51c1083c8fc4f1e08e07792052dfdfa529ae7
SHA512 6f61ccda2eba18369409850b2c91c9817fc741755e29a1579646e3816e0deab80e34a5adb9ff865c773793d32ac338163a224dbf363b46420d6ea42a7bbb2b3a

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\manifest.json

MD5 e2832fbedae560495781610b5c511afa
SHA1 95f9c6fe1ea5a6ee009bce1e9c215ef53fb5c108
SHA256 6e03e688a9f7cc23a788e004cea4c87ee73e36c1053d2fb34a214bcc597f3ea2
SHA512 2e206b58d02a88d21cb0cd74d5523b9f07f4558b4af9a19936befb256c2dc868107ab1716849e09b665721d1ac7b01ba6762bb54822596e39a4cdad763c68cb9

C:\Users\Admin\AppData\Local\Temp\3d780473\decjnkimcnbijcgdofgopnmnaahffflg\wQdayVz.js

MD5 11925b51dd1028d94cb51d5032f8eef9
SHA1 d6e02e9f2d60b176fac570bb997d7d3a3bec0b25
SHA256 cc36379fdb7ac8956c2c3e4408b8dbaef7a6c8fbeb08e32580183da78fe8617d
SHA512 94f81b967105638a34f573e949bb700c8317e06cf050472929685cc53854b8cba18c42a2cf1d5346865731f8867853e7d0fd8d692f2374e2f077a0d8ec6248b8

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\chrome.manifest

MD5 ab4518bcc2597f39cdd8a4e4f3f92734
SHA1 174da52f6304602e9d2ce2dc1c5e3d932dc3267c
SHA256 1c17bb02562ff09222f4d392e9ff6d94b801506f84f6f7750dfd9227e8299340
SHA512 df698968e6464d6527162273c8fc1a393e8663375568e75ac6e4ce7d14b70236a6246cd8be6c99f206cdd936337cb5eea46c5f8fe25a431ecdf36003db669823

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\bootstrap.js

MD5 df13f711e20e9c80171846d4f2f7ae06
SHA1 56d29cda58427efe0e21d3880d39eb1b0ef60bee
SHA256 6c325461fba531a94cf8cbdcfc52755494973df0629ce0ee3fef734ab0838fc4
SHA512 6c51cee3bf13f164c4a5c9884cc6053cbf9db9701d34c07dc5761d2c047d3d1f7a361b32996a430107e9a4ce68a29149d747a84c76778a1e8780719a3d30470e

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\install.rdf

MD5 2cf63f0661d2a96210f4be3d17dcb394
SHA1 c72be832b89282f6f903ba7ce46fd14e5d361d35
SHA256 eefb8da139326382c8433d9ea23d55e8906f98f685847ead8456d18669aa4042
SHA512 6dd156affe899de3cda2385af9b066d742c4dce5dadc8c6cc12c85b3ef2ef669149ef1860b0df1eb86596c22f295e463bc40bc8fe3ca53913a2871b68e440836

C:\Users\Admin\AppData\Local\Temp\3d780473\[email protected]\content\bg.js

MD5 b5f20fc536d3a1204f8064cb4da795fe
SHA1 275411f9a822776ad18b8e65951b438f90aff7ed
SHA256 9f6f614a0464f1d5419466f407955e85fef39050e5a3102aa6f16f1f890d5fd5
SHA512 4d157df9780b5b2c38667082feab02e1f9179ac66c5516ce6997d16957ddef3d94fb4dee5b6543ed28b55325ad791c8356da8eb075c5e3a5214df4b62092c425

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.tlb

MD5 8d10c52cfa044ccdcfff4e0b5775babd
SHA1 3b2c872ab3237d7b74377032ed7a5239c82df766
SHA256 af8efa41494e63e07553fed5bd5df73cf55c160de292ea2a2ee0568cf12e0156
SHA512 123d5af4dec8a370a1176fe50998be5a97d3bc46ed7dd9fa365f8f4fc669785b4ed3cb0b65b266095edd3dc3512a4a1d916c035d6184e8e134617502b90f9700

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.dll

MD5 ffe3f0c62f2fede9890b18d73724fd97
SHA1 0dafa42039405f8d49a6790180194076bd57c833
SHA256 2ec40c7a7808d8aeee27eb8db1ed36424dd7d692e6d2043b20b3c75e8dd2b4d8
SHA512 84fb90d2214beae1e0c90b2d4a8678c8a55792daf60e70c441d6b5e279ae7ab5e03f49c401e14b7610189f4e885095f7f569add030254656c0e7e41f75eb8bfc

C:\Users\Admin\AppData\Local\Temp\3d780473\8n2kB.x64.dll

MD5 0231aebb8155fd069d17eab6a679cc1e
SHA1 61cb4b5228e6253863391ef3346c2f9920dbc554
SHA256 fde9e3251cc1237aa3b2ad89acfb5691e8fee5a434989d9a9308ab41b774b672
SHA512 42c61873d4287d4a7fb17760fc9e9902723d8c74b21be92ddf6a949b1d6170894abbab9e03680a1518c997decf58ccafc351a5ed619e6515532379663e4f5434