IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\KJEHJKJEBG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\a43486128347[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\sql[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\IIEBAFCBKFID\AKEBFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\IIEBAFCBKFID\BKECBA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IIEBAFCBKFID\DHCBAE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEBAFCBKFID\DHCBAE-shm
data
dropped
C:\ProgramData\IIEBAFCBKFID\ECBGIE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\IIEBAFCBKFID\ECFHCG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IIEBAFCBKFID\FIJDGI
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\IIEBAFCBKFID\GDGHID
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIEBAFCBKFID\HIJJDG
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIEBAFCBKFID\HIJJDG-shm
data
dropped
C:\ProgramData\IIEBAFCBKFID\IIIDAK
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\IIEBAFCBKFID\JECAEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\delays.tmp
EBCDIC text, with very long lines (65536), with no line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\ProgramData\KJEHJKJEBG.exe
"C:\ProgramData\KJEHJKJEBG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\IIEBAFCBKFID" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 10

URLs

Name
IP
Malicious
http://proxy.johnmccrea.com//vcruntime140.dll
141.98.233.156
malicious
studennotediw.stor
malicious
http://proxy.johnmccrea.com//softokn3.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com//nss3.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com//mozglue.dll
141.98.233.156
malicious
spirittunek.stor
malicious
https://steamcommunity.com/profiles/76561199780418869
malicious
http://proxy.johnmccrea.com/gfdsgrewgdsfadsahttps://steamcommunity.com/profiles/76561199780418869u55
unknown
malicious
http://proxy.johnmccrea.com//msvcp140.dll
141.98.233.156
malicious
eaglepawnoy.stor
malicious
clearancek.site
malicious
mobbipenju.stor
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
licendfilteo.site
malicious
http://cowod.hopto.org/
45.132.206.251
malicious
http://proxy.johnmccrea.com//sql.dll
141.98.233.156
malicious
http://proxy.johnmccrea.com/
141.98.233.156
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
http://proxy.johnmccrea.com//freebl3.dll
141.98.233.156
malicious
bathdoomgaz.stor
malicious
dissapoiznw.stor
malicious
https://sergei-esenin.com/api
172.67.206.204
malicious
https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.
unknown
malicious
https://steamcommunity.com/profiles/76561199724331900/badges
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://proxy.johnmccrea.com/T
unknown
http://proxy.johnmccrea.com/ontent-Disposition:
unknown
https://duckduckgo.com/ac/?q=
unknown
http://cowod.hopto.org.com/data;
unknown
https://bathdoomgaz.store:443/api
unknown
http://cowod.hopto.org
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://sergei-esenin.com/
unknown
http://cowod.hopto.KFIEBG
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
http://proxy.johnmccrea.com//sql.dllW
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://sergei-esenin.com/2
unknown
http://cowod.hopto.org_DEBUG.zip/c
unknown
http://proxy.johnmccrea.com//softokn3.dll2
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
unknown
https://sergei-esenin.com/)
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://cowod.hopto.org/8yG&:
unknown
http://cowod.hopto.
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://cowod.hopto
unknown
https://clearancek.site:443/api
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=AeTz
unknown
https://store.steampowered.com/legal/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exe1kkkkoken
unknown
http://www.sqlite.org/copyright.html.
unknown
http://cowod.AKJDHJKFIEBG
unknown
https://licendfilteo.site:443/api
unknown
https://t.me/ae5ed
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://cowod.hopto.org/ly3&a
unknown
https://mozilla.org0/
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://steamcommunity.com/d
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://steamcommunity.com:443/profiles/76561199724331900
unknown
https://sergei-esenin.com/api(
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://cowod.hopto.orgHDA
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
unknown
https://www.ecosia.org/newtab/
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=Ev2sBLgkgyWJ&a
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://sergei-esenin.com:443/api
unknown
http://cowod.hoptoJKFIEBG
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=10oP_O2R
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exerm-data;
unknown
https://spirittunek.store:443/api
unknown
http://cowod.hopto.orgc6c89df3cnt-Disposition:
unknown
http://store.steampowered.com/account/cookiepreferences/
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://jask.powerforxes.shop/ldms/a43486128347.exe
147.45.44.104
There are 84 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
steamcommunity.com
104.102.49.254
malicious
cowod.hopto.org
45.132.206.251
malicious
sergei-esenin.com
172.67.206.204
malicious
proxy.johnmccrea.com
141.98.233.156
malicious
licendfilteo.site
unknown
malicious
clearancek.site
unknown
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
jask.powerforxes.shop
147.45.44.104
fp2e7a.wpc.phicdn.net
192.229.221.95
bathdoomgaz.store
unknown
spirittunek.store
unknown
studennotediw.store
unknown
mobbipenju.store
unknown
eaglepawnoy.store
unknown
dissapoiznw.store
unknown
There are 5 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
141.98.233.156
proxy.johnmccrea.com
Russian Federation
malicious
104.102.49.254
steamcommunity.com
United States
malicious
45.132.206.251
cowod.hopto.org
Russian Federation
malicious
172.67.206.204
sergei-esenin.com
United States
malicious
147.45.44.104
jask.powerforxes.shop
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{40DD6E20-7C17-11CE-A804-00AA003CA9F6} {000214EF-0000-0000-C000-000000000046} 0xFFFF

Memdumps

Base Address
Regiontype
Protect
Malicious
BCC000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
AFC000
unkown
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
467000
remote allocation
page execute and read and write
2F2E000
stack
page read and write
270D000
stack
page read and write
670000
remote allocation
page execute and read and write
CFC000
stack
page read and write
CD9000
heap
page read and write
1D8A7000
heap
page read and write
7EFE000
stack
page read and write
A50000
heap
page read and write
114F000
heap
page read and write
A0E000
stack
page read and write
6C49E000
unkown
page read and write
1752B000
stack
page read and write
2F8E000
stack
page read and write
BC2000
unkown
page readonly
B6E000
stack
page read and write
CEE000
stack
page read and write
E0E000
stack
page read and write
10E9000
heap
page read and write
6C4A2000
unkown
page readonly
1D84D000
direct allocation
page execute read
14E4B000
stack
page read and write
9C0000
heap
page read and write
74F000
stack
page read and write
59BE000
stack
page read and write
BC2000
unkown
page readonly
6C68E000
unkown
page read and write
4D2000
remote allocation
page execute and read and write
3D0000
heap
page read and write
CE7000
heap
page read and write
14D0E000
stack
page read and write
C8C000
heap
page read and write
17642000
heap
page read and write
868000
heap
page read and write
95C000
stack
page read and write
35D000
stack
page read and write
280F000
stack
page read and write
BCC000
unkown
page write copy
176C3000
heap
page read and write
176DC000
heap
page read and write
1D648000
direct allocation
page execute read
3C0000
heap
page read and write
2E2E000
stack
page read and write
1D88F000
direct allocation
page readonly
4A27D000
stack
page read and write
C3E000
stack
page read and write
E4E000
stack
page read and write
6C68F000
unkown
page write copy
12FD000
stack
page read and write
178EA000
heap
page read and write
B5F000
unkown
page readonly
1D640000
direct allocation
page execute and read and write
78E000
stack
page read and write
BA1000
unkown
page execute read
1D882000
direct allocation
page read and write
7F70000
heap
page read and write
13DE000
stack
page read and write
7ED000
stack
page read and write
17823000
heap
page read and write
D70000
heap
page read and write
F8B000
heap
page read and write
56B000
remote allocation
page execute and read and write
49E5B000
stack
page read and write
B5C000
unkown
page execute and read and write
17841000
heap
page read and write
D2F000
stack
page read and write
14E0F000
stack
page read and write
EBE000
stack
page read and write
6C4B1000
unkown
page execute read
176E3000
heap
page read and write
9C0000
heap
page read and write
C24000
unkown
page execute and read and write
156A000
heap
page read and write
C27000
unkown
page readonly
D7A000
heap
page read and write
FFF000
heap
page read and write
463000
remote allocation
page execute and read and write
7F7E000
heap
page read and write
10D7000
heap
page read and write
1763B000
heap
page read and write
CCD000
heap
page read and write
AFC000
unkown
page write copy
23B1D000
heap
page read and write
1742B000
stack
page read and write
1738C000
stack
page read and write
1900000
heap
page read and write
1024F000
stack
page read and write
6C48D000
unkown
page readonly
C27000
unkown
page readonly
308F000
stack
page read and write
1D84F000
direct allocation
page readonly
FDD000
stack
page read and write
1340000
heap
page read and write
6C4B0000
unkown
page readonly
AD1000
unkown
page execute read
CEC000
stack
page read and write
175D9000
heap
page read and write
1D858000
direct allocation
page readonly
175EA000
heap
page read and write
9C60000
heap
page read and write
29A88000
heap
page read and write
494000
remote allocation
page execute and read and write
156E000
heap
page read and write
14CCC000
stack
page read and write
CF4000
heap
page read and write
49E1B000
stack
page read and write
A50000
heap
page read and write
46B000
remote allocation
page execute and read and write
4B3000
remote allocation
page execute and read and write
AD0000
unkown
page readonly
1764B000
heap
page read and write
A4E000
stack
page read and write
CB6000
heap
page read and write
2DEE000
stack
page read and write
D7E000
heap
page read and write
2CED000
stack
page read and write
BA1000
unkown
page execute read
85D000
stack
page read and write
F6F000
stack
page read and write
9D50000
unclassified section
page read and write
AF2000
unkown
page readonly
1278D000
stack
page read and write
95D000
stack
page read and write
7EF000
stack
page read and write
6C410000
unkown
page readonly
1D7A6000
direct allocation
page execute read
FA4000
heap
page read and write
45E000
remote allocation
page execute and read and write
C25000
unkown
page read and write
CDF000
heap
page read and write
656000
remote allocation
page execute and read and write
F0D000
stack
page read and write
AD1000
unkown
page execute read
BFD000
stack
page read and write
F40000
heap
page read and write
1560000
heap
page read and write
2F9F5000
heap
page read and write
100B000
heap
page read and write
B75000
heap
page read and write
10E1000
heap
page read and write
CE4000
heap
page read and write
B5F000
unkown
page readonly
9C50000
heap
page read and write
B70000
heap
page read and write
7A0000
heap
page read and write
175D0000
heap
page read and write
175FB000
heap
page read and write
D3B000
heap
page read and write
1D88D000
direct allocation
page readonly
D17000
heap
page read and write
6C695000
unkown
page readonly
BA0000
unkown
page readonly
294D000
stack
page read and write
BA0000
heap
page read and write
9B0000
heap
page read and write
17647000
heap
page read and write
E60000
heap
page read and write
BA0000
unkown
page readonly
CF0000
stack
page read and write
35961000
heap
page read and write
4A37D000
stack
page read and write
6C64F000
unkown
page readonly
48F000
remote allocation
page execute and read and write
3B8D7000
heap
page read and write
F48000
heap
page read and write
1410000
heap
page read and write
10DD000
heap
page read and write
1D88A000
direct allocation
page readonly
1110000
heap
page read and write
C60000
heap
page read and write
1350000
heap
page read and write
17530000
heap
page read and write
FB7000
heap
page read and write
1D641000
direct allocation
page execute read
1DBA6000
heap
page read and write
6C411000
unkown
page execute read
AD0000
unkown
page readonly
C70000
heap
page read and write
B5E000
unkown
page read and write
43B0000
heap
page read and write
C78000
heap
page read and write
103A000
heap
page read and write
7F77000
heap
page read and write
E6F000
stack
page read and write
175C0000
heap
page read and write
43DBE000
stack
page read and write
B80000
heap
page read and write
9D0000
heap
page read and write
1191000
heap
page read and write
178E8000
heap
page read and write
176B0000
heap
page read and write
EC0000
heap
page read and write
31C000
stack
page read and write
6C690000
unkown
page read and write
139E000
stack
page read and write
284D000
stack
page read and write
185F000
stack
page read and write
860000
heap
page read and write
7F3D000
stack
page read and write
C9D000
heap
page read and write
6EC000
stack
page read and write
4187E000
stack
page read and write
AF2000
unkown
page readonly
175F000
stack
page read and write
70E000
stack
page read and write
There are 199 hidden memdumps, click here to show them.