IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BAAAKJDAAFBAAKEBAAKF
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\BAEBGCFI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\BGCAAFHIEBKJKEBFIEHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CAFHIJDH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GDGIJECGDGCBKECAKFBG
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IEHCAKKJDBKKFHJJDHIIJEBAEC
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KJKJJEGIDBGIDGCBAFHCGCGCGD
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 76
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (3311)
downloaded
Chrome Cache Entry: 78
ASCII text
downloaded
Chrome Cache Entry: 79
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 80
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 82
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 --field-trial-handle=2184,i,17577529388536568339,1555015653757445265,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/vcruntime140.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
http://185.215.113.206/6c4adf523b719729.phpcal
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.206/6c4adf523b719729.phpuEO
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/cf
unknown
http://185.215.113.206/6c4adf523b719729.phpSession
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/746f34465cf17784/softokn3.dllL
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dll4
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.186.100
https://apis.google.com
unknown
http://185.215.113.206/6c4adf523b719729.php9B
unknown
http://185.215.113.206/6c4adf523b719729.phpY
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllk
unknown
http://185.215.113.206/746f34465cf17784/freebl3.dllR
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/6c4adf523b719729.php/P
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.186.100
http://185.215.113.206/6c4adf523b719729.php.
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://185.215.113.206/6c4adf523b719729.phplu
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
http://185.215.113.206/6c4adf523b719729.php9
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://play.google.com/log?format=json&hasfast=true
142.250.186.110
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.186.100
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.184.206
http://185.215.113.206/6c4adf523b719729.phpion:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/6c4adf523b719729.php&
unknown
http://185.215.113.206FID
unknown
http://185.215.113.206/6c4adf523b719729.phpIJECGDGCBKECAKFBG
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://clients6.google.com
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.184.206
play.google.com
142.250.186.110
www.google.com
142.250.186.100
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
185.215.113.206
unknown
Portugal
malicious
239.255.255.250
unknown
Reserved
142.250.186.110
play.google.com
United States
142.250.186.100
www.google.com
United States
142.250.184.206
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
154E000
heap
page read and write
malicious
B51000
unkown
page execute and read and write
malicious
51A0000
direct allocation
page read and write
malicious
10D9000
unkown
page execute and write copy
2F1E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
459F000
stack
page read and write
AFC000
stack
page read and write
449E000
stack
page read and write
1530000
direct allocation
page read and write
6F860000
unkown
page readonly
23860000
heap
page read and write
61ECD000
direct allocation
page readonly
1622000
heap
page read and write
13F0000
heap
page read and write
3CDF000
stack
page read and write
4D21000
heap
page read and write
23A9F000
stack
page read and write
238AD000
heap
page read and write
4D21000
heap
page read and write
1D7DE000
heap
page read and write
305C000
stack
page read and write
4D21000
heap
page read and write
238C1000
heap
page read and write
1D00E000
stack
page read and write
4D21000
heap
page read and write
CEB000
unkown
page execute and read and write
CF7000
unkown
page execute and read and write
4D21000
heap
page read and write
1D7CA000
heap
page read and write
1D64E000
stack
page read and write
1D7C9000
heap
page read and write
4D21000
heap
page read and write
1530000
direct allocation
page read and write
4D21000
heap
page read and write
1D7AB000
heap
page read and write
4D21000
heap
page read and write
6C5D0000
unkown
page readonly
41DF000
stack
page read and write
238B9000
heap
page read and write
1530000
direct allocation
page read and write
1D7CA000
heap
page read and write
161D000
heap
page read and write
3D1E000
stack
page read and write
AF2000
stack
page read and write
4D30000
heap
page read and write
1D7D5000
heap
page read and write
4D21000
heap
page read and write
3080000
direct allocation
page execute and read and write
4D21000
heap
page read and write
61EB7000
direct allocation
page readonly
C64000
unkown
page execute and read and write
4BDF000
stack
page read and write
355F000
stack
page read and write
6F861000
unkown
page execute read
6C7B0000
unkown
page read and write
13CE000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
409F000
stack
page read and write
1D7C7000
heap
page read and write
4D21000
heap
page read and write
46DF000
stack
page read and write
1D7C9000
heap
page read and write
4D21000
heap
page read and write
15A7000
heap
page read and write
4D21000
heap
page read and write
1D7C3000
heap
page read and write
3E1F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
471E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
3070000
direct allocation
page read and write
1D7A2000
heap
page read and write
23B3B000
heap
page read and write
2390B000
heap
page read and write
23840000
heap
page read and write
B10000
heap
page read and write
61ED4000
direct allocation
page readonly
4D21000
heap
page read and write
23B41000
heap
page read and write
445E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1D7CC000
heap
page read and write
DB8000
unkown
page execute and read and write
1405000
heap
page read and write
4D23000
heap
page read and write
1D7D1000
heap
page read and write
4D21000
heap
page read and write
1530000
direct allocation
page read and write
1D7DE000
heap
page read and write
4D21000
heap
page read and write
1276000
unkown
page execute and write copy
1D7A0000
heap
page read and write
1D7B6000
heap
page read and write
1D7B0000
heap
page read and write
D98000
unkown
page execute and read and write
5160000
trusted library allocation
page read and write
51CB000
direct allocation
page read and write
150E000
stack
page read and write
3090000
heap
page read and write
1D7CA000
heap
page read and write
1D7D0000
heap
page read and write
1D7DE000
heap
page read and write
4D21000
heap
page read and write
1D7C6000
heap
page read and write
5300000
direct allocation
page execute and read and write
1548000
heap
page read and write
1D7B6000
heap
page read and write
7BC000
stack
page read and write
138E000
stack
page read and write
3F5F000
stack
page read and write
4D21000
heap
page read and write
381E000
stack
page read and write
369F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1D7E4000
heap
page read and write
CBE000
unkown
page execute and read and write
4D40000
heap
page read and write
238A1000
heap
page read and write
341F000
stack
page read and write
3F9E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
161A000
heap
page read and write
359E000
stack
page read and write
23830000
trusted library allocation
page read and write
3A9E000
stack
page read and write
1D7C7000
heap
page read and write
40DE000
stack
page read and write
395E000
stack
page read and write
4D21000
heap
page read and write
CFA000
unkown
page execute and read and write
481F000
stack
page read and write
10CA000
unkown
page execute and read and write
1530000
direct allocation
page read and write
1D7B6000
heap
page read and write
1D7B6000
heap
page read and write
309B000
heap
page read and write
61EB4000
direct allocation
page read and write
6CEA1000
unkown
page execute read
6C7B5000
unkown
page readonly
4D21000
heap
page read and write
1540000
heap
page read and write
37DF000
stack
page read and write
1D7D0000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
23902000
heap
page read and write
1400000
heap
page read and write
B50000
unkown
page read and write
1D7DE000
heap
page read and write
1D8C7000
heap
page read and write
1D14E000
stack
page read and write
1D7CA000
heap
page read and write
1D7C6000
heap
page read and write
4D21000
heap
page read and write
23830000
trusted library allocation
page read and write
61ED3000
direct allocation
page read and write
4D21000
heap
page read and write
1D7CF000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1D7DF000
heap
page read and write
4D21000
heap
page read and write
3097000
heap
page read and write
3A5F000
stack
page read and write
4D21000
heap
page read and write
CCB000
unkown
page execute and read and write
DBE000
unkown
page execute and read and write
B7C000
unkown
page execute and read and write
160E000
heap
page read and write
4D21000
heap
page read and write
52F0000
direct allocation
page execute and read and write
4A9F000
stack
page read and write
1530000
direct allocation
page read and write
435E000
stack
page read and write
23914000
heap
page read and write
1D7C8000
heap
page read and write
6C7AF000
unkown
page write copy
45DE000
stack
page read and write
238A0000
heap
page read and write
4D7F000
heap
page read and write
4D21000
heap
page read and write
6CEA0000
unkown
page readonly
6C5D1000
unkown
page execute read
1D7DE000
heap
page read and write
1D74C000
stack
page read and write
1D50E000
stack
page read and write
495F000
stack
page read and write
5300000
direct allocation
page execute and read and write
3070000
direct allocation
page read and write
6C7AE000
unkown
page read and write
4D21000
heap
page read and write
C99000
unkown
page execute and read and write
345E000
stack
page read and write
1530000
direct allocation
page read and write
1D7E8000
heap
page read and write
E3A000
unkown
page execute and read and write
23836000
heap
page read and write
23B43000
heap
page read and write
4D21000
heap
page read and write
6CF47000
unkown
page read and write
421E000
stack
page read and write
4D21000
heap
page read and write
1D7D0000
heap
page read and write
2383B000
heap
page read and write
391F000
stack
page read and write
4C1E000
stack
page read and write
1275000
unkown
page execute and read and write
6CF49000
unkown
page readonly
1D7E6000
heap
page read and write
32DF000
stack
page read and write
1D28E000
stack
page read and write
6F8DD000
unkown
page readonly
1530000
direct allocation
page read and write
1D60D000
stack
page read and write
3E5E000
stack
page read and write
4D1F000
stack
page read and write
1D7D3000
heap
page read and write
331E000
stack
page read and write
61ECC000
direct allocation
page read and write
1D7CD000
heap
page read and write
1D7C3000
heap
page read and write
23B33000
heap
page read and write
15C4000
heap
page read and write
1D24F000
stack
page read and write
1D7D3000
heap
page read and write
1D7E9000
heap
page read and write
15D2000
heap
page read and write
1D7DE000
heap
page read and write
4D21000
heap
page read and write
61E00000
direct allocation
page execute and read and write
1530000
direct allocation
page read and write
1D7B9000
heap
page read and write
1D7B6000
heap
page read and write
1530000
direct allocation
page read and write
6F8F2000
unkown
page readonly
B51000
unkown
page execute and write copy
52E0000
direct allocation
page execute and read and write
1D7C8000
heap
page read and write
1530000
direct allocation
page read and write
431F000
stack
page read and write
4D21000
heap
page read and write
23AA0000
trusted library allocation
page read and write
1530000
direct allocation
page read and write
1D7DE000
heap
page read and write
4D21000
heap
page read and write
1D10F000
stack
page read and write
1D7D0000
heap
page read and write
1D7D0000
heap
page read and write
51DC000
stack
page read and write
1D7CF000
heap
page read and write
1D7C8000
heap
page read and write
4D21000
heap
page read and write
C36000
unkown
page execute and read and write
23848000
heap
page read and write
4D21000
heap
page read and write
36DE000
stack
page read and write
AF8000
stack
page read and write
1D7B6000
heap
page read and write
485E000
stack
page read and write
1D7E9000
heap
page read and write
23842000
heap
page read and write
1D38F000
stack
page read and write
5330000
direct allocation
page execute and read and write
FB9000
unkown
page execute and read and write
61ED0000
direct allocation
page read and write
1D4CF000
stack
page read and write
B20000
heap
page read and write
1D7CA000
heap
page read and write
1D7B6000
heap
page read and write
238E1000
heap
page read and write
1D7CF000
heap
page read and write
2399E000
stack
page read and write
61E01000
direct allocation
page execute read
31DE000
stack
page read and write
499E000
stack
page read and write
4D21000
heap
page read and write
1D7C6000
heap
page read and write
6F8EE000
unkown
page read and write
10C3000
unkown
page execute and read and write
6CF01000
unkown
page readonly
23880000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
1D7CA000
heap
page read and write
4D21000
heap
page read and write
1D7E7000
heap
page read and write
173E000
stack
page read and write
1D7DE000
heap
page read and write
1D8C0000
trusted library allocation
page read and write
10D9000
unkown
page execute and read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D20000
heap
page read and write
1530000
direct allocation
page read and write
6C76F000
unkown
page readonly
309E000
heap
page read and write
238A6000
heap
page read and write
1530000
direct allocation
page read and write
4D21000
heap
page read and write
1D7D5000
heap
page read and write
1D7C7000
heap
page read and write
4ADE000
stack
page read and write
238B2000
heap
page read and write
1510000
heap
page read and write
10A2000
unkown
page execute and read and write
1593000
heap
page read and write
1D7CF000
heap
page read and write
4D21000
heap
page read and write
23830000
heap
page read and write
1D7C4000
heap
page read and write
5320000
direct allocation
page execute and read and write
3B9F000
stack
page read and write
5310000
direct allocation
page execute and read and write
5300000
direct allocation
page execute and read and write
1D7C3000
heap
page read and write
52DF000
stack
page read and write
319F000
stack
page read and write
301F000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
23B4B000
heap
page read and write
4D21000
heap
page read and write
1D7CD000
heap
page read and write
10DA000
unkown
page execute and write copy
23831000
heap
page read and write
1D7AD000
heap
page read and write
4D21000
heap
page read and write
1D7E5000
heap
page read and write
3BDE000
stack
page read and write
B50000
unkown
page readonly
1D3CE000
stack
page read and write
There are 335 hidden memdumps, click here to show them.