IOC Report
https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Qobuz\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Qobuz\packages\Qobuz-7.1.4-b008-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\SquirrelTemp\Qobuz-7.1.4-b008-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\SquirrelTemp\RELEASES
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\Squirrel-Install.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\SquirrelTemp\background.gif
GIF image data, version 89a, 400 x 400
dropped
C:\Users\user\AppData\Local\SquirrelTemp\setupIcon.ico
MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 24x24, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 7 18:20:44 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\4a4df6e5-2dec-4712-a072-5d2a1109b3f6.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Downloads\Qobuz_Installer.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Downloads\Unconfirmed 118702.crdownload
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\SquirrelTemp\Update.exe
"C:\Users\user\AppData\Local\SquirrelTemp\Update.exe" --install .
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA.."
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1800,i,16295125349097330652,7967667769422856774,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\Downloads\Qobuz_Installer.exe
"C:\Users\user\Downloads\Qobuz_Installer.exe"

URLs

Name
IP
Malicious
https://desktop.qobuz.com/releases/win32/x64/windows7_8_10/7.1.4-b008/Qobuz_Installer.exe?_gl=1*a1991m*_up*MQ..*_ga*MTkzODU0OTg5OC4xNzI4MzI2MTA4*_ga_BCS72N6MDF*MTcyODMyNjEwNy4xLjEuMTcyODMyNjc2OS4wLjAuMTM1MzY5NjE3NA..
https://github.com/myuser/myrepo
unknown
https://api.github.com/#
unknown
http://schemas.microsoft
unknown

IPs

IP
Domain
Country
Malicious
142.250.181.238
unknown
United States
1.1.1.1
unknown
Australia
142.250.185.68
unknown
United States
34.104.35.123
unknown
United States
239.255.255.250
unknown
Reserved
142.250.186.174
unknown
United States
192.168.2.16
unknown
unknown
172.217.18.3
unknown
United States
172.217.16.195
unknown
United States
18.239.83.39
unknown
United States
66.102.1.84
unknown
United States
There are 1 hidden IPs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
882F000
heap
page read and write
7FFEB8CFC000
trusted library allocation
page read and write
7A0C000
unkown
page readonly
1B95F000
stack
page read and write
7FFEB8B50000
trusted library allocation
page read and write
1BD5E000
stack
page read and write
8827000
heap
page read and write
7FFEB8D20000
trusted library allocation
page read and write
A400000
heap
page read and write
700C000
unkown
page readonly
1B75E000
stack
page read and write
7FFEB8B4D000
trusted library allocation
page execute and read and write
882B000
heap
page read and write
7FFEB8B34000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
E95000
heap
page read and write
7FFEB8B5D000
trusted library allocation
page execute and read and write
1B9BD000
heap
page read and write
1BE5E000
stack
page read and write
C0C000
unkown
page readonly
1E22D575000
heap
page read and write
C79000
heap
page read and write
881A000
heap
page read and write
BE1000
unkown
page execute read
8827000
heap
page read and write
7FFEB8B4B000
trusted library allocation
page read and write
7FFEB8D40000
trusted library allocation
page read and write
7FFEB8CF4000
trusted library allocation
page read and write
12B51000
trusted library allocation
page read and write
12B71000
trusted library allocation
page read and write
7FFEB8B43000
trusted library allocation
page read and write
7FFEB8D2A000
trusted library allocation
page read and write
12B60000
trusted library allocation
page read and write
3E0C000
unkown
page readonly
AF8000
stack
page read and write
1B518000
stack
page read and write
7FFEB8B3D000
trusted library allocation
page execute and read and write
1385000
heap
page read and write
109F000
stack
page read and write
2BED000
trusted library allocation
page read and write
7FFEB8B8C000
trusted library allocation
page execute and read and write
868E000
stack
page read and write
12B56000
trusted library allocation
page read and write
C0A000
unkown
page read and write
87F0000
heap
page read and write
CAF000
heap
page read and write
882F000
heap
page read and write
E10000
heap
page read and write
7A0000
heap
page read and write
7FFEB8B49000
trusted library allocation
page read and write
68F15DE000
stack
page read and write
864E000
stack
page read and write
8820000
heap
page read and write
C7B000
heap
page read and write
7FFEB8D10000
trusted library allocation
page read and write
7FFEB8BE6000
trusted library allocation
page read and write
520C000
unkown
page readonly
68F155C000
stack
page read and write
C40000
heap
page read and write
E90000
heap
page read and write
7FFEB8D31000
trusted library allocation
page read and write
7FFEB8BEC000
trusted library allocation
page execute and read and write
7FFEB8D70000
trusted library allocation
page execute and read and write
1380000
heap
page read and write
6B0000
unkown
page readonly
7FFEB8BE0000
trusted library allocation
page read and write
1E22D470000
heap
page read and write
1E22D1B0000
heap
page read and write
882000
unkown
page readonly
87FE000
heap
page read and write
1BB55000
stack
page read and write
2B71000
trusted library allocation
page read and write
2A0C000
unkown
page readonly
7FFEB8B54000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
480C000
unkown
page readonly
AFC000
stack
page read and write
C0A000
unkown
page write copy
D2A000
heap
page read and write
2BA6000
trusted library allocation
page read and write
89EF000
stack
page read and write
7FFEB8B5B000
trusted library allocation
page execute and read and write
CA8000
heap
page read and write
881A000
heap
page read and write
1E22D570000
heap
page read and write
E80000
trusted library allocation
page read and write
6B2000
unkown
page readonly
87FA000
heap
page read and write
7FFEB8B33000
trusted library allocation
page execute and read and write
1B960000
heap
page read and write
200C000
unkown
page readonly
1E22D1E0000
heap
page read and write
660C000
unkown
page readonly
7FFEB8D09000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
7FFEB8B32000
trusted library allocation
page read and write
881A000
heap
page read and write
8AEF000
stack
page read and write
1E22D228000
heap
page read and write
7FFEB8D60000
trusted library allocation
page read and write
840C000
unkown
page readonly
7EE000
stack
page read and write
1BC59000
stack
page read and write
7FFEB8B30000
trusted library allocation
page read and write
5C0C000
unkown
page readonly
7FFEB8C16000
trusted library allocation
page execute and read and write
CAA000
heap
page read and write
7FFEB8CDD000
trusted library allocation
page read and write
C7D000
heap
page read and write
C20000
heap
page read and write
C66000
heap
page read and write
1B9AC000
heap
page read and write
F9E000
stack
page read and write
6B0000
unkown
page readonly
882B000
heap
page read and write
8827000
heap
page read and write
1B650000
heap
page read and write
68F18FE000
stack
page read and write
7FFEB8CD0000
trusted library allocation
page read and write
7FFEB8D50000
trusted library allocation
page read and write
BE0000
unkown
page readonly
1340000
trusted library allocation
page read and write
7FFEB8CE7000
trusted library allocation
page read and write
2B4F000
stack
page read and write
29F0000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
881C000
heap
page read and write
7FFEB8CED000
trusted library allocation
page read and write
7FF4330C0000
trusted library allocation
page execute and read and write
2A40000
heap
page execute and read and write
D32000
heap
page read and write
C10000
heap
page read and write
68F187E000
stack
page read and write
12B5B000
trusted library allocation
page read and write
7FFEB8C50000
trusted library allocation
page execute and read and write
340C000
unkown
page readonly
12B58000
trusted library allocation
page read and write
8827000
heap
page read and write
29EF000
stack
page read and write
86F0000
heap
page read and write
BFF000
unkown
page readonly
1E22D1C0000
heap
page read and write
1B5A0000
heap
page execute and read and write
8827000
heap
page read and write
7FFEB8D80000
trusted library allocation
page read and write
882F000
heap
page read and write
1E22D220000
heap
page read and write
1360000
heap
page read and write
7FFEB8D00000
trusted library allocation
page read and write
1B85E000
stack
page read and write
8827000
heap
page read and write
9C3000
stack
page read and write
7FFEB8CD3000
trusted library allocation
page read and write
881A000
heap
page read and write
1B0DC000
stack
page read and write
881D000
heap
page read and write
C49000
heap
page read and write
7FFEB8BF0000
trusted library allocation
page execute and read and write
1353000
trusted library allocation
page read and write
882E000
heap
page read and write
860F000
stack
page read and write
160C000
unkown
page readonly
2C26000
trusted library allocation
page read and write
BFF000
unkown
page readonly
7FFEB8D03000
trusted library allocation
page read and write
790000
heap
page read and write
882B000
heap
page read and write
2B6E000
trusted library allocation
page read and write
8CD0000
heap
page read and write
119E000
stack
page read and write
E30000
heap
page read and write
72B000
stack
page read and write
There are 162 hidden memdumps, click here to show them.