| File name: | Installer.exe |
| Full analysis: | https://app.any.run/tasks/3cc0b1d8-4ab9-490b-bb79-9605a5e74830 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | August 06, 2024, 14:29:00 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | F795A4509A7B2BBEFE9ED4216D8A585D |
| SHA1: | F29B1EF79A8A72A92CC9D5FE5BC9D8B455A71434 |
| SHA256: | 0B5352660DD555C0AB55AB90020A36B1F34FE9DEBD312C4649606ADAB6C957CF |
| SSDEEP: | 49152:V7HeQqhlQ6NY3fNzbvqWuJW9+bRXzGYnuwkT7Vvo6n3MRNEPAnpvcyG7ZsUavXAq:V+QqZ8fVduLbRdudvo6nkNESvcb7cIrG |
| .exe | | | Inno Setup installer (53.5) |
|---|---|---|
| .exe | | | InstallShield setup (21) |
| .exe | | | Win32 EXE PECompact compressed (generic) (20.2) |
| .exe | | | Win32 Executable (generic) (2.1) |
| .exe | | | Win16/32 Executable Delphi generic (1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:09:13 09:00:51+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 741376 |
| InitializedDataSize: | 89088 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb5eec |
| OSVersion: | 6.1 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.2.0.0 |
| ProductVersionNumber: | 1.2.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | Installer Setup |
| FileVersion: | 1.2.0.0 |
| LegalCopyright: | |
| OriginalFileName: | |
| ProductName: | Installer |
| ProductVersion: | 1.2.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 232 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7fffd478dc40,0x7fffd478dc4c,0x7fffd478dc58 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 122.0.6261.70 Modules
| |||||||||||||||
| 888 | Powershell.exe -Command "& {Start-Process Powershell.exe -WindowStyle hidden -ArgumentList '-Command "Add-MpPreference -Force -ExclusionPath "C:\""' -Verb RunAs}" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | javaw.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1372 | "C:\Users\admin\AppData\Local\Temp\NTZlZmI4Y2MyMzk3MDg3MGNiZmUwYzdjMmQ4MDMzYzc.exe" | C:\Users\admin\AppData\Local\Temp\NTZlZmI4Y2MyMzk3MDg3MGNiZmUwYzdjMmQ4MDMzYzc.exe | explorer.exe | ||||||||||||
User: admin Company: Ext.NET Pro Inc. Integrity Level: MEDIUM Description: Ext.NET Pro Installer Exit code: 666 Version: 12.4.3.1 Modules
Lumma(PID) Process(1372) NTZlZmI4Y2MyMzk3MDg3MGNiZmUwYzdjMmQ4MDMzYzc.exe C2 (9)ballottynsjm.shop boattyownerwrv.shop definitonizmnx.shop assumedtribsosp.shop chippyfroggsyhz.shop budgetttysnzm.shop creepydxzoxmj.shop empiredzmwnx.shop rainbowmynsjn.shop | |||||||||||||||
| 1488 | tar xf 85.zip | C:\Windows\SysWOW64\tar.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: bsdtar archive tool Exit code: 0 Version: 3.5.2 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1860 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3132 --field-trial-handle=1900,i,17633837075252361151,13553500921936608135,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 122.0.6261.70 Modules
| |||||||||||||||
| 1964 | "C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Version: 122.0.6261.70 Modules
| |||||||||||||||
| 2132 | "C:\Users\admin\AppData\Local\Temp\av\224\jre\bin\javaw.exe" -Dfile.encoding=UTF-8 -classpath "lib\.;lib\..;lib\activation.jar;lib\asm-all.jar;lib\commons-email.jar;lib\dn-compiled-module.jar;lib\dn-php-sdk.jar;lib\gson.jar;lib\jfoenix.jar;lib\jkeymaster.jar;lib\jna.jar;lib\jphp-app-framework.jar;lib\jphp-core.jar;lib\jphp-desktop-ext.jar;lib\jphp-desktop-hotkey-ext.jar;lib\jphp-gui-ext.jar;lib\jphp-gui-jfoenix-ext.jar;lib\jphp-json-ext.jar;lib\jphp-jsoup-ext.jar;lib\jphp-mail-ext.jar;lib\jphp-runtime.jar;lib\jphp-systemtray-ext.jar;lib\jphp-xml-ext.jar;lib\jphp-zend-ext.jar;lib\jphp-zip-ext.jar;lib\jsoup.jar;lib\mail.jar;lib\slf4j-api.jar;lib\slf4j-simple.jar;lib\zt-zip.jar" org.develnext.jphp.ext.javafx.FXLauncher | C:\Users\admin\AppData\Local\Temp\av\224\jre\bin\javaw.exe | 224.exe | ||||||||||||
User: admin Company: Oracle Corporation Integrity Level: HIGH Description: Java(TM) Platform SE binary Exit code: 0 Version: 8.0.1010.13 Modules
| |||||||||||||||
| 2720 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2852 | "C:\Users\admin\AppData\Local\Temp\is-ULLTJ.tmp\Installer.tmp" /SL5="$9005E,831488,831488,C:\Users\admin\AppData\Local\Temp\Installer.exe" /SPAWNWND=$502A6 /NOTIFYWND=$A0188 /ALLUSERS | C:\Users\admin\AppData\Local\Temp\is-ULLTJ.tmp\Installer.tmp | Installer.exe | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: Setup/Uninstall Exit code: 1 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 3376 | "C:\WINDOWS\system32\cmd.exe" cmd /c innosetup-latest.e32 | C:\Windows\SysWOW64\cmd.exe | — | Installer.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: 240B00005345F21B0DE8DA01 | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: F7720506477718EF3015509A2E146D2D26EEE057180D115523467FA60B33CAB1 | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | Sequence |
Value: | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | SessionHash |
Value: 狷睇ᔰ驐ᐮ埠ഘ唑䘣ꙿ㌋뇊 | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | delete value | Name: | Owner |
Value: ତ | |||
| (PID) Process: | (2852) Installer.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6640) innosetup-latest.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: F0190000114DB71C0DE8DA01 | |||
| (PID) Process: | (6640) innosetup-latest.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: 04F053AB62A96E92D2C48390F88AF9FB23F170E7C0FCF0AA5467E7AF365B3B05 | |||
| (PID) Process: | (6640) innosetup-latest.tmp | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\Local\Temp\av\85.zip | — | |
MD5:— | SHA256:— | |||
| 2852 | Installer.tmp | C:\Users\admin\AppData\Local\Temp\is-Q2RMU.tmp\innosetup-latest.e32 | executable | |
MD5:9C125392B8D62590C4284BC46F894168 | SHA256:D29AFFF1BA3425E92B6FE40D2A703AAFC4FAE7AD36FBE51176DF57EDF6079799 | |||
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\Local\Temp\is-PCS2C.tmp\_isetup\_setup64.tmp | executable | |
MD5:4FF75F505FDDCC6A9AE62216446205D9 | SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81 | |||
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\Local\Temp\is-PCS2C.tmp\idp.dll | executable | |
MD5:55C310C0319260D798757557AB3BF636 | SHA256:54E7E0AD32A22B775131A6288F083ED3286A9A436941377FC20F85DD9AD983ED | |||
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619 | binary | |
MD5:500AE231D25F96CFDF8337ABECF5D702 | SHA256:E8ECEA107E35056E192C9038923A730487E5266AF3B26ADDE365FE46E6E1367F | |||
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619 | binary | |
MD5:2F0C6A01459267A6B280B2267DA4CC82 | SHA256:429EA066E4C791DA86B3CC2EEB5FA45B748DFFBEC974A92C98756CB8042EA4E6 | |||
| 5032 | Installer.exe | C:\Users\admin\AppData\Local\Temp\is-ULLTJ.tmp\Installer.tmp | executable | |
MD5:45FFDD819045C97BCBFD44B3C49394CD | SHA256:03214ECE6E40934496AB768E562C01D7446DFA298384D538816D3018D846C31D | |||
| 2852 | Installer.tmp | C:\Users\admin\AppData\Local\Temp\hsperfdata_admin\innosetup-latest.e32 | executable | |
MD5:9C125392B8D62590C4284BC46F894168 | SHA256:D29AFFF1BA3425E92B6FE40D2A703AAFC4FAE7AD36FBE51176DF57EDF6079799 | |||
| 2852 | Installer.tmp | C:\Users\admin\AppData\Local\Temp\is-Q2RMU.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 6640 | innosetup-latest.tmp | C:\Users\admin\AppData\Local\Temp\is-PCS2C.tmp\_isetup\_shfoldr.dll | executable | |
MD5:92DC6EF532FBB4A5C3201469A5B5EB63 | SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6928 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
3276 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6904 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
5336 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
3276 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6640 | innosetup-latest.tmp | HEAD | 200 | 116.203.15.73:80 | http://116.203.15.73/manual/224/224.zip | unknown | — | — | unknown |
6640 | innosetup-latest.tmp | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D | unknown | — | — | whitelisted |
6640 | innosetup-latest.tmp | GET | 200 | 116.203.15.73:80 | http://116.203.15.73/manual/224/224.zip | unknown | — | — | unknown |
6640 | innosetup-latest.tmp | HEAD | 200 | 116.203.15.73:80 | http://116.203.15.73/manual/224/224 | unknown | — | — | unknown |
6640 | innosetup-latest.tmp | GET | 200 | 116.203.15.73:80 | http://116.203.15.73/manual/224/224 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3028 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3888 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4760 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5336 | SearchApp.exe | 13.107.21.200:443 | www.bing.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5336 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
3276 | svchost.exe | 20.190.159.4:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3260 | svchost.exe | 40.115.3.253:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
th.bing.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
6640 | innosetup-latest.tmp | Potentially Bad Traffic | ET INFO Dotted Quad Host ZIP Request |
6640 | innosetup-latest.tmp | Potentially Bad Traffic | ET INFO Dotted Quad Host ZIP Request |
2132 | javaw.exe | Potentially Bad Traffic | ET POLICY Vulnerable Java Version 1.8.x Detected |
2132 | javaw.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2132 | javaw.exe | Misc activity | ET HUNTING Suspicious EXE requested with Java UA |
2132 | javaw.exe | Misc activity | ET INFO Observed Telegram Domain (t .me in TLS SNI) |
2132 | javaw.exe | Potentially Bad Traffic | ET POLICY Vulnerable Java Version 1.8.x Detected |
2132 | javaw.exe | Misc activity | ET HUNTING Suspicious EXE requested with Java UA |
2132 | javaw.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2132 | javaw.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |