IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\AAKKECFBGIIIEBGDGDAKJKKKEB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BAKEBAFIIECBGCAAAAFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BGDBAKFC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\CAAEBKEGHJKEBFHJDBFCFBKKJJ
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GCBKFIEB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\GHIDHCBGDHJKEBGDGIJE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JJJECFIECBGDGCAAAEHI
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
Chrome Cache Entry: 73
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 74
ASCII text, with very long lines (765)
downloaded
Chrome Cache Entry: 75
ASCII text
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 78
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 79
SVG Scalable Vector Graphics image
downloaded
There are 21 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 --field-trial-handle=2208,i,15751855977225725516,1043059134128395656,262144 /prefetch:8

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/msvcp140.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/vcruntime140.dll
185.215.113.206
malicious
http://185.215.113.206/6c4adf523b719729.php
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/softokn3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/freebl3.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/mozglue.dll
185.215.113.206
malicious
http://185.215.113.206/746f34465cf17784/nss3.dll
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/746f34465cf17784/sqlite3.dll
185.215.113.206
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.broofa.com
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://185.215.113.206/6c4adf523b719729.phprowser
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://185.215.113.206/6c4adf523b719729.phpp
unknown
http://185.215.113.206/6c4adf523b719729.phpz
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://185.215.113.206/746f34465cf17784/sqlite3.dllY
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://185.215.113.206/6c4adf523b719729.phpe
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://185.215.113.206/6c4adf523b719729.phpM
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.186.68
https://apis.google.com
unknown
http://185.215.113.206/746f34465cf17784/msvcp140.dllTS
unknown
http://185.215.113.206KEC
unknown
http://185.215.113.206/746f34465cf17784/vcruntime140.dllm
unknown
http://185.215.113.206/6c4adf523b719729.phpU
unknown
https://domains.google.com/suggest/flow
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://185.215.113.206/746f34465cf17784/nss3.dllll
unknown
http://www.sqlite.org/copyright.html.
unknown
http://185.215.113.206/6c4adf523b719729.phpA
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://185.215.113.206/6c4adf523b719729.phplc
unknown
https://mozilla.org0/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.206/746f34465cf17784/nss3.dllvf
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://www.google.com/async/newtab_promos
142.250.186.68
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17t
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
http://185.215.113.206/6c4adf523b719729.php5
unknown
https://plus.google.com
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.186.68
https://play.google.com/log?format=json&hasfast=true
142.250.185.78
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.186.68
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.110
http://185.215.113.206/6c4adf523b719729.phpion:
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.206/6c4adf523b719729.phppPno
unknown
https://support.mozilla.org
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://clients6.google.com
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.250.186.110
play.google.com
142.250.185.78
www.google.com
142.250.186.68
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious
192.168.2.4
unknown
unknown
malicious
142.250.186.68
www.google.com
United States
142.250.185.78
play.google.com
United States
239.255.255.250
unknown
Reserved
142.250.186.110
plus.l.google.com
United States
127.0.0.1
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
161000
unkown
page execute and read and write
malicious
13DE000
heap
page read and write
malicious
50F0000
direct allocation
page read and write
malicious
50D0000
heap
page read and write
160000
unkown
page read and write
23825000
heap
page read and write
4B2F000
stack
page read and write
2FF0000
direct allocation
page read and write
512B000
stack
page read and write
237B0000
trusted library allocation
page read and write
4C71000
heap
page read and write
1D746000
heap
page read and write
39EE000
stack
page read and write
11D4000
heap
page read and write
2FF0000
direct allocation
page read and write
11D4000
heap
page read and write
3C8000
unkown
page execute and read and write
881000
unkown
page execute and read and write
34EE000
stack
page read and write
522F000
stack
page read and write
4C71000
heap
page read and write
386F000
stack
page read and write
23988000
heap
page read and write
6E8000
unkown
page execute and write copy
1D750000
heap
page read and write
2FF0000
direct allocation
page read and write
48EE000
stack
page read and write
2CE000
unkown
page execute and read and write
49EF000
stack
page read and write
4C71000
heap
page read and write
3EAF000
stack
page read and write
61ECD000
direct allocation
page readonly
476F000
stack
page read and write
61E00000
direct allocation
page execute and read and write
39AF000
stack
page read and write
1D845000
heap
page read and write
1D751000
heap
page read and write
1D769000
heap
page read and write
44EF000
stack
page read and write
4C71000
heap
page read and write
1D75E000
heap
page read and write
1D769000
heap
page read and write
4C71000
heap
page read and write
1D75E000
heap
page read and write
4C71000
heap
page read and write
237B0000
trusted library allocation
page read and write
11D4000
heap
page read and write
6F870000
unkown
page readonly
3010000
direct allocation
page read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
5270000
direct allocation
page execute and read and write
1D736000
heap
page read and write
1D768000
heap
page read and write
2381F000
heap
page read and write
2FF0000
direct allocation
page read and write
11D4000
heap
page read and write
1D74D000
heap
page read and write
6C889000
unkown
page readonly
135E000
stack
page read and write
376E000
stack
page read and write
307000
unkown
page execute and read and write
1D746000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
13D0000
heap
page read and write
11D4000
heap
page read and write
116D000
stack
page read and write
1CF6E000
stack
page read and write
15CE000
stack
page read and write
2FB000
unkown
page execute and read and write
1D840000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
6C7AF000
unkown
page write copy
274000
unkown
page execute and read and write
1D736000
heap
page read and write
4C71000
heap
page read and write
30A000
unkown
page execute and read and write
2398F000
heap
page read and write
14AF000
heap
page read and write
1D730000
heap
page read and write
11D4000
heap
page read and write
1D750000
heap
page read and write
1D748000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D753000
heap
page read and write
131E000
stack
page read and write
11D4000
heap
page read and write
1D743000
heap
page read and write
1D749000
heap
page read and write
11D4000
heap
page read and write
3D6F000
stack
page read and write
1D74C000
heap
page read and write
1D750000
heap
page read and write
61ED0000
direct allocation
page read and write
3010000
direct allocation
page read and write
1D1EE000
stack
page read and write
1D47D000
stack
page read and write
3AEF000
stack
page read and write
6E7000
unkown
page execute and read and write
106C000
stack
page read and write
1D747000
heap
page read and write
5250000
direct allocation
page execute and read and write
23872000
heap
page read and write
61E01000
direct allocation
page execute read
11D4000
heap
page read and write
1D6BD000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
23987000
heap
page read and write
4C71000
heap
page read and write
3FEF000
stack
page read and write
1D747000
heap
page read and write
2FEE000
stack
page read and write
1D42F000
stack
page read and write
4CBB000
heap
page read and write
1D720000
heap
page read and write
1D0AE000
stack
page read and write
4C71000
heap
page read and write
1D06F000
stack
page read and write
4C71000
heap
page read and write
1D739000
heap
page read and write
2DB000
unkown
page execute and read and write
1D766000
heap
page read and write
5240000
direct allocation
page execute and read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
2FF0000
direct allocation
page read and write
12B0000
heap
page read and write
11D4000
heap
page read and write
1D746000
heap
page read and write
1D74A000
heap
page read and write
1D736000
heap
page read and write
1436000
heap
page read and write
246000
unkown
page execute and read and write
6C887000
unkown
page read and write
4C71000
heap
page read and write
1D749000
heap
page read and write
4C71000
heap
page read and write
372F000
stack
page read and write
4C71000
heap
page read and write
11D0000
heap
page read and write
4C71000
heap
page read and write
4C6F000
stack
page read and write
1D1AF000
stack
page read and write
11D4000
heap
page read and write
35EF000
stack
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
237B0000
heap
page read and write
1D72D000
heap
page read and write
237F1000
heap
page read and write
43AE000
stack
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
23818000
heap
page read and write
1D72B000
heap
page read and write
11D4000
heap
page read and write
44A000
unkown
page execute and read and write
4C71000
heap
page read and write
61ED4000
direct allocation
page readonly
1D74F000
heap
page read and write
6C841000
unkown
page readonly
5260000
direct allocation
page execute and read and write
3020000
heap
page read and write
1D75E000
heap
page read and write
14B5000
heap
page read and write
11D4000
heap
page read and write
1D74A000
heap
page read and write
1D743000
heap
page read and write
1D750000
heap
page read and write
1D5BD000
stack
page read and write
161000
unkown
page execute and write copy
2FF0000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D748000
heap
page read and write
4C71000
heap
page read and write
402E000
stack
page read and write
4C71000
heap
page read and write
5280000
direct allocation
page execute and read and write
6C5D0000
unkown
page readonly
16CE000
stack
page read and write
6C7E0000
unkown
page readonly
18C000
unkown
page execute and read and write
42AE000
stack
page read and write
4C71000
heap
page read and write
13BE000
stack
page read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
61EB4000
direct allocation
page read and write
11D4000
heap
page read and write
302B000
heap
page read and write
2FF0000
direct allocation
page read and write
11D4000
heap
page read and write
1D74D000
heap
page read and write
11D4000
heap
page read and write
1D57C000
stack
page read and write
1D2EF000
stack
page read and write
33AE000
stack
page read and write
1D75E000
heap
page read and write
4C71000
heap
page read and write
882000
unkown
page execute and write copy
34AF000
stack
page read and write
1D743000
heap
page read and write
4C71000
heap
page read and write
3C6E000
stack
page read and write
4A2E000
stack
page read and write
362E000
stack
page read and write
462F000
stack
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
48AF000
stack
page read and write
237D0000
heap
page read and write
1D74F000
heap
page read and write
23811000
heap
page read and write
1423000
heap
page read and write
4C71000
heap
page read and write
2FF0000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1453000
heap
page read and write
4B6E000
stack
page read and write
1168000
stack
page read and write
1D75E000
heap
page read and write
2F6F000
stack
page read and write
452E000
stack
page read and write
4C71000
heap
page read and write
3CE000
unkown
page execute and read and write
1D75F000
heap
page read and write
3B2E000
stack
page read and write
2FF0000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
1D747000
heap
page read and write
4C71000
heap
page read and write
38AE000
stack
page read and write
326E000
stack
page read and write
3EEE000
stack
page read and write
1D753000
heap
page read and write
6F902000
unkown
page readonly
43EE000
stack
page read and write
336F000
stack
page read and write
11D4000
heap
page read and write
511B000
direct allocation
page read and write
1D750000
heap
page read and write
1D755000
heap
page read and write
6F871000
unkown
page execute read
11D4000
heap
page read and write
61ED3000
direct allocation
page read and write
11D4000
heap
page read and write
6CF000
unkown
page execute and read and write
11D4000
heap
page read and write
11D4000
heap
page read and write
426F000
stack
page read and write
1D74A000
heap
page read and write
6AF000
unkown
page execute and read and write
4C71000
heap
page read and write
5260000
direct allocation
page execute and read and write
160000
unkown
page readonly
11D4000
heap
page read and write
1D75E000
heap
page read and write
1D32E000
stack
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
238F0000
trusted library allocation
page read and write
6C5D1000
unkown
page execute read
3A8000
unkown
page execute and read and write
2FF0000
direct allocation
page read and write
1D75E000
heap
page read and write
322F000
stack
page read and write
3027000
heap
page read and write
1D74A000
heap
page read and write
412F000
stack
page read and write
2FF0000
direct allocation
page read and write
2FF0000
direct allocation
page read and write
2382C000
heap
page read and write
1D765000
heap
page read and write
1D736000
heap
page read and write
47AE000
stack
page read and write
1D736000
heap
page read and write
4D70000
trusted library allocation
page read and write
1D74F000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
1D74A000
heap
page read and write
6F8FE000
unkown
page read and write
1D755000
heap
page read and write
6D7000
unkown
page execute and read and write
466E000
stack
page read and write
4C71000
heap
page read and write
1D736000
heap
page read and write
6C7AE000
unkown
page read and write
2FF0000
direct allocation
page read and write
6C7E1000
unkown
page execute read
1D747000
heap
page read and write
11D4000
heap
page read and write
2FAC000
stack
page read and write
302E000
heap
page read and write
6F8ED000
unkown
page readonly
1D736000
heap
page read and write
1162000
stack
page read and write
4C71000
heap
page read and write
5290000
direct allocation
page execute and read and write
2FF0000
direct allocation
page read and write
4C71000
heap
page read and write
4C71000
heap
page read and write
11D4000
heap
page read and write
1D764000
heap
page read and write
416E000
stack
page read and write
312F000
stack
page read and write
23990000
heap
page read and write
14B4000
heap
page read and write
23995000
heap
page read and write
5D7000
unkown
page execute and read and write
2A9000
unkown
page execute and read and write
6C7B5000
unkown
page readonly
1D744000
heap
page read and write
4C70000
heap
page read and write
1D74A000
heap
page read and write
1D767000
heap
page read and write
6E7000
unkown
page execute and write copy
23813000
heap
page read and write
4C71000
heap
page read and write
11C0000
heap
page read and write
5230000
direct allocation
page execute and read and write
1D722000
heap
page read and write
11D4000
heap
page read and write
6C7B0000
unkown
page read and write
4C80000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
6C76F000
unkown
page readonly
4C71000
heap
page read and write
1D75E000
heap
page read and write
4C71000
heap
page read and write
13D8000
heap
page read and write
61ECC000
direct allocation
page read and write
3DAE000
stack
page read and write
4C71000
heap
page read and write
3C2F000
stack
page read and write
61EB7000
direct allocation
page readonly
1D74F000
heap
page read and write
11D4000
heap
page read and write
4C71000
heap
page read and write
13C0000
heap
page read and write
There are 345 hidden memdumps, click here to show them.